Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
cho_mea64.exe

Overview

General Information

Sample name:cho_mea64.exe
Analysis ID:1559669
MD5:044f51347e293ac77de4cd47bdccbacf
SHA1:4c67777228575ac317c62855e6d9dd0a6da48c2d
SHA256:4ca9da66d04a5f68deb0bab55aca5d64b8d8307c58f2943d6a67a3b584855ee2
Tags:chomea64exeuser-JAMESWT_MHT
Infos:

Detection

MicroClip
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Yara detected MicroClip
AI detected suspicious sample
Drops executables to the windows directory (C:\Windows) and starts them
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for dropped file
PE file contains section with special chars
AV process strings found (often used to terminate AV products)
Checks for available system drives (often done to infect USB drives)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates COM task schedule object (often to register a task for autostart)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Entry point lies outside standard sections
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
Modifies existing windows services
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Use Short Name Path in Command Line
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cho_mea64.exe (PID: 7416 cmdline: "C:\Users\user\Desktop\cho_mea64.exe" MD5: 044F51347E293AC77DE4CD47BDCCBACF)
    • cho_mea64.tmp (PID: 7468 cmdline: "C:\Users\user~1\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmp" /SL5="$20404,20366305,827392,C:\Users\user\Desktop\cho_mea64.exe" MD5: DC63A4763A59D647C3D0C4480EAE0329)
      • 20decf5c428.exe (PID: 7576 cmdline: "C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exe" -pc0873f648e06c724 -y -o"C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\" MD5: 545274EA5D70FF8BEB929CDA02BE53DE)
        • conhost.exe (PID: 7584 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • 62b24530.exe (PID: 7696 cmdline: "C:\Users\user\AppData\Roaming\611641ae7b4c35da\62b24530.exe" -p7fe04917 -y -o"C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\" MD5: CB8267B4B34F49626EAF67B562DC4C87)
        • conhost.exe (PID: 7704 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • soiucosxz.exe (PID: 7824 cmdline: "C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\soiucosxz.exe" MD5: 6CF29DBF1FA710CCCF6BA1C4C01F6B85)
  • svchost.exe (PID: 7520 cmdline: C:\Windows\system32\svchost.exe -k LocalService -s W32Time MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cmd.exe (PID: 5508 cmdline: cmd /c start "" "C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\soiucosxz.exe" 3aede031690535070f390095f2d2 7824 "C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • soiucosxz.exe (PID: 6240 cmdline: "C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\soiucosxz.exe" 3aede031690535070f390095f2d2 7824 "C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\" MD5: 6CF29DBF1FA710CCCF6BA1C4C01F6B85)
  • soiucosxz.exe (PID: 7716 cmdline: "C:\Windows\ksxvHQBlSOri\soiucosxz.exe" MD5: F6F6FF4E9B359BC005A25FADB3A0AA61)
    • soiucosxz.exe (PID: 336 cmdline: "C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exe" MD5: F6F6FF4E9B359BC005A25FADB3A0AA61)
      • soiucosxz.exe (PID: 1920 cmdline: "C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe" MD5: 6CF29DBF1FA710CCCF6BA1C4C01F6B85)
        • soiucosxz.exe (PID: 1876 cmdline: "C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe" "2fb5d34656b943d916e57e9120" MD5: 6CF29DBF1FA710CCCF6BA1C4C01F6B85)
          • RelPost.exe (PID: 3260 cmdline: C:\Windows\system32\RelPost.exe MD5: E351DDC4F470EDEF41D705315CA1F156)
          • msconfig.exe (PID: 3136 cmdline: C:\Windows\system32\msconfig.exe MD5: 39009536CAFE30C6EF2501FE46C9DF5E)
            • soiucosxz.exe (PID: 2384 cmdline: "C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe" bcbf6f4 1876 MD5: 6CF29DBF1FA710CCCF6BA1C4C01F6B85)
  • cmd.exe (PID: 7700 cmdline: cmd /c start "" "C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe" 6c376dd8a 7824 "C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • soiucosxz.exe (PID: 7740 cmdline: "C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe" 6c376dd8a 7824 "C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\" MD5: 6CF29DBF1FA710CCCF6BA1C4C01F6B85)
  • soiucosxz.exe (PID: 2840 cmdline: C:\Windows\ksxvHQBlSOri\soiucosxz.exe MD5: F6F6FF4E9B359BC005A25FADB3A0AA61)
    • soiucosxz.exe (PID: 5576 cmdline: "C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exe" MD5: F6F6FF4E9B359BC005A25FADB3A0AA61)
      • soiucosxz.exe (PID: 3896 cmdline: "C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe" MD5: 6CF29DBF1FA710CCCF6BA1C4C01F6B85)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000008.00000002.2875747667.0000022F1E420000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_MicroClipYara detected MicroClipJoe Security
    00000017.00000002.3163426099.0000016095BB0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_MicroClipYara detected MicroClipJoe Security
      00000017.00000002.3163647071.0000016095E11000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_MicroClipYara detected MicroClipJoe Security
        00000008.00000002.2875896834.0000022F1E681000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_MicroClipYara detected MicroClipJoe Security
          Process Memory Space: soiucosxz.exe PID: 7824JoeSecurity_MicroClipYara detected MicroClipJoe Security
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            23.2.soiucosxz.exe.16095bb0000.2.raw.unpackJoeSecurity_MicroClipYara detected MicroClipJoe Security
              8.2.soiucosxz.exe.22f1e420000.2.raw.unpackJoeSecurity_MicroClipYara detected MicroClipJoe Security
                8.2.soiucosxz.exe.22f1e420000.2.unpackJoeSecurity_MicroClipYara detected MicroClipJoe Security
                  23.2.soiucosxz.exe.16095bb0000.2.unpackJoeSecurity_MicroClipYara detected MicroClipJoe Security

                    System Summary

                    barindex
                    Source: Process startedAuthor: frack113, Nasreddine Bencherchali: Data: Command: "C:\Users\user~1\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmp" /SL5="$20404,20366305,827392,C:\Users\user\Desktop\cho_mea64.exe" , CommandLine: "C:\Users\user~1\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmp" /SL5="$20404,20366305,827392,C:\Users\user\Desktop\cho_mea64.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmp, NewProcessName: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmp, OriginalFileName: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmp, ParentCommandLine: "C:\Users\user\Desktop\cho_mea64.exe", ParentImage: C:\Users\user\Desktop\cho_mea64.exe, ParentProcessId: 7416, ParentProcessName: cho_mea64.exe, ProcessCommandLine: "C:\Users\user~1\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmp" /SL5="$20404,20366305,827392,C:\Users\user\Desktop\cho_mea64.exe" , ProcessId: 7468, ProcessName: cho_mea64.tmp
                    Source: Process startedAuthor: vburov: Data: Command: C:\Windows\system32\svchost.exe -k LocalService -s W32Time, CommandLine: C:\Windows\system32\svchost.exe -k LocalService -s W32Time, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: C:\Windows\system32\svchost.exe -k LocalService -s W32Time, ProcessId: 7520, ProcessName: svchost.exe
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\zlibwapi.dllReversingLabs: Detection: 44%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 93.3% probability
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\zlibwapi.dllJoe Sandbox ML: detected
                    Source: cho_mea64.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: cho_mea64.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Source: Binary string: O:\Projects\DSClock\Releasex64\DSClock.x64.pdb source: 62b24530.exe, 00000006.00000003.1387698113.00000000027A0000.00000004.00001000.00020000.00000000.sdmp, soiucosxz.exe, 00000008.00000000.1390014706.00007FF60D070000.00000002.00000001.01000000.0000000B.sdmp, soiucosxz.exe, 00000008.00000002.2876430989.00007FF60D070000.00000002.00000001.01000000.0000000B.sdmp, soiucosxz.exe, 0000000D.00000002.2722695776.00007FF60D070000.00000002.00000001.01000000.0000000B.sdmp, soiucosxz.exe, 0000000D.00000000.1969463418.00007FF60D070000.00000002.00000001.01000000.0000000B.sdmp, soiucosxz.exe, 00000011.00000000.2662654047.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000011.00000002.3162868206.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000013.00000000.2718384137.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000013.00000002.2895851602.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000014.00000000.2804109156.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000014.00000002.3150573408.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000017.00000002.3164204207.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000017.00000000.2940163214.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp
                    Source: Binary string: C:\b\s\w\ir\cache\builder\src\out\Release\updater.exe.pdb source: 20decf5c428.exe, 00000004.00000003.1362877018.0000000003080000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: C:\Users\paulb\code\Squirrel\squirrel.windows\src\StubExecutable\bin\Release\StubExecutable.pdb source: soiucosxz.exe, 0000000F.00000002.2717694035.0000000000CFD000.00000002.00000001.01000000.00000010.sdmp, soiucosxz.exe, 0000000F.00000000.2661422003.0000000000CFD000.00000002.00000001.01000000.00000010.sdmp, soiucosxz.exe, 00000010.00000000.2661876558.0000000000E9D000.00000002.00000001.01000000.00000011.sdmp, soiucosxz.exe, 00000010.00000002.2718485911.0000000000E9D000.00000002.00000001.01000000.00000011.sdmp
                    Source: Binary string: C:\b\s\w\ir\cache\builder\src\out\Release\updater.exe.pdb source: 20decf5c428.exe, 00000004.00000003.1362877018.0000000003080000.00000004.00001000.00020000.00000000.sdmp
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeFile opened: z:Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeFile opened: x:Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeFile opened: v:Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeFile opened: t:Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeFile opened: r:Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeFile opened: p:Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeFile opened: n:Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeFile opened: l:Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeFile opened: j:Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeFile opened: h:Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeFile opened: f:Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeFile opened: b:Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeFile opened: y:Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeFile opened: w:Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeFile opened: u:Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeFile opened: s:Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeFile opened: q:Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeFile opened: o:Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeFile opened: m:Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeFile opened: k:Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeFile opened: i:Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeFile opened: g:Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeFile opened: e:Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpFile opened: c:Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeFile opened: [:Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServerJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ElevationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServerJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ElevationJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeCode function: 4_2_00405A8D FindFirstFileW,4_2_00405A8D
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpFile opened: C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\_isetup\_isdecmp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpFile opened: C:\Users\user~1\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpFile opened: C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpFile opened: C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\_isetup\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpFile opened: C:\Users\user~1\AppData\Local\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpFile opened: C:\Users\user~1\AppData\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeCode function: 4x nop then movzx eax, byte ptr [r8]8_2_0000000180053140
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficDNS traffic detected: DNS query: time.windows.com
                    Source: global trafficDNS traffic detected: DNS query: boss.google.tw.cn
                    Source: 20decf5c428.exe, 00000004.00000003.1362877018.0000000003080000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://.css
                    Source: 20decf5c428.exe, 00000004.00000003.1362877018.0000000003080000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://.jpg
                    Source: 20decf5c428.exe, 00000004.00000003.1362558079.0000000002440000.00000004.00001000.00020000.00000000.sdmp, 62b24530.exe, 00000006.00000003.1386822448.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, 62b24530.exe, 00000006.00000003.1387698113.0000000002847000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                    Source: 20decf5c428.exe, 00000004.00000003.1362558079.0000000002440000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                    Source: 20decf5c428.exe, 00000004.00000003.1362558079.0000000002440000.00000004.00001000.00020000.00000000.sdmp, 62b24530.exe, 00000006.00000003.1386822448.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, 62b24530.exe, 00000006.00000003.1387698113.0000000002847000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                    Source: 20decf5c428.exe, 00000004.00000003.1362558079.0000000002440000.00000004.00001000.00020000.00000000.sdmp, 62b24530.exe, 00000006.00000003.1386822448.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, 62b24530.exe, 00000006.00000003.1387698113.0000000002847000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                    Source: cho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000003.1300096518.0000000003A40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.certum.pl/cscasha2.crl0q
                    Source: cho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000003.1300096518.0000000003A40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.certum.pl/ctnca.crl0k
                    Source: 62b24530.exe, 00000006.00000003.1386822448.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, 62b24530.exe, 00000006.00000003.1387698113.0000000002847000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0V
                    Source: 62b24530.exe, 00000006.00000003.1386822448.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, 62b24530.exe, 00000006.00000003.1387698113.0000000002847000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/gsgccr45codesignca2020.crl0
                    Source: 62b24530.exe, 00000006.00000003.1386822448.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, 62b24530.exe, 00000006.00000003.1387698113.0000000002847000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
                    Source: cho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000003.1300096518.0000000003A40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
                    Source: cho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.usertr
                    Source: 20decf5c428.exe, 00000004.00000003.1362558079.0000000002440000.00000004.00001000.00020000.00000000.sdmp, 62b24530.exe, 00000006.00000003.1386822448.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, 62b24530.exe, 00000006.00000003.1387698113.0000000002847000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                    Source: 20decf5c428.exe, 00000004.00000003.1362558079.0000000002440000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                    Source: 20decf5c428.exe, 00000004.00000003.1362558079.0000000002440000.00000004.00001000.00020000.00000000.sdmp, 62b24530.exe, 00000006.00000003.1386822448.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, 62b24530.exe, 00000006.00000003.1387698113.0000000002847000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                    Source: 20decf5c428.exe, 00000004.00000003.1362558079.0000000002440000.00000004.00001000.00020000.00000000.sdmp, 62b24530.exe, 00000006.00000003.1386822448.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, 62b24530.exe, 00000006.00000003.1387698113.0000000002847000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                    Source: 20decf5c428.exe, 00000004.00000003.1362558079.0000000002440000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                    Source: cho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/Sectig
                    Source: cho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000003.1300096518.0000000003A40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
                    Source: cho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000003.1300096518.0000000003A40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://cscasha2.ocsp-certum.com04
                    Source: 20decf5c428.exe, 00000004.00000003.1362877018.0000000003080000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://html4/loose.dtd
                    Source: 20decf5c428.exe, 00000004.00000003.1362558079.0000000002440000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                    Source: 20decf5c428.exe, 00000004.00000003.1362558079.0000000002440000.00000004.00001000.00020000.00000000.sdmp, 62b24530.exe, 00000006.00000003.1386822448.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, 62b24530.exe, 00000006.00000003.1387698113.0000000002847000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                    Source: 20decf5c428.exe, 00000004.00000003.1362558079.0000000002440000.00000004.00001000.00020000.00000000.sdmp, 62b24530.exe, 00000006.00000003.1386822448.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, 62b24530.exe, 00000006.00000003.1387698113.0000000002847000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                    Source: 20decf5c428.exe, 00000004.00000003.1362558079.0000000002440000.00000004.00001000.00020000.00000000.sdmp, 62b24530.exe, 00000006.00000003.1386822448.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, 62b24530.exe, 00000006.00000003.1387698113.0000000002847000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
                    Source: 62b24530.exe, 00000006.00000003.1386822448.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, 62b24530.exe, 00000006.00000003.1387698113.0000000002847000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
                    Source: 62b24530.exe, 00000006.00000003.1386822448.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, 62b24530.exe, 00000006.00000003.1387698113.0000000002847000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/gsgccr45codesignca20200V
                    Source: 62b24530.exe, 00000006.00000003.1386822448.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, 62b24530.exe, 00000006.00000003.1387698113.0000000002847000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/rootr30;
                    Source: cho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000003.1300096518.0000000003A40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                    Source: cho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000003.1300096518.0000000003A40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://repository.certum.pl/cscasha2.cer0
                    Source: cho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000003.1300096518.0000000003A40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://repository.certum.pl/ctnca.cer09
                    Source: soiucosxz.exeString found in binary or memory: http://schemas.microsoft.c
                    Source: 62b24530.exe, 00000006.00000003.1386822448.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, 62b24530.exe, 00000006.00000003.1387698113.0000000002847000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
                    Source: 62b24530.exe, 00000006.00000003.1386822448.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, 62b24530.exe, 00000006.00000003.1387698113.0000000002847000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45codesignca2020.crt0=
                    Source: 62b24530.exe, 00000006.00000003.1386822448.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, 62b24530.exe, 00000006.00000003.1387698113.0000000002847000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06
                    Source: cho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000003.1300096518.0000000003A40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://subca.ocsp-certum.com01
                    Source: 20decf5c428.exe, 00000004.00000003.1362765577.0000000002A40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://support.google.com/installer/
                    Source: 20decf5c428.exe, 00000004.00000003.1362765577.0000000002A40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://support.google.com/installer/%s?product=%s&error=%d
                    Source: cho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000003.1300096518.0000000003A40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.certum.pl/CPS0
                    Source: 20decf5c428.exe, 00000004.00000003.1362558079.0000000002440000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
                    Source: 20decf5c428.exe, 00000004.00000003.1362765577.0000000002A40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://clients2.google.com/cr/report
                    Source: 20decf5c428.exe, 00000004.00000003.1362765577.0000000002A40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://crashpad.chromium.org/
                    Source: 20decf5c428.exe, 00000004.00000003.1362765577.0000000002A40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://crashpad.chromium.org/bug/new
                    Source: 20decf5c428.exe, 00000004.00000003.1362765577.0000000002A40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://crashpad.chromium.org/https://crashpad.chromium.org/bug/new
                    Source: soiucosxz.exeString found in binary or memory: https://curl.haxx.se/
                    Source: soiucosxz.exe, 00000008.00000002.2871706526.0000000180085000.00000002.00000001.01000000.0000000C.sdmp, soiucosxz.exe, 0000000D.00000002.2719010918.0000000180085000.00000002.00000001.01000000.0000000C.sdmp, soiucosxz.exe, 00000011.00000002.3157360807.0000000180085000.00000002.00000001.01000000.00000013.sdmp, soiucosxz.exe, 00000013.00000002.2887804207.0000000180085000.00000002.00000001.01000000.00000013.sdmp, soiucosxz.exe, 00000014.00000002.3140670968.0000000180085000.00000002.00000001.01000000.00000013.sdmp, soiucosxz.exe, 00000017.00000002.3157366347.0000000180085000.00000002.00000001.01000000.00000013.sdmpString found in binary or memory: https://curl.haxx.se/V
                    Source: soiucosxz.exeString found in binary or memory: https://curl.haxx.se/docs/copyright.html
                    Source: soiucosxz.exe, 00000008.00000002.2871706526.0000000180085000.00000002.00000001.01000000.0000000C.sdmp, soiucosxz.exe, 0000000D.00000002.2719010918.0000000180085000.00000002.00000001.01000000.0000000C.sdmp, soiucosxz.exe, 00000011.00000002.3157360807.0000000180085000.00000002.00000001.01000000.00000013.sdmp, soiucosxz.exe, 00000013.00000002.2887804207.0000000180085000.00000002.00000001.01000000.00000013.sdmp, soiucosxz.exe, 00000014.00000002.3140670968.0000000180085000.00000002.00000001.01000000.00000013.sdmp, soiucosxz.exe, 00000017.00000002.3157366347.0000000180085000.00000002.00000001.01000000.00000013.sdmpString found in binary or memory: https://curl.haxx.se/docs/copyright.htmlD
                    Source: soiucosxz.exe, soiucosxz.exe, 00000008.00000002.2871655677.0000000180065000.00000002.00000001.01000000.0000000C.sdmp, soiucosxz.exe, 0000000D.00000002.2718786621.0000000180065000.00000002.00000001.01000000.0000000C.sdmp, soiucosxz.exe, 00000011.00000002.3157216682.0000000180065000.00000002.00000001.01000000.00000013.sdmp, soiucosxz.exe, 00000013.00000002.2887401716.0000000180065000.00000002.00000001.01000000.00000013.sdmp, soiucosxz.exe, 00000014.00000002.3140615540.0000000180065000.00000002.00000001.01000000.00000013.sdmp, soiucosxz.exe, 00000017.00000002.3157216771.0000000180065000.00000002.00000001.01000000.00000013.sdmpString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
                    Source: 20decf5c428.exe, 00000004.00000003.1362765577.0000000002A40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://dl.google.com/update2/installers/icons/
                    Source: cho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000003.1300096518.0000000003A40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://jrsoftware.org/
                    Source: cho_mea64.exe, 00000000.00000000.1293880766.0000000000081000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
                    Source: cho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000003.1300096518.0000000003A40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://jrsoftware.org0
                    Source: 20decf5c428.exe, 00000004.00000003.1362765577.0000000002A40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://m.google.com/devicemanagement/data/api
                    Source: cho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                    Source: cho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000003.1300096518.0000000003A40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0D
                    Source: 20decf5c428.exe, 00000004.00000003.1362765577.0000000002A40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://update.googleapis.com/service/update2/json
                    Source: 20decf5c428.exe, 00000004.00000003.1362765577.0000000002A40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://update.googleapis.com/service/update2/jsonhttps://clients2.google.com/cr/reporthttps://m.goo
                    Source: cho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000003.1300096518.0000000003A40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.certum.pl/CPS0
                    Source: 62b24530.exe, 00000006.00000003.1387698113.00000000027A0000.00000004.00001000.00020000.00000000.sdmp, soiucosxz.exe, soiucosxz.exe, 00000008.00000002.2876579041.00007FF60D102000.00000002.00000001.01000000.0000000B.sdmp, soiucosxz.exe, 0000000D.00000000.1970016412.00007FF60D102000.00000002.00000001.01000000.0000000B.sdmp, soiucosxz.exe, 00000011.00000000.2662735613.00007FF77EFE2000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000013.00000000.2718504010.00007FF77EFE2000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000014.00000002.3151733980.00007FF77EFE2000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000017.00000000.2940238119.00007FF77EFE2000.00000002.00000001.01000000.00000012.sdmpString found in binary or memory: https://www.dualitysoft.com/dsclock/
                    Source: 62b24530.exe, 00000006.00000003.1386822448.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, soiucosxz.exe, 00000008.00000000.1390014706.00007FF60D070000.00000002.00000001.01000000.0000000B.sdmp, soiucosxz.exe, 00000008.00000002.2876430989.00007FF60D070000.00000002.00000001.01000000.0000000B.sdmp, soiucosxz.exe, 0000000D.00000002.2722695776.00007FF60D070000.00000002.00000001.01000000.0000000B.sdmp, soiucosxz.exe, 0000000D.00000000.1969463418.00007FF60D070000.00000002.00000001.01000000.0000000B.sdmp, soiucosxz.exe, 00000011.00000000.2662654047.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000011.00000002.3162868206.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000013.00000000.2718384137.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000013.00000002.2895851602.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000014.00000000.2804109156.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000014.00000002.3150573408.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000017.00000002.3164204207.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000017.00000000.2940163214.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmpString found in binary or memory: https://www.dualitysoft.comversion=/dsclock/?src=abouthttps://www.calendarscope.com/t/dsclock-info?s
                    Source: 62b24530.exe, 00000006.00000003.1386822448.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, 62b24530.exe, 00000006.00000003.1387698113.0000000002847000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.globalsign.com/repository/0
                    Source: cho_mea64.exe, 00000000.00000003.1296126331.00000000031F0000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.exe, 00000000.00000003.1296563735.000000007F75B000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000000.1298384083.0000000000891000.00000020.00000001.01000000.00000004.sdmpString found in binary or memory: https://www.innosetup.com/
                    Source: cho_mea64.exe, 00000000.00000003.1296126331.00000000031F0000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.exe, 00000000.00000003.1296563735.000000007F75B000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000000.1298384083.0000000000891000.00000020.00000001.01000000.00000004.sdmpString found in binary or memory: https://www.remobjects.com/ps
                    Source: soiucosxz.exe, 00000008.00000002.2871732087.000000EF05AF8000.00000004.00000010.00020000.00000000.sdmp, soiucosxz.exe, 0000000D.00000002.2719044114.000000C5AF0F8000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://ziyong.0ray.cn/8FF3EF380313034D8D84BAF59.catC:
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49887
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49863
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49840
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49863 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49981
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49980
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49840 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49935 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49909 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49909
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49958 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49981 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49980 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49958
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49978 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49979 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49935
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49979
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49978
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49887 -> 443

                    System Summary

                    barindex
                    Source: zlibwapi.dll.6.drStatic PE information: section name: .7[D
                    Source: zlibwapi.dll.13.drStatic PE information: section name: .;om
                    Source: zlibwapi.dll.13.drStatic PE information: section name: .j;V
                    Source: zlibwapi.dll.13.drStatic PE information: section name: .$c"
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeCode function: 13_2_0000026878E9AE20 NtDelayExecution,13_2_0000026878E9AE20
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeCode function: 13_2_0000026878E9E5BC NtCreateFile,13_2_0000026878E9E5BC
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile created: C:\Windows\ksxvHQBlSOri\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile created: C:\Windows\ksxvHQBlSOri\soiucosxz.exeJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile created: C:\Windows\ksxvHQBlSOri\app-0.89.2\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile created: C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exeJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile created: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile created: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile created: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\8FF3EF380313034D8D84BAF59.catJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile created: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\zlibwapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile created: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\libcurl.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeCode function: 4_2_00414F304_2_00414F30
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeCode function: 4_2_0040704D4_2_0040704D
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeCode function: 4_2_004240A04_2_004240A0
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeCode function: 4_2_0041E1E04_2_0041E1E0
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeCode function: 4_2_004212C04_2_004212C0
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeCode function: 4_2_004253604_2_00425360
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeCode function: 4_2_004253EC4_2_004253EC
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeCode function: 4_2_004194A94_2_004194A9
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeCode function: 4_2_004266204_2_00426620
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeCode function: 4_2_004226B04_2_004226B0
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeCode function: 4_2_004028664_2_00402866
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeCode function: 4_2_004248E04_2_004248E0
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeCode function: 4_2_0041E9A04_2_0041E9A0
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeCode function: 4_2_00424AB04_2_00424AB0
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeCode function: 4_2_00420CA94_2_00420CA9
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeCode function: 4_2_0041DDB04_2_0041DDB0
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeCode function: 8_3_0000022F198400AA8_3_0000022F198400AA
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeCode function: 8_2_00000001800201088_2_0000000180020108
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeCode function: 8_2_00000001800531408_2_0000000180053140
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeCode function: 13_2_00007FFB0C15100013_2_00007FFB0C151000
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeCode function: 13_2_0000026878E8663A13_2_0000026878E8663A
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeCode function: 13_2_0000026878E845BC13_2_0000026878E845BC
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeCode function: 13_2_0000026878E84E8413_2_0000026878E84E84
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeCode function: String function: 000000018000C000 appears 38 times
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeCode function: String function: 00425A80 appears 186 times
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeCode function: String function: 00403BA5 appears 61 times
                    Source: cho_mea64.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                    Source: 997f54546.exe.4.drStatic PE information: Resource name: B7 type: 7-zip archive data, version 0.4
                    Source: cho_mea64.exeStatic PE information: Number of sections : 11 > 10
                    Source: zlibwapi.dll.6.drStatic PE information: Number of sections : 12 > 10
                    Source: cho_mea64.tmp.0.drStatic PE information: Number of sections : 11 > 10
                    Source: cho_mea64.exe, 00000000.00000003.1296563735.000000007FA4B000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs cho_mea64.exe
                    Source: cho_mea64.exe, 00000000.00000003.1296126331.00000000032FF000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs cho_mea64.exe
                    Source: cho_mea64.exe, 00000000.00000000.1294075932.0000000000139000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs cho_mea64.exe
                    Source: cho_mea64.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: classification engineClassification label: mal76.troj.evad.winEXE@34/26@2/1
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpFile created: C:\Users\user\AppData\Roaming\611641ae7b4c35daJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeMutant created: \Sessions\1\BaseNamedObjects\bcbf6f4
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7584:120:WilError_03
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeMutant created: \BaseNamedObjects\B536033EFBCDD940C17C73E8F319DDFB
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7704:120:WilError_03
                    Source: C:\Users\user\Desktop\cho_mea64.exeFile created: C:\Users\user~1\AppData\Local\Temp\is-89SCA.tmpJump to behavior
                    Source: C:\Users\user\Desktop\cho_mea64.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                    Source: C:\Users\user\Desktop\cho_mea64.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpFile read: C:\Users\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\cho_mea64.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
                    Source: soiucosxz.exeString found in binary or memory: ::/html/tips/addtimeserver.htm
                    Source: C:\Users\user\Desktop\cho_mea64.exeFile read: C:\Users\user\Desktop\cho_mea64.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\cho_mea64.exe "C:\Users\user\Desktop\cho_mea64.exe"
                    Source: C:\Users\user\Desktop\cho_mea64.exeProcess created: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmp "C:\Users\user~1\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmp" /SL5="$20404,20366305,827392,C:\Users\user\Desktop\cho_mea64.exe"
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalService -s W32Time
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpProcess created: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exe "C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exe" -pc0873f648e06c724 -y -o"C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\"
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpProcess created: C:\Users\user\AppData\Roaming\611641ae7b4c35da\62b24530.exe "C:\Users\user\AppData\Roaming\611641ae7b4c35da\62b24530.exe" -p7fe04917 -y -o"C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\"
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\62b24530.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpProcess created: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exe "C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\soiucosxz.exe"
                    Source: unknownProcess created: C:\Windows\System32\cmd.exe cmd /c start "" "C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\soiucosxz.exe" 3aede031690535070f390095f2d2 7824 "C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\"
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exe "C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\soiucosxz.exe" 3aede031690535070f390095f2d2 7824 "C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\"
                    Source: unknownProcess created: C:\Windows\ksxvHQBlSOri\soiucosxz.exe "C:\Windows\ksxvHQBlSOri\soiucosxz.exe"
                    Source: C:\Windows\ksxvHQBlSOri\soiucosxz.exeProcess created: C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exe "C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exe"
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exeProcess created: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe "C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe"
                    Source: unknownProcess created: C:\Windows\System32\cmd.exe cmd /c start "" "C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe" 6c376dd8a 7824 "C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\"
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe "C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe" 6c376dd8a 7824 "C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\"
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeProcess created: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe "C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe" "2fb5d34656b943d916e57e9120"
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeProcess created: C:\Windows\System32\RelPost.exe C:\Windows\system32\RelPost.exe
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeProcess created: C:\Windows\System32\msconfig.exe C:\Windows\system32\msconfig.exe
                    Source: C:\Windows\System32\msconfig.exeProcess created: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe "C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe" bcbf6f4 1876
                    Source: unknownProcess created: C:\Windows\ksxvHQBlSOri\soiucosxz.exe C:\Windows\ksxvHQBlSOri\soiucosxz.exe
                    Source: C:\Windows\ksxvHQBlSOri\soiucosxz.exeProcess created: C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exe "C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exe"
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exeProcess created: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe "C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe"
                    Source: C:\Users\user\Desktop\cho_mea64.exeProcess created: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmp "C:\Users\user~1\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmp" /SL5="$20404,20366305,827392,C:\Users\user\Desktop\cho_mea64.exe" Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpProcess created: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exe "C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exe" -pc0873f648e06c724 -y -o"C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\"Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpProcess created: C:\Users\user\AppData\Roaming\611641ae7b4c35da\62b24530.exe "C:\Users\user\AppData\Roaming\611641ae7b4c35da\62b24530.exe" -p7fe04917 -y -o"C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\"Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpProcess created: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exe "C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\soiucosxz.exe"Jump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exe "C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\soiucosxz.exe" 3aede031690535070f390095f2d2 7824 "C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\"Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\soiucosxz.exeProcess created: C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exe "C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exe" Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exeProcess created: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe "C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe" Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeProcess created: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe "C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe" "2fb5d34656b943d916e57e9120"Jump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe "C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe" 6c376dd8a 7824 "C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\"Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeProcess created: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe "C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe" bcbf6f4 1876Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\soiucosxz.exeProcess created: C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exe "C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exe" Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exeProcess created: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe "C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe" Jump to behavior
                    Source: C:\Users\user\Desktop\cho_mea64.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\cho_mea64.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: iconcodecservice.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: wtsapi32.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: winsta.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: textinputframework.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: coreuicomponents.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: shfolder.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: dwmapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: sfc.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: sfc_os.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: explorerframe.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: dlnashext.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: wpdshext.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: w32time.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: logoncli.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: vmictimeprovider.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: libcurl.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: oledlg.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: zlibwapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: oleacc.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: wtsapi32.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: winsta.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: msimg32.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: dwmapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: napinsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: pnrpnsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: wshbth.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: nlaapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: winrnr.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: napinsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: pnrpnsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: wshbth.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: nlaapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: winrnr.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: devenum.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: devobj.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: msdmo.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: napinsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: pnrpnsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: wshbth.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: nlaapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: winrnr.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: napinsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: pnrpnsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: wshbth.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: nlaapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: winrnr.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: napinsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: pnrpnsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: wshbth.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: nlaapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: winrnr.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: napinsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: pnrpnsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: wshbth.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: nlaapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: winrnr.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: napinsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: pnrpnsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: wshbth.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: nlaapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: winrnr.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: napinsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: pnrpnsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: wshbth.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: nlaapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: winrnr.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: napinsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: pnrpnsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: wshbth.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: nlaapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: winrnr.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: napinsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: pnrpnsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: wshbth.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: nlaapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: winrnr.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: libcurl.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: oledlg.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: zlibwapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: oleacc.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: wtsapi32.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\soiucosxz.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\soiucosxz.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: libcurl.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: oledlg.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: zlibwapi.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: oleacc.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: wtsapi32.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: winsta.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: libcurl.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: oledlg.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: zlibwapi.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: oleacc.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: wtsapi32.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: libcurl.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: oledlg.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: zlibwapi.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: oleacc.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: wtsapi32.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: libcurl.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: oledlg.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: zlibwapi.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: oleacc.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: wtsapi32.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: winsta.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: xmllite.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: msimg32.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: dwmapi.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: napinsp.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: pnrpnsp.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: wshbth.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: nlaapi.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: winrnr.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: napinsp.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: pnrpnsp.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: wshbth.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: nlaapi.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: winrnr.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: devenum.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: devobj.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: msdmo.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\soiucosxz.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: libcurl.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: oledlg.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: zlibwapi.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeSection loaded: oleacc.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                    Source: ? ?.lnk.2.drLNK file: ..\..\user~1\AppData\Local\Temp\805444110049334163191123924\997f54546.exe
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile written: C:\ProgramData\2779096548\config.iniJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpWindow found: window name: TMainFormJump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeWindow detected: Number of UI elements: 15
                    Source: cho_mea64.exeStatic file information: File size 21364502 > 1048576
                    Source: cho_mea64.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Source: Binary string: O:\Projects\DSClock\Releasex64\DSClock.x64.pdb source: 62b24530.exe, 00000006.00000003.1387698113.00000000027A0000.00000004.00001000.00020000.00000000.sdmp, soiucosxz.exe, 00000008.00000000.1390014706.00007FF60D070000.00000002.00000001.01000000.0000000B.sdmp, soiucosxz.exe, 00000008.00000002.2876430989.00007FF60D070000.00000002.00000001.01000000.0000000B.sdmp, soiucosxz.exe, 0000000D.00000002.2722695776.00007FF60D070000.00000002.00000001.01000000.0000000B.sdmp, soiucosxz.exe, 0000000D.00000000.1969463418.00007FF60D070000.00000002.00000001.01000000.0000000B.sdmp, soiucosxz.exe, 00000011.00000000.2662654047.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000011.00000002.3162868206.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000013.00000000.2718384137.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000013.00000002.2895851602.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000014.00000000.2804109156.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000014.00000002.3150573408.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000017.00000002.3164204207.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000017.00000000.2940163214.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp
                    Source: Binary string: C:\b\s\w\ir\cache\builder\src\out\Release\updater.exe.pdb source: 20decf5c428.exe, 00000004.00000003.1362877018.0000000003080000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: C:\Users\paulb\code\Squirrel\squirrel.windows\src\StubExecutable\bin\Release\StubExecutable.pdb source: soiucosxz.exe, 0000000F.00000002.2717694035.0000000000CFD000.00000002.00000001.01000000.00000010.sdmp, soiucosxz.exe, 0000000F.00000000.2661422003.0000000000CFD000.00000002.00000001.01000000.00000010.sdmp, soiucosxz.exe, 00000010.00000000.2661876558.0000000000E9D000.00000002.00000001.01000000.00000011.sdmp, soiucosxz.exe, 00000010.00000002.2718485911.0000000000E9D000.00000002.00000001.01000000.00000011.sdmp
                    Source: Binary string: C:\b\s\w\ir\cache\builder\src\out\Release\updater.exe.pdb source: 20decf5c428.exe, 00000004.00000003.1362877018.0000000003080000.00000004.00001000.00020000.00000000.sdmp
                    Source: initial sampleStatic PE information: section where entry point is pointing to: .O0j
                    Source: libcurl.dll.13.drStatic PE information: real checksum: 0x0 should be: 0x91573
                    Source: libcurl.dll.6.drStatic PE information: real checksum: 0x0 should be: 0x91573
                    Source: zlibwapi.dll.6.drStatic PE information: real checksum: 0x0 should be: 0x331bef
                    Source: zlibwapi.dll.13.drStatic PE information: real checksum: 0x0 should be: 0x1137ca
                    Source: 997f54546.exe.4.drStatic PE information: real checksum: 0x88ceae should be: 0x889dcb
                    Source: cho_mea64.tmp.0.drStatic PE information: real checksum: 0x0 should be: 0x32aa80
                    Source: is-MTGFM.tmp.2.drStatic PE information: real checksum: 0x0 should be: 0x3c00fc
                    Source: cho_mea64.exeStatic PE information: section name: .didata
                    Source: cho_mea64.tmp.0.drStatic PE information: section name: .didata
                    Source: is-MTGFM.tmp.2.drStatic PE information: section name: .sxdata
                    Source: is-9G6TC.tmp.2.drStatic PE information: section name: .sxdata
                    Source: zlibwapi.dll.6.drStatic PE information: section name: .00cfg
                    Source: zlibwapi.dll.6.drStatic PE information: section name: .gxfg
                    Source: zlibwapi.dll.6.drStatic PE information: section name: .retplne
                    Source: zlibwapi.dll.6.drStatic PE information: section name: _RDATA
                    Source: zlibwapi.dll.6.drStatic PE information: section name: .7[D
                    Source: zlibwapi.dll.6.drStatic PE information: section name: .cKM
                    Source: zlibwapi.dll.6.drStatic PE information: section name: .O0j
                    Source: zlibwapi.dll.13.drStatic PE information: section name: .;om
                    Source: zlibwapi.dll.13.drStatic PE information: section name: .j;V
                    Source: zlibwapi.dll.13.drStatic PE information: section name: .$c"
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeCode function: 4_2_00425A80 push eax; ret 4_2_00425A9E
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeCode function: 4_2_00425E10 push eax; ret 4_2_00425E3E
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeCode function: 13_2_00007FFB0C1592B2 pushfq ; ret 13_2_00007FFB0C1592B3
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeCode function: 13_2_00007FFB0C153306 push rcx; retf 13_2_00007FFB0C153307
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeCode function: 13_2_00007FFB0C15339B push rsi; iretd 13_2_00007FFB0C15339C
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeCode function: 13_2_00007FFB0C1533B1 push rsi; iretd 13_2_00007FFB0C1533B2
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeCode function: 13_2_00007FFB0C154408 push B75ACB74h; ret 13_2_00007FFB0C154410
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeCode function: 13_2_00007FFB0C154C40 pushfq ; ret 13_2_00007FFB0C154C41
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeCode function: 13_2_00007FFB0C15903D push 161BD3F5h; ret 13_2_00007FFB0C159042
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeCode function: 13_2_00007FFB0C153883 push rbp; iretd 13_2_00007FFB0C153884
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeCode function: 13_2_00007FFB0C158E83 push rbp; iretd 13_2_00007FFB0C158E84
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeCode function: 13_2_00007FFB0C153A73 push rax; ret 13_2_00007FFB0C153A74
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeCode function: 13_2_0000026878E99716 push eax; iretd 13_2_0000026878E99719
                    Source: zlibwapi.dll.6.drStatic PE information: section name: .text entropy: 7.292688173556342
                    Source: zlibwapi.dll.6.drStatic PE information: section name: .O0j entropy: 7.850898190680083
                    Source: zlibwapi.dll.13.drStatic PE information: section name: .;om entropy: 7.641847913458073
                    Source: zlibwapi.dll.13.drStatic PE information: section name: .$c" entropy: 7.82054052425326

                    Persistence and Installation Behavior

                    barindex
                    Source: C:\Windows\ksxvHQBlSOri\soiucosxz.exeExecutable created and started: C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exeJump to behavior
                    Source: unknownExecutable created and started: C:\Windows\ksxvHQBlSOri\soiucosxz.exe
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exeExecutable created and started: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeFile created: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\997f54546.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpFile created: C:\Users\user\AppData\Roaming\611641ae7b4c35da\is-9G6TC.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile created: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\libcurl.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpFile created: C:\Users\user\AppData\Roaming\611641ae7b4c35da\62b24530.exe (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\62b24530.exeFile created: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeJump to dropped file
                    Source: C:\Users\user\Desktop\cho_mea64.exeFile created: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\62b24530.exeFile created: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\zlibwapi.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile created: C:\Windows\ksxvHQBlSOri\soiucosxz.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpFile created: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exe (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\62b24530.exeFile created: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\libcurl.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile created: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\zlibwapi.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile created: C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile created: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpFile created: C:\Users\user\AppData\Local\Temp\is-KDSFA.tmp\_isetup\_setup64.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpFile created: C:\Users\user\AppData\Roaming\611641ae7b4c35da\is-MTGFM.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpFile created: C:\Users\user\AppData\Local\Temp\is-KDSFA.tmp\_isetup\_isdecmp.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile created: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\libcurl.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile created: C:\Windows\ksxvHQBlSOri\soiucosxz.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile created: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\zlibwapi.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile created: C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile created: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeJump to dropped file
                    Source: C:\Windows\System32\svchost.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\W32Time\ConfigJump to behavior
                    Source: C:\Users\user\Desktop\cho_mea64.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\cho_mea64.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\997f54546.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-KDSFA.tmp\_isetup\_setup64.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-KDSFA.tmp\_isetup\_isdecmp.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeAPI coverage: 6.2 %
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exe TID: 7828Thread sleep count: 71 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exe TID: 7828Thread sleep time: -71000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeLast function: Thread delayed
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeLast function: Thread delayed
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeLast function: Thread delayed
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeLast function: Thread delayed
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeCode function: 4_2_00405A8D FindFirstFileW,4_2_00405A8D
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeCode function: 4_2_0040736E GetSystemInfo,4_2_0040736E
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpFile opened: C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\_isetup\_isdecmp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpFile opened: C:\Users\user~1\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpFile opened: C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpFile opened: C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\_isetup\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpFile opened: C:\Users\user~1\AppData\Local\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpFile opened: C:\Users\user~1\AppData\Jump to behavior
                    Source: cho_mea64.tmp, 00000002.00000003.1392400068.0000000003EFD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: cho_mea64.tmp, 00000002.00000003.1392400068.0000000003EFD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\[[
                    Source: soiucosxz.exe, 00000008.00000002.2871894939.0000022F19741000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll!#%')+-/13579;=?ACEGIKMOQSUWY[]_acegikmoqsuwy{}
                    Source: svchost.exe, 00000003.00000002.3157808852.000001D5AAA32000.00000004.00000020.00020000.00000000.sdmp, soiucosxz.exe, 00000017.00000002.3158393406.0000016090F40000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeSystem information queried: ModuleInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmpProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeProcess queried: DebugObjectHandleJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeCode function: 8_2_0000000180057FB0 GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetCommandLineA,FlsSetValue,GetCurrentThreadId,8_2_0000000180057FB0
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeCode function: 8_2_0000000180051090 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_0000000180051090

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtClose: Indirect: 0x1D9C982E214
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtProtectVirtualMemory: Direct from: 0x7FFB1C985E2AJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeNtQuerySystemInformation: Indirect: 0x22F1D23DD05Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtQueryValueKey: Indirect: 0x16094B8DE76Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtQueryValueKey: Indirect: 0x16094B8DECBJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtOpenKey: Indirect: 0x16094B8E10AJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeNtQueryInformationProcess: Indirect: 0x22F1D23E01BJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeNtClose: Indirect: 0x22F1D23E214
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtQueryInformationProcess: Indirect: 0x1D9C982E01BJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtProtectVirtualMemory: Direct from: 0x7FFB1C98A175Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtClose: Indirect: 0x16094B88BE9
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtQuerySystemInformation: Indirect: 0x16094B8DD05Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtProtectVirtualMemory: Direct from: 0x7FFB1C94E172Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeNtProtectVirtualMemory: Direct from: 0x7FFB0C422237Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeNtProtectVirtualMemory: Direct from: 0x7FFB0C43FF4EJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtDelayExecution: Indirect: 0x16094B8AE7EJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtProtectVirtualMemory: Direct from: 0x7FFB1C9363B7Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeNtProtectVirtualMemory: Direct from: 0x7FFB0C41F127Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtProtectVirtualMemory: Direct from: 0x7FFB1C97D1F5Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeNtOpenKey: Indirect: 0x26878E9E10AJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeNtProtectVirtualMemory: Direct from: 0x7FFB0C42CF6AJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeNtQueryValueKey: Indirect: 0x26878E9DE76Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeNtQueryValueKey: Indirect: 0x26878E9DECBJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtClose: Indirect: 0x1B3076DE214
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeNtProtectVirtualMemory: Direct from: 0x7FFB0C41836BJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtProtectVirtualMemory: Direct from: 0x7FFB1C947BC2Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtProtectVirtualMemory: Direct from: 0x7FFB1C95528DJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtQuerySystemInformation: Indirect: 0x1B3076DDD05Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtQueryInformationProcess: Indirect: 0x1B3076DE01BJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeNtQueryInformationProcess: Indirect: 0x26878E9E01BJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeNtProtectVirtualMemory: Direct from: 0x7FFB0C43FB72Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtCreateThreadEx: Indirect: 0x16094B88BBCJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtClose: Indirect: 0x21D0D38E214
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtQueryInformationProcess: Indirect: 0x21D0DB82E8AJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtQueryInformationProcess: Indirect: 0x21D0D38E01BJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtQueryValueKey: Indirect: 0x1B3076DDE76Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtQueryValueKey: Indirect: 0x1B3076DDECBJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtOpenKey: Indirect: 0x1B3076DE10AJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeNtQueryValueKey: Indirect: 0x22F1D23DE76Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeNtQueryValueKey: Indirect: 0x22F1D23DECBJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeNtProtectVirtualMemory: Direct from: 0x7FFB0C4295BFJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtProtectVirtualMemory: Direct from: 0x7FFB1C92E927Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeNtDelayExecution: Indirect: 0x26878E9AE7EJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeNtProtectVirtualMemory: Direct from: 0x7FFB0C3FD79BJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeNtOpenKey: Indirect: 0x22F1D23E10AJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtQueryInformationProcess: Indirect: 0x16094B8E01BJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtDelayExecution: Indirect: 0x1D9C982AE7EJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtQueryValueKey: Indirect: 0x1D9C982DE76Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtQueryValueKey: Indirect: 0x1D9C982DECBJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtDelayExecution: Indirect: 0x21D0D38AE7EJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtOpenKey: Indirect: 0x1D9C982E10AJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtOpenKey: Indirect: 0x21D0D38E10AJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeNtClose: Indirect: 0x26878E9E214
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtClose: Indirect: 0x16094B8E214
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeNtCreateFile: Indirect: 0x26878E9E611Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtProtectVirtualMemory: Direct from: 0x7FFB1C98678AJump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtQueryValueKey: Indirect: 0x21D0D38DE76Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exeNtQueryValueKey: Indirect: 0x21D0D38DECBJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exe "C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\soiucosxz.exe" 3aede031690535070f390095f2d2 7824 "C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\"Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\soiucosxz.exeProcess created: C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exe "C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exe" Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exeProcess created: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe "C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe" Jump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe "C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe" 6c376dd8a 7824 "C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\"Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\soiucosxz.exeProcess created: C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exe "C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exe" Jump to behavior
                    Source: C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exeProcess created: C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe "C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe" Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeCode function: 4_2_00426100 cpuid 4_2_00426100
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeCode function: GetLocaleInfoA,8_2_00000001800610E0
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeCode function: 4_2_00407455 GetSystemTimeAsFileTime,4_2_00407455
                    Source: C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exeCode function: 4_2_00426040 GetVersion,4_2_00426040
                    Source: C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: soiucosxz.exe, 00000008.00000002.2871732087.000000EF05AE1000.00000004.00000010.00020000.00000000.sdmp, soiucosxz.exe, 00000017.00000002.3157435411.000000166BCE2000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: 360Tray.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 23.2.soiucosxz.exe.16095bb0000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.soiucosxz.exe.22f1e420000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.soiucosxz.exe.22f1e420000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 23.2.soiucosxz.exe.16095bb0000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000002.2875747667.0000022F1E420000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000002.3163426099.0000016095BB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000002.3163647071.0000016095E11000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2875896834.0000022F1E681000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: soiucosxz.exe PID: 7824, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: soiucosxz.exe PID: 2384, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 23.2.soiucosxz.exe.16095bb0000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.soiucosxz.exe.22f1e420000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.soiucosxz.exe.22f1e420000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 23.2.soiucosxz.exe.16095bb0000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000002.2875747667.0000022F1E420000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000002.3163426099.0000016095BB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000002.3163647071.0000016095E11000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2875896834.0000022F1E681000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: soiucosxz.exe PID: 7824, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: soiucosxz.exe PID: 2384, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire Infrastructure1
                    Replication Through Removable Media
                    2
                    Command and Scripting Interpreter
                    1
                    Windows Service
                    1
                    Windows Service
                    121
                    Masquerading
                    OS Credential Dumping1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    12
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Scheduled Task/Job
                    1
                    Scheduled Task/Job
                    11
                    Process Injection
                    2
                    Virtualization/Sandbox Evasion
                    LSASS Memory131
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable Media1
                    Non-Application Layer Protocol
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAt1
                    DLL Side-Loading
                    1
                    Scheduled Task/Job
                    11
                    Process Injection
                    Security Account Manager2
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive2
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                    Abuse Elevation Control Mechanism
                    1
                    Deobfuscate/Decode Files or Information
                    NTDS1
                    Process Discovery
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
                    DLL Side-Loading
                    1
                    Abuse Elevation Control Mechanism
                    LSA Secrets11
                    Peripheral Device Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
                    Obfuscated Files or Information
                    Cached Domain Credentials2
                    System Owner/User Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Software Packing
                    DCSync4
                    File and Directory Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    DLL Side-Loading
                    Proc Filesystem27
                    System Information Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1559669 Sample: cho_mea64.exe Startdate: 20/11/2024 Architecture: WINDOWS Score: 76 86 time.windows.com 2->86 88 boss.google.tw.cn 2->88 96 Multi AV Scanner detection for dropped file 2->96 98 Yara detected MicroClip 2->98 100 Machine Learning detection for dropped file 2->100 102 3 other signatures 2->102 11 cho_mea64.exe 2 2->11         started        14 cmd.exe 2->14         started        16 soiucosxz.exe 2->16         started        18 3 other processes 2->18 signatures3 process4 file5 84 C:\Users\user\AppData\Local\...\cho_mea64.tmp, PE32 11->84 dropped 21 cho_mea64.tmp 5 10 11->21         started        24 soiucosxz.exe 9 14->24         started        27 soiucosxz.exe 16->27         started        92 Drops executables to the windows directory (C:\Windows) and starts them 18->92 29 soiucosxz.exe 18->29         started        31 soiucosxz.exe 18->31         started        signatures6 process7 file8 68 C:\Users\user\AppData\...\is-MTGFM.tmp, PE32 21->68 dropped 70 C:\Users\user\AppData\...\is-9G6TC.tmp, PE32 21->70 dropped 72 C:\Users\user\AppData\...\62b24530.exe (copy), PE32 21->72 dropped 80 3 other files (2 malicious) 21->80 dropped 33 62b24530.exe 5 21->33         started        36 soiucosxz.exe 1 3 21->36         started        40 20decf5c428.exe 3 21->40         started        74 C:\Windows\ksxvHQBlSOri\soiucosxz.exe, PE32 24->74 dropped 76 C:\Windows\ksxvHQBlSOri\...\soiucosxz.exe, PE32 24->76 dropped 78 C:\Windows\ksxvHQBlSOri\...\zlibwapi.dll, PE32+ 24->78 dropped 82 2 other malicious files 24->82 dropped 106 Found direct / indirect Syscall (likely to bypass EDR) 24->106 42 soiucosxz.exe 27->42         started        108 Drops executables to the windows directory (C:\Windows) and starts them 29->108 44 soiucosxz.exe 29->44         started        signatures9 process10 dnsIp11 60 C:\Users\user\AppData\Local\...\zlibwapi.dll, PE32+ 33->60 dropped 62 C:\Users\user\AppData\Local\...\soiucosxz.exe, PE32+ 33->62 dropped 64 C:\Users\user\AppData\Local\...\libcurl.dll, PE32+ 33->64 dropped 46 conhost.exe 33->46         started        90 boss.google.tw.cn 8.210.144.166, 443, 49840, 49863 CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC Singapore 36->90 66 C:\Users\user\AppData\Local\...\997f54546.exe, PE32 40->66 dropped 48 conhost.exe 40->48         started        104 Found direct / indirect Syscall (likely to bypass EDR) 42->104 50 soiucosxz.exe 42->50         started        file12 signatures13 process14 signatures15 94 Found direct / indirect Syscall (likely to bypass EDR) 50->94 53 msconfig.exe 50->53         started        55 RelPost.exe 50->55         started        process16 process17 57 soiucosxz.exe 2 53->57         started        signatures18 110 Found direct / indirect Syscall (likely to bypass EDR) 57->110

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    cho_mea64.exe0%ReversingLabs
                    SourceDetectionScannerLabelLink
                    C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\zlibwapi.dll100%Joe Sandbox ML
                    C:\Users\user\AppData\Local\Temp\805444110049334163191123924\997f54546.exe0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\805444110049334163191123924\libcurl.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exe0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\805444110049334163191123924\zlibwapi.dll45%ReversingLabsWin64.Trojan.Midie
                    C:\Users\user\AppData\Local\Temp\is-KDSFA.tmp\_isetup\_isdecmp.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\is-KDSFA.tmp\_isetup\_setup64.tmp0%ReversingLabs
                    C:\Users\user\AppData\Roaming\611641ae7b4c35da\62b24530.exe (copy)0%ReversingLabs
                    C:\Users\user\AppData\Roaming\611641ae7b4c35da\is-9G6TC.tmp0%ReversingLabs
                    C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\libcurl.dll0%ReversingLabs
                    C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe0%ReversingLabs
                    C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\zlibwapi.dll5%ReversingLabs
                    C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exe0%ReversingLabs
                    C:\Windows\ksxvHQBlSOri\soiucosxz.exe0%ReversingLabs
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://www.dualitysoft.comversion=/dsclock/?src=abouthttps://www.calendarscope.com/t/dsclock-info?s0%Avira URL Cloudsafe
                    https://ziyong.0ray.cn/8FF3EF380313034D8D84BAF59.catC:0%Avira URL Cloudsafe
                    http://crl.usertr0%Avira URL Cloudsafe
                    https://www.dualitysoft.com/dsclock/0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    boss.google.tw.cn
                    8.210.144.166
                    truefalse
                      unknown
                      time.windows.com
                      unknown
                      unknownfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://html4/loose.dtd20decf5c428.exe, 00000004.00000003.1362877018.0000000003080000.00000004.00001000.00020000.00000000.sdmpfalse
                          high
                          https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUcho_mea64.exe, 00000000.00000000.1293880766.0000000000081000.00000020.00000001.01000000.00000003.sdmpfalse
                            high
                            https://crashpad.chromium.org/20decf5c428.exe, 00000004.00000003.1362765577.0000000002A40000.00000004.00001000.00020000.00000000.sdmpfalse
                              high
                              https://sectigo.com/CPS0cho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmpfalse
                                high
                                http://repository.certum.pl/ctnca.cer09cho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000003.1300096518.0000000003A40000.00000004.00001000.00020000.00000000.sdmpfalse
                                  high
                                  http://repository.certum.pl/cscasha2.cer0cho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000003.1300096518.0000000003A40000.00000004.00001000.00020000.00000000.sdmpfalse
                                    high
                                    http://ocsp.sectigo.com0cho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000003.1300096518.0000000003A40000.00000004.00001000.00020000.00000000.sdmpfalse
                                      high
                                      http://crl.certum.pl/ctnca.crl0kcho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000003.1300096518.0000000003A40000.00000004.00001000.00020000.00000000.sdmpfalse
                                        high
                                        https://crashpad.chromium.org/bug/new20decf5c428.exe, 00000004.00000003.1362765577.0000000002A40000.00000004.00001000.00020000.00000000.sdmpfalse
                                          high
                                          http://crl.usertrcho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://schemas.microsoft.csoiucosxz.exefalse
                                            high
                                            https://www.certum.pl/CPS0cho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000003.1300096518.0000000003A40000.00000004.00001000.00020000.00000000.sdmpfalse
                                              high
                                              http://.css20decf5c428.exe, 00000004.00000003.1362877018.0000000003080000.00000004.00001000.00020000.00000000.sdmpfalse
                                                high
                                                https://crashpad.chromium.org/https://crashpad.chromium.org/bug/new20decf5c428.exe, 00000004.00000003.1362765577.0000000002A40000.00000004.00001000.00020000.00000000.sdmpfalse
                                                  high
                                                  http://crl.certum.pl/cscasha2.crl0qcho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000003.1300096518.0000000003A40000.00000004.00001000.00020000.00000000.sdmpfalse
                                                    high
                                                    https://curl.haxx.se/docs/http-cookies.htmlsoiucosxz.exe, soiucosxz.exe, 00000008.00000002.2871655677.0000000180065000.00000002.00000001.01000000.0000000C.sdmp, soiucosxz.exe, 0000000D.00000002.2718786621.0000000180065000.00000002.00000001.01000000.0000000C.sdmp, soiucosxz.exe, 00000011.00000002.3157216682.0000000180065000.00000002.00000001.01000000.00000013.sdmp, soiucosxz.exe, 00000013.00000002.2887401716.0000000180065000.00000002.00000001.01000000.00000013.sdmp, soiucosxz.exe, 00000014.00000002.3140615540.0000000180065000.00000002.00000001.01000000.00000013.sdmp, soiucosxz.exe, 00000017.00000002.3157216771.0000000180065000.00000002.00000001.01000000.00000013.sdmpfalse
                                                      high
                                                      http://cscasha2.ocsp-certum.com04cho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000003.1300096518.0000000003A40000.00000004.00001000.00020000.00000000.sdmpfalse
                                                        high
                                                        http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tcho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000003.1300096518.0000000003A40000.00000004.00001000.00020000.00000000.sdmpfalse
                                                          high
                                                          https://www.dualitysoft.com/dsclock/62b24530.exe, 00000006.00000003.1387698113.00000000027A0000.00000004.00001000.00020000.00000000.sdmp, soiucosxz.exe, soiucosxz.exe, 00000008.00000002.2876579041.00007FF60D102000.00000002.00000001.01000000.0000000B.sdmp, soiucosxz.exe, 0000000D.00000000.1970016412.00007FF60D102000.00000002.00000001.01000000.0000000B.sdmp, soiucosxz.exe, 00000011.00000000.2662735613.00007FF77EFE2000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000013.00000000.2718504010.00007FF77EFE2000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000014.00000002.3151733980.00007FF77EFE2000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000017.00000000.2940238119.00007FF77EFE2000.00000002.00000001.01000000.00000012.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://m.google.com/devicemanagement/data/api20decf5c428.exe, 00000004.00000003.1362765577.0000000002A40000.00000004.00001000.00020000.00000000.sdmpfalse
                                                            high
                                                            https://www.remobjects.com/pscho_mea64.exe, 00000000.00000003.1296126331.00000000031F0000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.exe, 00000000.00000003.1296563735.000000007F75B000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000000.1298384083.0000000000891000.00000020.00000001.01000000.00000004.sdmpfalse
                                                              high
                                                              http://crt.sectigo.com/Sectigcho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                high
                                                                http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#cho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000003.1300096518.0000000003A40000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://curl.haxx.se/docs/copyright.htmlDsoiucosxz.exe, 00000008.00000002.2871706526.0000000180085000.00000002.00000001.01000000.0000000C.sdmp, soiucosxz.exe, 0000000D.00000002.2719010918.0000000180085000.00000002.00000001.01000000.0000000C.sdmp, soiucosxz.exe, 00000011.00000002.3157360807.0000000180085000.00000002.00000001.01000000.00000013.sdmp, soiucosxz.exe, 00000013.00000002.2887804207.0000000180085000.00000002.00000001.01000000.00000013.sdmp, soiucosxz.exe, 00000014.00000002.3140670968.0000000180085000.00000002.00000001.01000000.00000013.sdmp, soiucosxz.exe, 00000017.00000002.3157366347.0000000180085000.00000002.00000001.01000000.00000013.sdmpfalse
                                                                    high
                                                                    https://dl.google.com/update2/installers/icons/20decf5c428.exe, 00000004.00000003.1362765577.0000000002A40000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://subca.ocsp-certum.com01cho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000003.1300096518.0000000003A40000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://support.google.com/installer/20decf5c428.exe, 00000004.00000003.1362765577.0000000002A40000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://curl.haxx.se/Vsoiucosxz.exe, 00000008.00000002.2871706526.0000000180085000.00000002.00000001.01000000.0000000C.sdmp, soiucosxz.exe, 0000000D.00000002.2719010918.0000000180085000.00000002.00000001.01000000.0000000C.sdmp, soiucosxz.exe, 00000011.00000002.3157360807.0000000180085000.00000002.00000001.01000000.00000013.sdmp, soiucosxz.exe, 00000013.00000002.2887804207.0000000180085000.00000002.00000001.01000000.00000013.sdmp, soiucosxz.exe, 00000014.00000002.3140670968.0000000180085000.00000002.00000001.01000000.00000013.sdmp, soiucosxz.exe, 00000017.00000002.3157366347.0000000180085000.00000002.00000001.01000000.00000013.sdmpfalse
                                                                            high
                                                                            https://www.innosetup.com/cho_mea64.exe, 00000000.00000003.1296126331.00000000031F0000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.exe, 00000000.00000003.1296563735.000000007F75B000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000000.1298384083.0000000000891000.00000020.00000001.01000000.00000004.sdmpfalse
                                                                              high
                                                                              https://sectigo.com/CPS0Dcho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000003.1300096518.0000000003A40000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://support.google.com/installer/%s?product=%s&error=%d20decf5c428.exe, 00000004.00000003.1362765577.0000000002A40000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://ziyong.0ray.cn/8FF3EF380313034D8D84BAF59.catC:soiucosxz.exe, 00000008.00000002.2871732087.000000EF05AF8000.00000004.00000010.00020000.00000000.sdmp, soiucosxz.exe, 0000000D.00000002.2719044114.000000C5AF0F8000.00000004.00000010.00020000.00000000.sdmpfalse
                                                                                  • Avira URL Cloud: safe
                                                                                  unknown
                                                                                  https://jrsoftware.org0cho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000003.1300096518.0000000003A40000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://jrsoftware.org/cho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000003.1300096518.0000000003A40000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://www.dualitysoft.comversion=/dsclock/?src=abouthttps://www.calendarscope.com/t/dsclock-info?s62b24530.exe, 00000006.00000003.1386822448.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, soiucosxz.exe, 00000008.00000000.1390014706.00007FF60D070000.00000002.00000001.01000000.0000000B.sdmp, soiucosxz.exe, 00000008.00000002.2876430989.00007FF60D070000.00000002.00000001.01000000.0000000B.sdmp, soiucosxz.exe, 0000000D.00000002.2722695776.00007FF60D070000.00000002.00000001.01000000.0000000B.sdmp, soiucosxz.exe, 0000000D.00000000.1969463418.00007FF60D070000.00000002.00000001.01000000.0000000B.sdmp, soiucosxz.exe, 00000011.00000000.2662654047.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000011.00000002.3162868206.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000013.00000000.2718384137.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000013.00000002.2895851602.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000014.00000000.2804109156.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000014.00000002.3150573408.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000017.00000002.3164204207.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmp, soiucosxz.exe, 00000017.00000000.2940163214.00007FF77EF50000.00000002.00000001.01000000.00000012.sdmpfalse
                                                                                      • Avira URL Cloud: safe
                                                                                      unknown
                                                                                      http://.jpg20decf5c428.exe, 00000004.00000003.1362877018.0000000003080000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        http://www.certum.pl/CPS0cho_mea64.tmp, 00000002.00000003.1394142081.0000000002A10000.00000004.00001000.00020000.00000000.sdmp, cho_mea64.tmp, 00000002.00000003.1300096518.0000000003A40000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          https://curl.haxx.se/docs/copyright.htmlsoiucosxz.exefalse
                                                                                            high
                                                                                            https://curl.haxx.se/soiucosxz.exefalse
                                                                                              high
                                                                                              • No. of IPs < 25%
                                                                                              • 25% < No. of IPs < 50%
                                                                                              • 50% < No. of IPs < 75%
                                                                                              • 75% < No. of IPs
                                                                                              IPDomainCountryFlagASNASN NameMalicious
                                                                                              8.210.144.166
                                                                                              boss.google.tw.cnSingapore
                                                                                              45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCfalse
                                                                                              Joe Sandbox version:41.0.0 Charoite
                                                                                              Analysis ID:1559669
                                                                                              Start date and time:2024-11-20 20:14:32 +01:00
                                                                                              Joe Sandbox product:CloudBasic
                                                                                              Overall analysis duration:0h 10m 51s
                                                                                              Hypervisor based Inspection enabled:false
                                                                                              Report type:full
                                                                                              Cookbook file name:default.jbs
                                                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                              Run name:Run with higher sleep bypass
                                                                                              Number of analysed new started processes analysed:28
                                                                                              Number of new started drivers analysed:0
                                                                                              Number of existing processes analysed:0
                                                                                              Number of existing drivers analysed:0
                                                                                              Number of injected processes analysed:0
                                                                                              Technologies:
                                                                                              • HCA enabled
                                                                                              • EGA enabled
                                                                                              • AMSI enabled
                                                                                              Analysis Mode:default
                                                                                              Analysis stop reason:Timeout
                                                                                              Sample name:cho_mea64.exe
                                                                                              Detection:MAL
                                                                                              Classification:mal76.troj.evad.winEXE@34/26@2/1
                                                                                              EGA Information:
                                                                                              • Successful, ratio: 100%
                                                                                              HCA Information:
                                                                                              • Successful, ratio: 56%
                                                                                              • Number of executed functions: 89
                                                                                              • Number of non-executed functions: 63
                                                                                              Cookbook Comments:
                                                                                              • Found application associated with file extension: .exe
                                                                                              • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                                                              • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe
                                                                                              • Excluded IPs from analysis (whitelisted): 40.81.94.65
                                                                                              • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, twc.trafficmanager.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                              • Not all processes where analyzed, report is missing behavior information
                                                                                              • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                              • VT rate limit hit for: cho_mea64.exe
                                                                                              TimeTypeDescription
                                                                                              21:20:11Task SchedulerRun new task: MicrosoftEdgeUpdateUserUFN{69109F0E-2C27-205E-D36D-A4AFA4F8FD0F} path: C:\Windows\ksxvHQBlSOri\soiucosxz.exe
                                                                                              No context
                                                                                              No context
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCmal.jsGet hashmaliciousUnknownBrowse
                                                                                              • 8.209.119.17
                                                                                              m68k.elfGet hashmaliciousMiraiBrowse
                                                                                              • 47.242.96.185
                                                                                              DOC_114542366.vbeGet hashmaliciousFormBookBrowse
                                                                                              • 47.254.140.255
                                                                                              PHA AL PO.exeGet hashmaliciousFormBookBrowse
                                                                                              • 47.52.221.8
                                                                                              mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                              • 47.241.54.126
                                                                                              https://fixedzip.oss-ap-southeast-5.aliyuncs.com/replace.txtGet hashmaliciousUnknownBrowse
                                                                                              • 149.129.200.56
                                                                                              https://experteau.lawgovexperts.com/Fp0c8/Get hashmaliciousUnknownBrowse
                                                                                              • 147.139.142.100
                                                                                              Play_vm_Message_for_Melissa.medina_wav_ .htmGet hashmaliciousHTMLPhisher, Mamba2FABrowse
                                                                                              • 198.11.172.91
                                                                                              Order No 24.exeGet hashmaliciousFormBookBrowse
                                                                                              • 47.242.89.146
                                                                                              No context
                                                                                              No context
                                                                                              Process:C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):88
                                                                                              Entropy (8bit):5.005870220930083
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Ms0H9xjrmZ6mw360hC1QUlljW0U013gM9:MsY9BrYG60hCaUTjQM9
                                                                                              MD5:DBBAFF9B3EF28EBAA4CB1CB5FDA1BB84
                                                                                              SHA1:28C967208DFD24A62ADECD2545ED38A89094CCE9
                                                                                              SHA-256:1B5B6D490FA8F919398B4ACC6C12ACEA383B400A4741A47434E6B945D483D049
                                                                                              SHA-512:4C2801A9A0283144F4670807E4E235011D99C84DBBD987BF31D3A1CC6619A57C45FC59C7D99F00948051262873EA681977430D47AABE812C9ADA9A6FA49C107F
                                                                                              Malicious:false
                                                                                              Preview:.._ #M.Z[#*&.Z*'..3I..3#.!.h...._......__h....._Q,Q....R..5S....h......._.[!T..__h....._
                                                                                              Process:C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):88
                                                                                              Entropy (8bit):5.005870220930083
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Ms0H9xjrmZ6mw360hC1QUlljW0U013gM9:MsY9BrYG60hCaUTjQM9
                                                                                              MD5:DBBAFF9B3EF28EBAA4CB1CB5FDA1BB84
                                                                                              SHA1:28C967208DFD24A62ADECD2545ED38A89094CCE9
                                                                                              SHA-256:1B5B6D490FA8F919398B4ACC6C12ACEA383B400A4741A47434E6B945D483D049
                                                                                              SHA-512:4C2801A9A0283144F4670807E4E235011D99C84DBBD987BF31D3A1CC6619A57C45FC59C7D99F00948051262873EA681977430D47AABE812C9ADA9A6FA49C107F
                                                                                              Malicious:false
                                                                                              Preview:.._ #M.Z[#*&.Z*'..3I..3#.!.h...._......__h....._Q,Q....R..5S....h......._.[!T..__h....._
                                                                                              Process:C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):520
                                                                                              Entropy (8bit):0.24111431133564631
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Nldlpkl1Xlkl/:NLkl
                                                                                              MD5:061314D610CD56E687963F639197854C
                                                                                              SHA1:33D076D2F9439EFA5DD5CC080B14D7E38B941008
                                                                                              SHA-256:7244CD5F232967E300C7659D6CB524A2225AF4222E80CEB75BA760F20B57928B
                                                                                              SHA-512:8850FE0840734FE62A2FC0A7B7335612657DFD3D4F0897D87B609BB840235523BAC35D0BD1655D64DE68C3FBDEDEE2ED68A0430BBE5F2F51C26D861EED521F97
                                                                                              Malicious:false
                                                                                              Preview:k.s.x.v.H.Q.B.l.S.O.r.i.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Users\user\AppData\Roaming\611641ae7b4c35da\62b24530.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):11445507
                                                                                              Entropy (8bit):7.999981572974584
                                                                                              Encrypted:true
                                                                                              SSDEEP:196608:Bdy9J3T1sQEnoawHdANsgUWtfDoExrNhgGdsibxilGbfH/K7fCsciYNWLV5Koa:uDx/EKONsg5LokrNhg8siJfAascKL/a
                                                                                              MD5:9EA898B2095B6F751B020C3E294F2482
                                                                                              SHA1:09380F3924A961C7899B4BFA5F5F91515F9221A5
                                                                                              SHA-256:3C0A526440055C1140CD62D1942C5035BB378B99C6F48F7DEC0207E4791FA8E1
                                                                                              SHA-512:E6A01F7D5E45AD65988B81107F10C15BCE37221EF1DA1D890FE2D1453EFC8C1C2B33FD5DE6C51BD72E18E9286C0FF06BD55D7FE2F068324AA15B0D34353476C5
                                                                                              Malicious:false
                                                                                              Preview:..>.'.<...Z...G...H......>.........M:.....l!?JU..{.....ooo.dooxcoo...of....YKOoooooooo-X][+WW\.X_\V-)]WWV..V^V_-YoooooooooooooooooooooooooooooooooH..(H...$........H..(.@UATH.l$.H..h...D..H..$`...L..3.I..$eH..%`...L.d$PH.H.H......H.A0.x8....t H..H..u.....H..$`...H..h...A\].H.X.H..u..C.H..$`...H..h...A\].HcC<H..$P...D.......L..A.H H..A9P.........H..H......H.......8GuuH.......x.euhH.......x.tu[H.......x.PuNH.......x.ruAH.......x.ou4H.......x.cu'H.......x.Au.H.......x.du.H.......x.dt...H...A;P...c.........V...A.@$Hc.H.....HA.@.H....<.H..H.}.t..E.L.E.o.E.a.E.d.E.L.E.i.E.b.E.r.E.a.E.r.E.y.E.AH.U.H...E..H..$X.....H..H.E.H..u..F.......D$pV.D$qi.D$rr.D$st.D$tu.D$ua.D$vl.D$wA.D$xl.D$yl.D$zo.D${cH.T$pH...D$|.L..$@.....L..H..u.A.F..g....D$XV.D$Yi.D$Zr.D$[t.D$\u.D$]a.D$^l.D$_F.D$`r.D$ae.D$beH.T$XH...D$c...H.E.H..u............E.n.E.t.E.d.E.l.E.l.E...E.d.E.l.E.lH.M..E....H..H..u..C.......E.m.E.e.E.m.E.c.E.p.E.yH.U.H...E..L..$H.....L..H..u.A.E......D$0R.D$1t.D$2l.D$3D.D$4e.D$5c.D$6o.D$7m.D$8p.D$9r
                                                                                              Process:C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):8950664
                                                                                              Entropy (8bit):6.782867173374691
                                                                                              Encrypted:false
                                                                                              SSDEEP:196608:ILX8vpjby5OkoeYX706eGQ7WWbf6otLwGwP55ar9kCmlwe1Xf/Ohz2+K:IIvxy58eYX37Q7WWbf5L+5Mr9k3d1XfJ
                                                                                              MD5:F37C52156F0782A8396B5E95C3960363
                                                                                              SHA1:6E1F3D27AAC555EDBE5C83CFCDB6050E911BF937
                                                                                              SHA-256:A6C7D50A959DCA5684D84C700C9A74591DB7BEF08F516EE15DF4C05A9F675F5B
                                                                                              SHA-512:25CC70A70AEE6E8E041A6D1DFB1CFAE7796A6C86F5A29B250C4342B51EBCFD2724120CC33CC7E6BFE60EE4E7F91A8BA7B9EB2B95C0FFD87C4DF875C76C74C980
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                              Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....f..........".......+..^\...................@......................................@...........................4.U...D.4.,.....6.X.Q..........J...I...p...O....4.......................4.....h.,.............0.4..............................text.....+.......+................. ..`.rdata...4....,..6....+.............@..@.data........@5..N..."5.............@....tls..........6......p5.............@....rsrc...X.Q...6...Q..r5.............@..@.reloc...O...p...P..................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Users\user\AppData\Roaming\611641ae7b4c35da\62b24530.exe
                                                                                              File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):569856
                                                                                              Entropy (8bit):6.3225742404603045
                                                                                              Encrypted:false
                                                                                              SSDEEP:12288:MoLVDsDp3Sx8rKASzlbMZO/IR+nyu20jlTov3+:35DEsxl6O/IRUT6
                                                                                              MD5:6B2548CC404F3DD55634EFA291FA98D0
                                                                                              SHA1:A076A60D99D70FD8AA7664A2534445A502FEBE27
                                                                                              SHA-256:7AE384B8695D7A9C2B6640927CB6AC592229AEF9EBEEB80B91D556777C6DFB5D
                                                                                              SHA-512:14068E9E7D5F7E4494FFA75D369068234CDB050286D3356298E0387CF13D7681C0D68B57B6B299958C86EE3AE1DC3E54ADC4C376E7B869D7D76FC2E91ED95009
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........O...O...O......I...9+..N...9+..E...O......9+..D...9+..]...hp..N...9+..N...hp..N...RichO...........................PE..d...C..Y.........." .....@.......................................................................................................... ...........x........B...P...U...................................................................P...............................text...N>.......@.................. ..`.rdata..%....P.......D..............@..@.data....;..........................@....pdata...U...P...V..................@..@.rsrc....B.......D...b..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................
                                                                                              Process:C:\Users\user\AppData\Roaming\611641ae7b4c35da\62b24530.exe
                                                                                              File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):2324480
                                                                                              Entropy (8bit):6.283900113727005
                                                                                              Encrypted:false
                                                                                              SSDEEP:24576:GmKWcYmmUMlLklbOEyeeQaSpRnO9xGboTOLFI78hqT3tiBco21c6D5mHK+iwu7:Gm/mmUiLklb6e+YMDGaAhIt5o2WqmFXM
                                                                                              MD5:6CF29DBF1FA710CCCF6BA1C4C01F6B85
                                                                                              SHA1:A1DEBDB076C8C655E3D78C6AE82F1BEBA386A2BA
                                                                                              SHA-256:F85CE4492E1354F8310027C5F70EF73AAE654FCD8FD9A58034E4F82A41A9826B
                                                                                              SHA-512:EBCC6599C33A80BB3E5C627A5F861FC9742D8558C4551544109288F80155885791A3F701AF1AA7A4513CC5D121B77678A4CD46CA38A7BDD3CF7288E58E01F4F5
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........Z...Z...Z....=x.X...S.0.S...S.7.X...S.4.[....<}......<~.V....<|.....}<..X...S. .}...Z........=|......=z.[....=..[...RichZ...........................PE..d....nZd..........".................H..........@..............................#......#$...`..........................................................` ...... ...7....#..\...P#.pY......8...............................p.......................@....................text...s........................... ..`.rdata..V4.......6..................@..@.data........@...l... ..............@....pdata...7... ...8..................@..@.rsrc........` .....................@..@.reloc..^m...P#..n....".............@..B........................................................................................................................................................................................................................
                                                                                              Process:C:\Users\user\AppData\Roaming\611641ae7b4c35da\62b24530.exe
                                                                                              File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):3286528
                                                                                              Entropy (8bit):7.886298903522483
                                                                                              Encrypted:false
                                                                                              SSDEEP:98304:odsKtTlGQeqm5GcKQ4ZNMV2VYPE22RXiU7T:o3TEQeqcX4PMVzmRvv
                                                                                              MD5:4D05D940FA3851C6322F11463F76FB85
                                                                                              SHA1:5502F7BF7BDAED6861044CB34CFF08656C963775
                                                                                              SHA-256:01F062FA5F11AEBF8C2CD57FC148C3B4B1A64E97DCF68194C0545361973D6E94
                                                                                              SHA-512:5CF57118E70228AFAD77368277BD2FC8DE71172D9317B44B2147E68DD8DCBFAF3DCC052FCDF430870484EF281FFDDBEAEF96A9D00ACB8DE29B0D03BBA01AE34C
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 45%
                                                                                              Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d....*g.........." ..................*......................................`2...........`.................................................8.0.d............$2.h.....1..\...P2.$....................................#2.@.............).h............................text............................... ..`.rdata....... ......................@..@.data....#..........................@....pdata..............................@..@.00cfg..8....0......................@..@.gxfg........@......................@..@.retplne.....`.........................._RDATA.......p......................@..@.7[D.....1$......2$................. ..`.cKM....h.....)......@).............@....O0j....Xq....)..r...H).............`..h.reloc..$....P2.......1.............@..B........................................................................................................................................
                                                                                              Process:C:\Users\user\Desktop\cho_mea64.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                              Category:modified
                                                                                              Size (bytes):3317248
                                                                                              Entropy (8bit):6.606044750890488
                                                                                              Encrypted:false
                                                                                              SSDEEP:49152:tdJYVM+9JtzZWnoS2VC23aun8+f5KuG2OY9IG9ivyv2cLx1RQG333rh1x:jJYVM+LtVt3P/KuG2ONG9iqLRQG333Nb
                                                                                              MD5:DC63A4763A59D647C3D0C4480EAE0329
                                                                                              SHA1:8D687E717ACE0D7D83A1EAA1C5B9EAEC168744E7
                                                                                              SHA-256:6B9AB11E1A2A79B1A3D211422AC1E603578E7BCABA2917747D57CF8BEDAC238F
                                                                                              SHA-512:39069E76DEE870831E1240315F61A9060920AB2DE85D1FEC0D789EEE8882E204414E0934681132EBBC5322D674B068471043859CCBDB869FB62BFA6FC5B741EB
                                                                                              Malicious:true
                                                                                              Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....f..................*...........*.......*...@..........................p3...........@......@...................P,.n.....,.j:...P0.......................,.<............................p,.......................,......@,.(....................text.....*.......*................. ..`.itext..$.....*..0....*............. ..`.data.........*.......*.............@....bss.....|....+..........................idata..j:....,..<...f+.............@....didata.(....@,.......+.............@....edata..n....P,.......+.............@..@.tls....X....`,..........................rdata..]....p,.......+.............@..@.reloc..<.....,.......+.............@..B.rsrc........P0......./.............@..@.............04......`3.............@..@................
                                                                                              Process:C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmp
                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):35616
                                                                                              Entropy (8bit):6.953519176025623
                                                                                              Encrypted:false
                                                                                              SSDEEP:768:Z4NHPfHCs6GNOpiM+RFjFyzcN23A4F+OiR9riuujF+X4UriXiRF:Zanvc+R9F4s8/RiPWuUs4UWXiv
                                                                                              MD5:C6AE924AD02500284F7E4EFA11FA7CFC
                                                                                              SHA1:2A7770B473B0A7DC9A331D017297FF5AF400FED8
                                                                                              SHA-256:31D04C1E4BFDFA34704C142FA98F80C0A3076E4B312D6ADA57C4BE9D9C7DCF26
                                                                                              SHA-512:F321E4820B39D1642FC43BF1055471A323EDCC0C4CBD3DDD5AD26A7B28C4FB9FC4E57C00AE7819A4F45A3E0BB9C7BAA0BA19C3CEEDACF38B911CDF625AA7DDAE
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g...#~..#~..#~...q.. ~..#~..!~......"~......+~......"~......"~..Rich#~..........................PE..L....[.L...........!.....6...........E.......P......................................D=...............................P.......P..(....................L.. ?...p.......................................................P...............................text....5.......6.................. ..`.rdata.......P.......:..............@..@.data...8....`.......<..............@....reloc.......p.......J..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmp
                                                                                              File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):6144
                                                                                              Entropy (8bit):4.720366600008286
                                                                                              Encrypted:false
                                                                                              SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                                                                              MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                                                                              SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                                                                              SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                                                                              SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                                                                              Malicious:false
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmp
                                                                                              File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):3888659
                                                                                              Entropy (8bit):7.989732439997188
                                                                                              Encrypted:false
                                                                                              SSDEEP:98304:bPCtNgMX7ZYe50uLL+nXn9ca6DzLTZRAdsTBV5H5wju3:bPM3l0uLLWXnt63LdRAdsD5H5Ku3
                                                                                              MD5:545274EA5D70FF8BEB929CDA02BE53DE
                                                                                              SHA1:B06F26C7CD5CDA7BF1B8B04778DD157D1E499C35
                                                                                              SHA-256:480C2895CAEE1029ED1160B69C68CA2838CA4FE113466D84DC8064AD28C012C2
                                                                                              SHA-512:94924A8D39458BB57B6FE1A908B6E0796BBE6D4C6010505F185A7D89D057D73C707F4074B6589BA5B708BCE2AFB9F4DBAFFD2AD482FF49E31CDF3C2E40DDDFD1
                                                                                              Malicious:true
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S"1..C_W.C_W.C_Wx\TW.C_W._QW.C_Wx\UW.C_Wx\[W.C_W.K.W.C_W.C^WmC_W.K.W.C_W!eTWEC_W..[V.C_W!eUW.C_W...W.C_W.1\V.C_W.EYW.C_WRich.C_W........PE..L.....f........../......x..........L^............@.............................................................................d....p...............................................................................................................text....v.......x.................. ..`.rdata..Ze.......f...|..............@..@.data....V..........................@....sxdata......`......................@....rsrc........p......................@..@................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmp
                                                                                              File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):15663521
                                                                                              Entropy (8bit):7.999196663100135
                                                                                              Encrypted:true
                                                                                              SSDEEP:393216:Vb6UW+qxFebO68V6xdIhZC82F9MUjBajDHNg3:I9+8uWh0F9MOaDtO
                                                                                              MD5:CB8267B4B34F49626EAF67B562DC4C87
                                                                                              SHA1:45F12CDAD060B99D52345C3174AFB2A8014B67AB
                                                                                              SHA-256:FA7FE6C1DEC39E41F15135ABB057AAA81D8C8AEEE56DFFDA46ABD2C0D9269643
                                                                                              SHA-512:E8364BE88E66E3978DDC4841FBADA73EA052425A6B134CF96330D665D757DFF21DF6AB0D0F72B0FEEDE792DE2B59626DC5E132C8D22153FDE28E32F9E135DDC7
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S"1..C_W.C_W.C_Wx\TW.C_W._QW.C_Wx\UW.C_Wx\[W.C_W.K.W.C_W.C^WmC_W.K.W.C_W!eTWEC_W..[V.C_W!eUW.C_W...W.C_W.1\V.C_W.EYW.C_WRich.C_W........PE..L.....f........../......x..........L^............@.............................................................................d....p...............................................................................................................text....v.......x.................. ..`.rdata..Ze.......f...|..............@..@.data....V..........................@....sxdata......`......................@....rsrc........p......................@..@................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmp
                                                                                              File Type:MS Windows icon resource - 6 icons, 16x15 with PNG image data, 16 x 15, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, 24x22 with PNG image data, 24 x 22, 8-bit/color RGBA, non-interlaced, 32 bits/pixel
                                                                                              Category:dropped
                                                                                              Size (bytes):36944
                                                                                              Entropy (8bit):7.988557580065026
                                                                                              Encrypted:false
                                                                                              SSDEEP:768:qXbwQ2FlEWPJ9LmEGfc8LyV8YMXK/dRduMBfgLUV/w8E/ExixX9xskFt1vK8xGg:UsQ2FlTJlnuaMenLBfgA5stX35X1H
                                                                                              MD5:00A5C7EA56A5721D89CBF2A9CD387693
                                                                                              SHA1:7B0CF07164FF3247ADE5E174B4533B700E4DFF43
                                                                                              SHA-256:FD31FFC3ECD2B2A4BA39E8C49597EBE9E5EB8D6AE5C8A28B9DC1A5B1DE696D71
                                                                                              SHA-512:48278E7B2FD422E3FAAEE5E2F7E13C96CB65208AE31D44C3F6C0919E5925A7663E74B9F0EA5A89F8F7AED0732CF74644FA2F22E3EFF314A65CBF3EBA8D69746F
                                                                                              Malicious:false
                                                                                              Preview:............ .,...f......... ......... ..... .....f...0,.... .@...m...@;.... .O....#...u.... .TQ...>...PNG........IHDR..............sO/....IDATx.-..o.e.....y...........%J(........E/..............4zi...`.b.C.......H......vvgg.y<..O....).y.....0@.Bi.A..\...l.C<.k...0...3.B@.q...J.Z.ov..r..=...6..J....l.0..D.[O.............1.s....#[..:......{.F.}f...(e1.n.v.....=...6K.."..s_.<.<.O.0...+....a..&..*U.......K.XA|...)....e..._....>.&....0.(......<....o3.4....L..0..>a..'..cs...{...p...+.*...|.........{.L.Q<.I.M.k..0`s..Z...]\'fq....:K..x^B.Z.[......8...&.A...8...G2.S..._<V....f.og....4...%D....dy.C.(C....kw...~.W.;F..-...4G`.t..by'..b....[K..qx.|..i..a..y.j.=.3../.m..t.H..F.'.v.(P."..H...=Gyj.0..-<...d...yzX.l...L2..-..i..Q.."m..r.s._.....?....4.&..,.J.c...|...p..Y..Z..?..3.......'.@.k...n..X.......y......V,..........=D,ij.w{...{.......v(.Q.J.PC...b.:.rQ.!....IEND.B`..PNG........IHDR..............}\.....IDATx.E.].]W...k.}..3.Nf.L...L&.6&.IS.$X..H.J...
                                                                                              Process:C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmp
                                                                                              File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):15663521
                                                                                              Entropy (8bit):7.999196663100135
                                                                                              Encrypted:true
                                                                                              SSDEEP:393216:Vb6UW+qxFebO68V6xdIhZC82F9MUjBajDHNg3:I9+8uWh0F9MOaDtO
                                                                                              MD5:CB8267B4B34F49626EAF67B562DC4C87
                                                                                              SHA1:45F12CDAD060B99D52345C3174AFB2A8014B67AB
                                                                                              SHA-256:FA7FE6C1DEC39E41F15135ABB057AAA81D8C8AEEE56DFFDA46ABD2C0D9269643
                                                                                              SHA-512:E8364BE88E66E3978DDC4841FBADA73EA052425A6B134CF96330D665D757DFF21DF6AB0D0F72B0FEEDE792DE2B59626DC5E132C8D22153FDE28E32F9E135DDC7
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S"1..C_W.C_W.C_Wx\TW.C_W._QW.C_Wx\UW.C_Wx\[W.C_W.K.W.C_W.C^WmC_W.K.W.C_W!eTWEC_W..[V.C_W!eUW.C_W...W.C_W.1\V.C_W.EYW.C_WRich.C_W........PE..L.....f........../......x..........L^............@.............................................................................d....p...............................................................................................................text....v.......x.................. ..`.rdata..Ze.......f...|..............@..@.data....V..........................@....sxdata......`......................@....rsrc........p......................@..@................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmp
                                                                                              File Type:MS Windows icon resource - 6 icons, 16x15 with PNG image data, 16 x 15, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, 24x22 with PNG image data, 24 x 22, 8-bit/color RGBA, non-interlaced, 32 bits/pixel
                                                                                              Category:dropped
                                                                                              Size (bytes):36944
                                                                                              Entropy (8bit):7.988557580065026
                                                                                              Encrypted:false
                                                                                              SSDEEP:768:qXbwQ2FlEWPJ9LmEGfc8LyV8YMXK/dRduMBfgLUV/w8E/ExixX9xskFt1vK8xGg:UsQ2FlTJlnuaMenLBfgA5stX35X1H
                                                                                              MD5:00A5C7EA56A5721D89CBF2A9CD387693
                                                                                              SHA1:7B0CF07164FF3247ADE5E174B4533B700E4DFF43
                                                                                              SHA-256:FD31FFC3ECD2B2A4BA39E8C49597EBE9E5EB8D6AE5C8A28B9DC1A5B1DE696D71
                                                                                              SHA-512:48278E7B2FD422E3FAAEE5E2F7E13C96CB65208AE31D44C3F6C0919E5925A7663E74B9F0EA5A89F8F7AED0732CF74644FA2F22E3EFF314A65CBF3EBA8D69746F
                                                                                              Malicious:false
                                                                                              Preview:............ .,...f......... ......... ..... .....f...0,.... .@...m...@;.... .O....#...u.... .TQ...>...PNG........IHDR..............sO/....IDATx.-..o.e.....y...........%J(........E/..............4zi...`.b.C.......H......vvgg.y<..O....).y.....0@.Bi.A..\...l.C<.k...0...3.B@.q...J.Z.ov..r..=...6..J....l.0..D.[O.............1.s....#[..:......{.F.}f...(e1.n.v.....=...6K.."..s_.<.<.O.0...+....a..&..*U.......K.XA|...)....e..._....>.&....0.(......<....o3.4....L..0..>a..'..cs...{...p...+.*...|.........{.L.Q<.I.M.k..0`s..Z...]\'fq....:K..x^B.Z.[......8...&.A...8...G2.S..._<V....f.og....4...%D....dy.C.(C....kw...~.W.;F..-...4G`.t..by'..b....[K..qx.|..i..a..y.j.=.3../.m..t.H..F.'.v.(P."..H...=Gyj.0..-<...d...yzX.l...L2..-..i..Q.."m..r.s._.....?....4.&..,.J.c...|...p..Y..Z..?..3.......'.@.k...n..X.......y......V,..........=D,ij.w{...{.......v(.Q.J.PC...b.:.rQ.!....IEND.B`..PNG........IHDR..............}\.....IDATx.E.].]W...k.}..3.Nf.L...L&.6&.IS.$X..H.J...
                                                                                              Process:C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmp
                                                                                              File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):3888659
                                                                                              Entropy (8bit):7.989732439997188
                                                                                              Encrypted:false
                                                                                              SSDEEP:98304:bPCtNgMX7ZYe50uLL+nXn9ca6DzLTZRAdsTBV5H5wju3:bPM3l0uLLWXnt63LdRAdsD5H5Ku3
                                                                                              MD5:545274EA5D70FF8BEB929CDA02BE53DE
                                                                                              SHA1:B06F26C7CD5CDA7BF1B8B04778DD157D1E499C35
                                                                                              SHA-256:480C2895CAEE1029ED1160B69C68CA2838CA4FE113466D84DC8064AD28C012C2
                                                                                              SHA-512:94924A8D39458BB57B6FE1A908B6E0796BBE6D4C6010505F185A7D89D057D73C707F4074B6589BA5B708BCE2AFB9F4DBAFFD2AD482FF49E31CDF3C2E40DDDFD1
                                                                                              Malicious:true
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S"1..C_W.C_W.C_Wx\TW.C_W._QW.C_Wx\UW.C_Wx\[W.C_W.K.W.C_W.C^WmC_W.K.W.C_W!eTWEC_W..[V.C_W!eUW.C_W...W.C_W.1\V.C_W.EYW.C_WRich.C_W........PE..L.....f........../......x..........L^............@.............................................................................d....p...............................................................................................................text....v.......x.................. ..`.rdata..Ze.......f...|..............@..@.data....V..........................@....sxdata......`......................@....rsrc........p......................@..@................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmp
                                                                                              File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, Icon number=0, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                                                                              Category:modified
                                                                                              Size (bytes):2168
                                                                                              Entropy (8bit):2.5139012557984763
                                                                                              Encrypted:false
                                                                                              SSDEEP:24:8z17aRMgKF9n55Doo+uG55i3KuG55fozgnLWI51Ognvvqy:8RuRwNkNuGEKuGv+gnLWI5kgnqy
                                                                                              MD5:57E2A08873467491D4BAEFA901A26FD4
                                                                                              SHA1:619F81D142B58D01AB41901583C7428D02F935F0
                                                                                              SHA-256:7D02CC2872BFFB2E55718734D225770B01D181FF5A33E79BAFB032F3F6E3A75C
                                                                                              SHA-512:7FCEC259B5F184D4293BEF7F922AE818E6F0DA3C27EA7566BF58353DEC0D38A91A4F0FB024B982C663079A32089C9E7B81F485AFC963AC5D4608787C1D42A70A
                                                                                              Malicious:false
                                                                                              Preview:L..................F.@...........................................................P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....Z.1...........user~1..B............................................F.R.O.N.T.D.~.1.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....P.1...........Local.<............................................L.o.c.a.l.....N.1...........Temp..:............................................T.e.m.p.......1...........805444110049334163191123924.h............................................8.0.5.4.4.4.1.1.0.0.4.9.3.3.4.1.6.3.1.9.1.1.2.3.9.2.4...*.h.2...........997f54546.exe.L............................................9.9.7.f.5.4.5.4.6...e.x.e.......K.....\.....\.F.R.O.N.T.D.~.1.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.8.0.5.4.4.4.1.1.0.0.4.9.3.3.4.1.6.3.1.9.1.1.2.3.9.2.4.\.9.9.7.f.5.4.5.4.6...e.x.e.@.C.:.\.U.s.e.r.s.\.F.R.O.N.T.D.~.1.\.A.p.p.D.a.t.a.\.L.o.c
                                                                                              Process:C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):11445507
                                                                                              Entropy (8bit):7.999981572974584
                                                                                              Encrypted:true
                                                                                              SSDEEP:196608:Bdy9J3T1sQEnoawHdANsgUWtfDoExrNhgGdsibxilGbfH/K7fCsciYNWLV5Koa:uDx/EKONsg5LokrNhg8siJfAascKL/a
                                                                                              MD5:9EA898B2095B6F751B020C3E294F2482
                                                                                              SHA1:09380F3924A961C7899B4BFA5F5F91515F9221A5
                                                                                              SHA-256:3C0A526440055C1140CD62D1942C5035BB378B99C6F48F7DEC0207E4791FA8E1
                                                                                              SHA-512:E6A01F7D5E45AD65988B81107F10C15BCE37221EF1DA1D890FE2D1453EFC8C1C2B33FD5DE6C51BD72E18E9286C0FF06BD55D7FE2F068324AA15B0D34353476C5
                                                                                              Malicious:false
                                                                                              Preview:..>.'.<...Z...G...H......>.........M:.....l!?JU..{.....ooo.dooxcoo...of....YKOoooooooo-X][+WW\.X_\V-)]WWV..V^V_-YoooooooooooooooooooooooooooooooooH..(H...$........H..(.@UATH.l$.H..h...D..H..$`...L..3.I..$eH..%`...L.d$PH.H.H......H.A0.x8....t H..H..u.....H..$`...H..h...A\].H.X.H..u..C.H..$`...H..h...A\].HcC<H..$P...D.......L..A.H H..A9P.........H..H......H.......8GuuH.......x.euhH.......x.tu[H.......x.PuNH.......x.ruAH.......x.ou4H.......x.cu'H.......x.Au.H.......x.du.H.......x.dt...H...A;P...c.........V...A.@$Hc.H.....HA.@.H....<.H..H.}.t..E.L.E.o.E.a.E.d.E.L.E.i.E.b.E.r.E.a.E.r.E.y.E.AH.U.H...E..H..$X.....H..H.E.H..u..F.......D$pV.D$qi.D$rr.D$st.D$tu.D$ua.D$vl.D$wA.D$xl.D$yl.D$zo.D${cH.T$pH...D$|.L..$@.....L..H..u.A.F..g....D$XV.D$Yi.D$Zr.D$[t.D$\u.D$]a.D$^l.D$_F.D$`r.D$ae.D$beH.T$XH...D$c...H.E.H..u............E.n.E.t.E.d.E.l.E.l.E...E.d.E.l.E.lH.M..E....H..H..u..C.......E.m.E.e.E.m.E.c.E.p.E.yH.U.H...E..L..$H.....L..H..u.A.E......D$0R.D$1t.D$2l.D$3D.D$4e.D$5c.D$6o.D$7m.D$8p.D$9r
                                                                                              Process:C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exe
                                                                                              File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):569856
                                                                                              Entropy (8bit):6.3225742404603045
                                                                                              Encrypted:false
                                                                                              SSDEEP:12288:MoLVDsDp3Sx8rKASzlbMZO/IR+nyu20jlTov3+:35DEsxl6O/IRUT6
                                                                                              MD5:6B2548CC404F3DD55634EFA291FA98D0
                                                                                              SHA1:A076A60D99D70FD8AA7664A2534445A502FEBE27
                                                                                              SHA-256:7AE384B8695D7A9C2B6640927CB6AC592229AEF9EBEEB80B91D556777C6DFB5D
                                                                                              SHA-512:14068E9E7D5F7E4494FFA75D369068234CDB050286D3356298E0387CF13D7681C0D68B57B6B299958C86EE3AE1DC3E54ADC4C376E7B869D7D76FC2E91ED95009
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........O...O...O......I...9+..N...9+..E...O......9+..D...9+..]...hp..N...9+..N...hp..N...RichO...........................PE..d...C..Y.........." .....@.......................................................................................................... ...........x........B...P...U...................................................................P...............................text...N>.......@.................. ..`.rdata..%....P.......D..............@..@.data....;..........................@....pdata...U...P...V..................@..@.rsrc....B.......D...b..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................
                                                                                              Process:C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exe
                                                                                              File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):2324480
                                                                                              Entropy (8bit):6.283900113727005
                                                                                              Encrypted:false
                                                                                              SSDEEP:24576:GmKWcYmmUMlLklbOEyeeQaSpRnO9xGboTOLFI78hqT3tiBco21c6D5mHK+iwu7:Gm/mmUiLklb6e+YMDGaAhIt5o2WqmFXM
                                                                                              MD5:6CF29DBF1FA710CCCF6BA1C4C01F6B85
                                                                                              SHA1:A1DEBDB076C8C655E3D78C6AE82F1BEBA386A2BA
                                                                                              SHA-256:F85CE4492E1354F8310027C5F70EF73AAE654FCD8FD9A58034E4F82A41A9826B
                                                                                              SHA-512:EBCC6599C33A80BB3E5C627A5F861FC9742D8558C4551544109288F80155885791A3F701AF1AA7A4513CC5D121B77678A4CD46CA38A7BDD3CF7288E58E01F4F5
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........Z...Z...Z....=x.X...S.0.S...S.7.X...S.4.[....<}......<~.V....<|.....}<..X...S. .}...Z........=|......=z.[....=..[...RichZ...........................PE..d....nZd..........".................H..........@..............................#......#$...`..........................................................` ...... ...7....#..\...P#.pY......8...............................p.......................@....................text...s........................... ..`.rdata..V4.......6..................@..@.data........@...l... ..............@....pdata...7... ...8..................@..@.rsrc........` .....................@..@.reloc..^m...P#..n....".............@..B........................................................................................................................................................................................................................
                                                                                              Process:C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exe
                                                                                              File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):1088512
                                                                                              Entropy (8bit):7.64154347671519
                                                                                              Encrypted:false
                                                                                              SSDEEP:24576:wIBoEkRkHr75NLbEE4pHgN/FahQ5KmT59znh7iiJeW:luo9bEEOHgNdahQ8y5VnhGxW
                                                                                              MD5:24CB34CACC6E1C539E58BD5CDA620A29
                                                                                              SHA1:C6AAF4CE2B51EC487632B41D16B812CBF6B240D9
                                                                                              SHA-256:5E4B57F8B3D39CC6F90E0E17B7D12D9F3EEA67D1A1F2EE73C428C1388A7E65C3
                                                                                              SHA-512:83D097955AF0844280EE2B6DF3173CB06275ED6BE085089E2898CACEDFC769C10C0870D2782F0180BEC4F0C32C02B418B34A8082C29784393A3A4B7C8AA834BA
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                              • Antivirus: ReversingLabs, Detection: 5%
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...kw7g.........." ...(..................................................................`......................................... D..........x............T.......@...\...p..0....................................R..@...............x............................text............................... ..`.rdata..B...........................@..@.data...p....`.......L..............@....pdata...............X..............@..@.;om.................n.............. ..`.j;V....X............|..............@....$c"...............................`..h.reloc..0....p.......0..............@..B................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):601040
                                                                                              Entropy (8bit):5.925895140664619
                                                                                              Encrypted:false
                                                                                              SSDEEP:6144:xc2XFRJ3DNuzAOS9FOU6CNmKQEiispigdlDAlZVl49q7r+:7FvYzU9QU6CNmKsPtdsXl49qX+
                                                                                              MD5:F6F6FF4E9B359BC005A25FADB3A0AA61
                                                                                              SHA1:831FE06CE2015E2D66467D04F2D46EC3E96524D3
                                                                                              SHA-256:6EB2A5F8BA7B7E2438A9608B7A2D5EEFA1F8B66AAF7060C208678E47C3565324
                                                                                              SHA-512:DB29271F28A3BFF4BD3F4073B522C662F70865CC1067E0DE2C11EF284D8D88FE9CA165485DA6FE52372BF3DB33764F195853B883D8FDAB1B502E960B0915DA14
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............~..~..~.p....~.p...B.~.p....~.Z....~.W.}..~.W.{...~.W.z..~..q....~......~...w...~.....~.....~...|..~.Rich.~.........................PE..L......Y.....................V...................@..........................`......P.....@....................................<......../...................0..."..P...p...................(...........@...............8............................text...X........................... ..`.rdata..............................@..@.data....#..........................@....tls................................@....rsrc..../.......0..................@..@.reloc..."...0...$..................@..B........................................................................................................................................................................................................................................
                                                                                              Process:C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):601040
                                                                                              Entropy (8bit):5.925895140664619
                                                                                              Encrypted:false
                                                                                              SSDEEP:6144:xc2XFRJ3DNuzAOS9FOU6CNmKQEiispigdlDAlZVl49q7r+:7FvYzU9QU6CNmKsPtdsXl49qX+
                                                                                              MD5:F6F6FF4E9B359BC005A25FADB3A0AA61
                                                                                              SHA1:831FE06CE2015E2D66467D04F2D46EC3E96524D3
                                                                                              SHA-256:6EB2A5F8BA7B7E2438A9608B7A2D5EEFA1F8B66AAF7060C208678E47C3565324
                                                                                              SHA-512:DB29271F28A3BFF4BD3F4073B522C662F70865CC1067E0DE2C11EF284D8D88FE9CA165485DA6FE52372BF3DB33764F195853B883D8FDAB1B502E960B0915DA14
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............~..~..~.p....~.p...B.~.p....~.Z....~.W.}..~.W.{...~.W.z..~..q....~......~...w...~.....~.....~...|..~.Rich.~.........................PE..L......Y.....................V...................@..........................`......P.....@....................................<......../...................0..."..P...p...................(...........@...............8............................text...X........................... ..`.rdata..............................@..@.data....#..........................@....tls................................@....rsrc..../.......0..................@..@.reloc..."...0...$..................@..B........................................................................................................................................................................................................................................
                                                                                              Process:C:\Users\user\AppData\Roaming\611641ae7b4c35da\62b24530.exe
                                                                                              File Type:ASCII text, with CRLF, CR line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):338
                                                                                              Entropy (8bit):5.2045589636936995
                                                                                              Encrypted:false
                                                                                              SSDEEP:6:AMuzkotkUCST3cNwiaZ5Vm4eov1AiecNwiaZ5Vm4Ds/FxcrBuDFNfpapP:p/6bTDNHVXeoqLNHVXDs//MEDXfAP
                                                                                              MD5:1AD1FB02034A5525489764D121A41201
                                                                                              SHA1:6704555873E9BBCBEC515F1001E1AB17E362E547
                                                                                              SHA-256:7B0F9120F432B9BC9E163569A032D94D3164B236C72C6547FE29EF038145BA16
                                                                                              SHA-512:0AB8E50C50840F7D7CBCF49B3328C61DA6AF00C36645222EAB055739D518103F2E0AD89389DBE7A2C858FB53FDF61319E0DC9BF6769F338AE725530DCD8AC8D3
                                                                                              Malicious:false
                                                                                              Preview:..7-Zip SFX 24.08 (x86) : Copyright (c) 1999-2024 Igor Pavlov : 2024-08-11....Extracting archive: C:\Users\user\AppData\Roaming\611641ae7b4c35da\62b24530.exe..--..Path = C:\Users\user\AppData\Roaming\611641ae7b4c35da\62b24530.exe..Type = 7z.... 0%. . 75% 1 - libcurl.dll. .100% 4. .Everything is Ok..
                                                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                              Entropy (8bit):7.993561213295345
                                                                                              TrID:
                                                                                              • Win32 Executable (generic) a (10002005/4) 98.45%
                                                                                              • Inno Setup installer (109748/4) 1.08%
                                                                                              • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
                                                                                              • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                              File name:cho_mea64.exe
                                                                                              File size:21'364'502 bytes
                                                                                              MD5:044f51347e293ac77de4cd47bdccbacf
                                                                                              SHA1:4c67777228575ac317c62855e6d9dd0a6da48c2d
                                                                                              SHA256:4ca9da66d04a5f68deb0bab55aca5d64b8d8307c58f2943d6a67a3b584855ee2
                                                                                              SHA512:f3976170a7f965f9674712904a0effc8383ea1a7ac5961a746b319d4659f52f82578b5adf4a0ca52f0434a896d310268ac7e40391fb0ea929a2482bb78aa0775
                                                                                              SSDEEP:393216:SiX7fx65E78eL1uwtkbZtqtQEt8+OIbyMl1PiT+KiSn7h6LPr8Y:bTxOEJuw+bP5krOIO3aKiSn7aPIY
                                                                                              TLSH:8F273327B3C7A13DF01D0B3706B2F75894FB6A216923BE56C6E48498CE760641E2F746
                                                                                              File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                                              Icon Hash:ecce92ca8a86c46c
                                                                                              Entrypoint:0x4a83bc
                                                                                              Entrypoint Section:.itext
                                                                                              Digitally signed:false
                                                                                              Imagebase:0x400000
                                                                                              Subsystem:windows gui
                                                                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                              Time Stamp:0x6690DABD [Fri Jul 12 07:26:53 2024 UTC]
                                                                                              TLS Callbacks:
                                                                                              CLR (.Net) Version:
                                                                                              OS Version Major:6
                                                                                              OS Version Minor:1
                                                                                              File Version Major:6
                                                                                              File Version Minor:1
                                                                                              Subsystem Version Major:6
                                                                                              Subsystem Version Minor:1
                                                                                              Import Hash:40ab50289f7ef5fae60801f88d4541fc
                                                                                              Instruction
                                                                                              push ebp
                                                                                              mov ebp, esp
                                                                                              add esp, FFFFFFA4h
                                                                                              push ebx
                                                                                              push esi
                                                                                              push edi
                                                                                              xor eax, eax
                                                                                              mov dword ptr [ebp-3Ch], eax
                                                                                              mov dword ptr [ebp-40h], eax
                                                                                              mov dword ptr [ebp-5Ch], eax
                                                                                              mov dword ptr [ebp-30h], eax
                                                                                              mov dword ptr [ebp-38h], eax
                                                                                              mov dword ptr [ebp-34h], eax
                                                                                              mov dword ptr [ebp-2Ch], eax
                                                                                              mov dword ptr [ebp-28h], eax
                                                                                              mov dword ptr [ebp-14h], eax
                                                                                              mov eax, 004A2EBCh
                                                                                              call 00007F3A8107D875h
                                                                                              xor eax, eax
                                                                                              push ebp
                                                                                              push 004A8AC1h
                                                                                              push dword ptr fs:[eax]
                                                                                              mov dword ptr fs:[eax], esp
                                                                                              xor edx, edx
                                                                                              push ebp
                                                                                              push 004A8A7Bh
                                                                                              push dword ptr fs:[edx]
                                                                                              mov dword ptr fs:[edx], esp
                                                                                              mov eax, dword ptr [004B0634h]
                                                                                              call 00007F3A8110F1FBh
                                                                                              call 00007F3A8110ED4Eh
                                                                                              lea edx, dword ptr [ebp-14h]
                                                                                              xor eax, eax
                                                                                              call 00007F3A81109A28h
                                                                                              mov edx, dword ptr [ebp-14h]
                                                                                              mov eax, 004B41F4h
                                                                                              call 00007F3A81077923h
                                                                                              push 00000002h
                                                                                              push 00000000h
                                                                                              push 00000001h
                                                                                              mov ecx, dword ptr [004B41F4h]
                                                                                              mov dl, 01h
                                                                                              mov eax, dword ptr [0049CD14h]
                                                                                              call 00007F3A8110AD53h
                                                                                              mov dword ptr [004B41F8h], eax
                                                                                              xor edx, edx
                                                                                              push ebp
                                                                                              push 004A8A27h
                                                                                              push dword ptr fs:[edx]
                                                                                              mov dword ptr fs:[edx], esp
                                                                                              call 00007F3A8110F283h
                                                                                              mov dword ptr [004B4200h], eax
                                                                                              mov eax, dword ptr [004B4200h]
                                                                                              cmp dword ptr [eax+0Ch], 01h
                                                                                              jne 00007F3A81115F6Ah
                                                                                              mov eax, dword ptr [004B4200h]
                                                                                              mov edx, 00000028h
                                                                                              call 00007F3A8110B648h
                                                                                              mov edx, dword ptr [004B4200h]
                                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0xb70000x71.edata
                                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xb50000xfec.idata
                                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xcb0000xc684.rsrc
                                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xba0000x10fa8.reloc
                                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_TLS0xb90000x18.rdata
                                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_IAT0xb52d40x25c.idata
                                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0xb60000x1a4.didata
                                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                              .text0x10000xa568c0xa5800b889d302f6fc48a904de33d8d947ae80False0.3620185045317221data6.377190161826806IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                              .itext0xa70000x1b640x1c00588dd0a8ab499300d3701cbd11b017d9False0.548828125data6.109264411030635IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                              .data0xa90000x38380x3a005c0c76e77aef52ebc6702430837ccb6eFalse0.35338092672413796data4.95916338709992IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                              .bss0xad0000x72580x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                              .idata0xb50000xfec0x1000627340dff539ef99048969aa4824fb2dFalse0.380615234375data5.020404933181373IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                              .didata0xb60000x1a40x200fd11c1109737963cc6cb7258063abfd6False0.34765625data2.729290535217263IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                              .edata0xb70000x710x2007de8ca0c7a61668a728fd3a88dc0942dFalse0.1796875data1.305578535725827IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                              .tls0xb80000x180x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                              .rdata0xb90000x5d0x200d84006640084dc9f74a07c2ff9c7d656False0.189453125data1.3892750148744617IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                              .reloc0xba0000x10fa80x11000a85fda2741bd9417695daa5fc5a9d7a5False0.5789579503676471data6.709466460182023IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                              .rsrc0xcb0000xc6840xc800eeb200832542c12ffaef95c98b99573aFalse0.81208984375data7.427007830413282IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                              RT_ICON0xcb5280x32cPNG image data, 16 x 15, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0135467980295567
                                                                                              RT_ICON0xcb8540x5d4PNG image data, 24 x 22, 8-bit/color RGBA, non-interlacedEnglishUnited States1.007372654155496
                                                                                              RT_ICON0xcbe280x907PNG image data, 32 x 29, 8-bit/color RGBA, non-interlacedEnglishUnited States1.00475984422328
                                                                                              RT_ICON0xcc7300x1140PNG image data, 48 x 44, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0024909420289856
                                                                                              RT_ICON0xcd8700x1b4fPNG image data, 64 x 59, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0015734515806036
                                                                                              RT_ICON0xcf3c00x5154PNG image data, 128 x 117, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0007684918347743
                                                                                              RT_STRING0xd45140x3f8data0.3198818897637795
                                                                                              RT_STRING0xd490c0x2dcdata0.36475409836065575
                                                                                              RT_STRING0xd4be80x430data0.40578358208955223
                                                                                              RT_STRING0xd50180x44cdata0.38636363636363635
                                                                                              RT_STRING0xd54640x2d4data0.39226519337016574
                                                                                              RT_STRING0xd57380xb8data0.6467391304347826
                                                                                              RT_STRING0xd57f00x9cdata0.6410256410256411
                                                                                              RT_STRING0xd588c0x374data0.4230769230769231
                                                                                              RT_STRING0xd5c000x398data0.3358695652173913
                                                                                              RT_STRING0xd5f980x368data0.3795871559633027
                                                                                              RT_STRING0xd63000x2a4data0.4275147928994083
                                                                                              RT_RCDATA0xd65a40x10data1.5
                                                                                              RT_RCDATA0xd65b40x310data0.6173469387755102
                                                                                              RT_RCDATA0xd68c40x2cdata1.2045454545454546
                                                                                              RT_GROUP_ICON0xd68f00x5adataEnglishUnited States0.8333333333333334
                                                                                              RT_VERSION0xd694c0x584dataEnglishUnited States0.26628895184135976
                                                                                              RT_MANIFEST0xd6ed00x7b3XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3389142567224759
                                                                                              DLLImport
                                                                                              kernel32.dllGetACP, GetExitCodeProcess, CloseHandle, LocalFree, SizeofResource, VirtualProtect, QueryPerformanceFrequency, VirtualFree, GetFullPathNameW, GetProcessHeap, ExitProcess, HeapAlloc, GetCPInfoExW, RtlUnwind, GetCPInfo, GetStdHandle, GetModuleHandleW, FreeLibrary, HeapDestroy, ReadFile, CreateProcessW, GetLastError, GetModuleFileNameW, SetLastError, FindResourceW, CreateThread, CompareStringW, LoadLibraryA, ResetEvent, GetVolumeInformationW, GetVersion, GetDriveTypeW, RaiseException, FormatMessageW, SwitchToThread, GetExitCodeThread, GetCurrentThread, LoadLibraryExW, LockResource, GetCurrentThreadId, UnhandledExceptionFilter, VirtualQuery, VirtualQueryEx, Sleep, EnterCriticalSection, SetFilePointer, LoadResource, SuspendThread, GetTickCount, GetFileSize, GetStartupInfoW, GetFileAttributesW, InitializeCriticalSection, GetSystemWindowsDirectoryW, GetThreadPriority, SetThreadPriority, GetCurrentProcess, VirtualAlloc, GetCommandLineW, GetSystemInfo, LeaveCriticalSection, GetProcAddress, ResumeThread, GetVersionExW, VerifyVersionInfoW, HeapCreate, GetWindowsDirectoryW, LCMapStringW, VerSetConditionMask, GetDiskFreeSpaceW, FindFirstFileW, GetUserDefaultUILanguage, lstrlenW, QueryPerformanceCounter, SetEndOfFile, HeapFree, WideCharToMultiByte, FindClose, MultiByteToWideChar, LoadLibraryW, SetEvent, CreateFileW, GetLocaleInfoW, GetSystemDirectoryW, DeleteFileW, GetLocalTime, GetEnvironmentVariableW, WaitForSingleObject, WriteFile, ExitThread, DeleteCriticalSection, TlsGetValue, GetDateFormatW, SetErrorMode, IsValidLocale, TlsSetValue, CreateDirectoryW, GetSystemDefaultUILanguage, EnumCalendarInfoW, LocalAlloc, GetUserDefaultLangID, RemoveDirectoryW, CreateEventW, SetThreadLocale, GetThreadLocale
                                                                                              comctl32.dllInitCommonControls
                                                                                              user32.dllCreateWindowExW, TranslateMessage, CharLowerBuffW, CallWindowProcW, CharUpperW, PeekMessageW, GetSystemMetrics, SetWindowLongW, MessageBoxW, DestroyWindow, CharUpperBuffW, CharNextW, MsgWaitForMultipleObjects, LoadStringW, ExitWindowsEx, DispatchMessageW
                                                                                              oleaut32.dllSysAllocStringLen, SafeArrayPtrOfIndex, VariantCopy, SafeArrayGetLBound, SafeArrayGetUBound, VariantInit, VariantClear, SysFreeString, SysReAllocStringLen, VariantChangeType, SafeArrayCreate
                                                                                              advapi32.dllConvertStringSecurityDescriptorToSecurityDescriptorW, OpenThreadToken, AdjustTokenPrivileges, LookupPrivilegeValueW, RegOpenKeyExW, OpenProcessToken, FreeSid, AllocateAndInitializeSid, EqualSid, RegQueryValueExW, GetTokenInformation, ConvertSidToStringSidW, RegCloseKey
                                                                                              NameOrdinalAddress
                                                                                              __dbk_fcall_wrapper20x40fc10
                                                                                              dbkFCallWrapperAddr10x4b063c
                                                                                              Language of compilation systemCountry where language is spokenMap
                                                                                              EnglishUnited States
                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Nov 20, 2024 20:16:39.870997906 CET49840443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:16:39.871026039 CET443498408.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:16:39.871088982 CET49840443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:16:40.296859026 CET49840443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:16:40.296889067 CET443498408.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:16:40.296958923 CET443498408.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:16:50.531661987 CET49863443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:16:50.531727076 CET443498638.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:16:50.531805038 CET49863443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:16:50.686229944 CET49863443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:16:50.686275959 CET443498638.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:16:50.686392069 CET443498638.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:17:00.960289001 CET49887443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:17:00.960340977 CET443498878.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:17:00.960541964 CET49887443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:17:01.127716064 CET49887443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:17:01.127765894 CET443498878.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:17:01.127835989 CET443498878.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:17:11.414879084 CET49909443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:17:11.414932013 CET443499098.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:17:11.415016890 CET49909443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:17:12.569518089 CET49909443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:17:12.569605112 CET443499098.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:17:12.569673061 CET443499098.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:17:22.859251976 CET49935443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:17:22.859291077 CET443499358.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:17:22.859373093 CET49935443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:17:23.478312016 CET49935443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:17:23.478339911 CET443499358.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:17:23.478477955 CET443499358.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:17:33.710055113 CET49958443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:17:33.710089922 CET443499588.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:17:33.711909056 CET49958443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:17:34.298319101 CET49958443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:17:34.298353910 CET443499588.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:17:34.298446894 CET443499588.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:17:44.613343000 CET49978443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:17:44.613404989 CET443499788.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:17:44.613728046 CET49978443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:17:44.972527027 CET49978443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:17:44.972553015 CET443499788.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:17:44.972698927 CET443499788.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:17:55.209722996 CET49979443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:17:55.209784985 CET443499798.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:17:55.209888935 CET49979443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:17:55.646051884 CET49979443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:17:55.646070957 CET443499798.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:17:55.646152020 CET443499798.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:18:05.774130106 CET49980443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:18:05.774188042 CET443499808.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:18:05.774277925 CET49980443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:18:06.464062929 CET49980443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:18:06.464102983 CET443499808.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:18:06.464174032 CET443499808.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:18:31.576598883 CET49981443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:18:31.576651096 CET443499818.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:18:31.576751947 CET49981443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:18:32.303360939 CET49981443192.168.2.78.210.144.166
                                                                                              Nov 20, 2024 20:18:32.303390980 CET443499818.210.144.166192.168.2.7
                                                                                              Nov 20, 2024 20:18:32.303472996 CET443499818.210.144.166192.168.2.7
                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Nov 20, 2024 20:15:34.322462082 CET4947453192.168.2.71.1.1.1
                                                                                              Nov 20, 2024 20:16:39.723750114 CET5325053192.168.2.71.1.1.1
                                                                                              Nov 20, 2024 20:16:39.867177010 CET53532501.1.1.1192.168.2.7
                                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                              Nov 20, 2024 20:15:34.322462082 CET192.168.2.71.1.1.10x6bdbStandard query (0)time.windows.comA (IP address)IN (0x0001)false
                                                                                              Nov 20, 2024 20:16:39.723750114 CET192.168.2.71.1.1.10xd944Standard query (0)boss.google.tw.cnA (IP address)IN (0x0001)false
                                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                              Nov 20, 2024 20:15:34.460069895 CET1.1.1.1192.168.2.70x6bdbNo error (0)time.windows.comtwc.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                                                                              Nov 20, 2024 20:16:39.867177010 CET1.1.1.1192.168.2.70xd944No error (0)boss.google.tw.cn8.210.144.166A (IP address)IN (0x0001)false

                                                                                              Click to jump to process

                                                                                              Click to jump to process

                                                                                              Click to dive into process behavior distribution

                                                                                              Click to jump to process

                                                                                              Target ID:0
                                                                                              Start time:14:15:30
                                                                                              Start date:20/11/2024
                                                                                              Path:C:\Users\user\Desktop\cho_mea64.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Users\user\Desktop\cho_mea64.exe"
                                                                                              Imagebase:0x80000
                                                                                              File size:21'364'502 bytes
                                                                                              MD5 hash:044F51347E293AC77DE4CD47BDCCBACF
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:Borland Delphi
                                                                                              Reputation:low
                                                                                              Has exited:true

                                                                                              Target ID:2
                                                                                              Start time:14:15:31
                                                                                              Start date:20/11/2024
                                                                                              Path:C:\Users\user\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmp
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Users\user~1\AppData\Local\Temp\is-89SCA.tmp\cho_mea64.tmp" /SL5="$20404,20366305,827392,C:\Users\user\Desktop\cho_mea64.exe"
                                                                                              Imagebase:0x890000
                                                                                              File size:3'317'248 bytes
                                                                                              MD5 hash:DC63A4763A59D647C3D0C4480EAE0329
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:Borland Delphi
                                                                                              Reputation:low
                                                                                              Has exited:true

                                                                                              Target ID:3
                                                                                              Start time:14:15:32
                                                                                              Start date:20/11/2024
                                                                                              Path:C:\Windows\System32\svchost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\svchost.exe -k LocalService -s W32Time
                                                                                              Imagebase:0x7ff7b4ee0000
                                                                                              File size:55'320 bytes
                                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:false
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:false

                                                                                              Target ID:4
                                                                                              Start time:14:15:35
                                                                                              Start date:20/11/2024
                                                                                              Path:C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Users\user\AppData\Roaming\611641ae7b4c35da\20decf5c428.exe" -pc0873f648e06c724 -y -o"C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\"
                                                                                              Imagebase:0x400000
                                                                                              File size:3'888'659 bytes
                                                                                              MD5 hash:545274EA5D70FF8BEB929CDA02BE53DE
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:low
                                                                                              Has exited:true

                                                                                              Target ID:5
                                                                                              Start time:14:15:35
                                                                                              Start date:20/11/2024
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff75da10000
                                                                                              File size:862'208 bytes
                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:6
                                                                                              Start time:14:15:37
                                                                                              Start date:20/11/2024
                                                                                              Path:C:\Users\user\AppData\Roaming\611641ae7b4c35da\62b24530.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Users\user\AppData\Roaming\611641ae7b4c35da\62b24530.exe" -p7fe04917 -y -o"C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\"
                                                                                              Imagebase:0x400000
                                                                                              File size:15'663'521 bytes
                                                                                              MD5 hash:CB8267B4B34F49626EAF67B562DC4C87
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:low
                                                                                              Has exited:true

                                                                                              Target ID:7
                                                                                              Start time:14:15:37
                                                                                              Start date:20/11/2024
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff75da10000
                                                                                              File size:862'208 bytes
                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:8
                                                                                              Start time:14:15:40
                                                                                              Start date:20/11/2024
                                                                                              Path:C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:"C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\soiucosxz.exe"
                                                                                              Imagebase:0x7ff60cf10000
                                                                                              File size:2'324'480 bytes
                                                                                              MD5 hash:6CF29DBF1FA710CCCF6BA1C4C01F6B85
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_MicroClip, Description: Yara detected MicroClip, Source: 00000008.00000002.2875747667.0000022F1E420000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_MicroClip, Description: Yara detected MicroClip, Source: 00000008.00000002.2875896834.0000022F1E681000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                              Antivirus matches:
                                                                                              • Detection: 0%, ReversingLabs
                                                                                              Reputation:low
                                                                                              Has exited:true

                                                                                              Target ID:12
                                                                                              Start time:15:18:22
                                                                                              Start date:20/11/2024
                                                                                              Path:C:\Windows\System32\cmd.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:cmd /c start "" "C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\soiucosxz.exe" 3aede031690535070f390095f2d2 7824 "C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\"
                                                                                              Imagebase:0x7ff6a8e70000
                                                                                              File size:289'792 bytes
                                                                                              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:13
                                                                                              Start time:15:18:22
                                                                                              Start date:20/11/2024
                                                                                              Path:C:\Users\user\AppData\Local\Temp\805444110049334163191123924\soiucosxz.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:"C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\soiucosxz.exe" 3aede031690535070f390095f2d2 7824 "C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\"
                                                                                              Imagebase:0x7ff60cf10000
                                                                                              File size:2'324'480 bytes
                                                                                              MD5 hash:6CF29DBF1FA710CCCF6BA1C4C01F6B85
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:low
                                                                                              Has exited:true

                                                                                              Target ID:15
                                                                                              Start time:15:19:32
                                                                                              Start date:20/11/2024
                                                                                              Path:C:\Windows\ksxvHQBlSOri\soiucosxz.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Windows\ksxvHQBlSOri\soiucosxz.exe"
                                                                                              Imagebase:0xce0000
                                                                                              File size:601'040 bytes
                                                                                              MD5 hash:F6F6FF4E9B359BC005A25FADB3A0AA61
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Antivirus matches:
                                                                                              • Detection: 0%, ReversingLabs
                                                                                              Reputation:low
                                                                                              Has exited:true

                                                                                              Target ID:16
                                                                                              Start time:15:19:32
                                                                                              Start date:20/11/2024
                                                                                              Path:C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exe"
                                                                                              Imagebase:0xe80000
                                                                                              File size:601'040 bytes
                                                                                              MD5 hash:F6F6FF4E9B359BC005A25FADB3A0AA61
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Antivirus matches:
                                                                                              • Detection: 0%, ReversingLabs
                                                                                              Has exited:true

                                                                                              Target ID:17
                                                                                              Start time:15:19:32
                                                                                              Start date:20/11/2024
                                                                                              Path:C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:"C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe"
                                                                                              Imagebase:0x7ff77edf0000
                                                                                              File size:2'324'480 bytes
                                                                                              MD5 hash:6CF29DBF1FA710CCCF6BA1C4C01F6B85
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Antivirus matches:
                                                                                              • Detection: 0%, ReversingLabs
                                                                                              Has exited:false

                                                                                              Target ID:18
                                                                                              Start time:15:19:37
                                                                                              Start date:20/11/2024
                                                                                              Path:C:\Windows\System32\cmd.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:cmd /c start "" "C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe" 6c376dd8a 7824 "C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\"
                                                                                              Imagebase:0x7ff6a8e70000
                                                                                              File size:289'792 bytes
                                                                                              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:19
                                                                                              Start time:15:19:37
                                                                                              Start date:20/11/2024
                                                                                              Path:C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:"C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe" 6c376dd8a 7824 "C:\Users\user~1\AppData\Local\Temp\is-KDSFA.tmp\..\805444110049334163191123924\"
                                                                                              Imagebase:0x7ff77edf0000
                                                                                              File size:2'324'480 bytes
                                                                                              MD5 hash:6CF29DBF1FA710CCCF6BA1C4C01F6B85
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:20
                                                                                              Start time:15:19:46
                                                                                              Start date:20/11/2024
                                                                                              Path:C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:"C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe" "2fb5d34656b943d916e57e9120"
                                                                                              Imagebase:0x7ff77edf0000
                                                                                              File size:2'324'480 bytes
                                                                                              MD5 hash:6CF29DBF1FA710CCCF6BA1C4C01F6B85
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:21
                                                                                              Start time:15:19:59
                                                                                              Start date:20/11/2024
                                                                                              Path:C:\Windows\System32\RelPost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\RelPost.exe
                                                                                              Imagebase:0x7ff7fd800000
                                                                                              File size:187'392 bytes
                                                                                              MD5 hash:E351DDC4F470EDEF41D705315CA1F156
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:22
                                                                                              Start time:15:19:59
                                                                                              Start date:20/11/2024
                                                                                              Path:C:\Windows\System32\msconfig.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\msconfig.exe
                                                                                              Imagebase:0x7ff7f68a0000
                                                                                              File size:197'632 bytes
                                                                                              MD5 hash:39009536CAFE30C6EF2501FE46C9DF5E
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:false

                                                                                              Target ID:23
                                                                                              Start time:15:19:59
                                                                                              Start date:20/11/2024
                                                                                              Path:C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:"C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe" bcbf6f4 1876
                                                                                              Imagebase:0x7ff77edf0000
                                                                                              File size:2'324'480 bytes
                                                                                              MD5 hash:6CF29DBF1FA710CCCF6BA1C4C01F6B85
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_MicroClip, Description: Yara detected MicroClip, Source: 00000017.00000002.3163426099.0000016095BB0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_MicroClip, Description: Yara detected MicroClip, Source: 00000017.00000002.3163647071.0000016095E11000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                              Has exited:false

                                                                                              Target ID:24
                                                                                              Start time:15:20:11
                                                                                              Start date:20/11/2024
                                                                                              Path:C:\Windows\ksxvHQBlSOri\soiucosxz.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:C:\Windows\ksxvHQBlSOri\soiucosxz.exe
                                                                                              Imagebase:0xce0000
                                                                                              File size:601'040 bytes
                                                                                              MD5 hash:F6F6FF4E9B359BC005A25FADB3A0AA61
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:25
                                                                                              Start time:15:20:12
                                                                                              Start date:20/11/2024
                                                                                              Path:C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Windows\ksxvHQBlSOri\app-0.89.2\soiucosxz.exe"
                                                                                              Imagebase:0xe80000
                                                                                              File size:601'040 bytes
                                                                                              MD5 hash:F6F6FF4E9B359BC005A25FADB3A0AA61
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:26
                                                                                              Start time:15:20:12
                                                                                              Start date:20/11/2024
                                                                                              Path:C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:"C:\Windows\ksxvHQBlSOri\app-0.89.2\app-0.89.2\soiucosxz.exe"
                                                                                              Imagebase:0x7ff77edf0000
                                                                                              File size:2'324'480 bytes
                                                                                              MD5 hash:6CF29DBF1FA710CCCF6BA1C4C01F6B85
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:false

                                                                                              Reset < >

                                                                                                Execution Graph

                                                                                                Execution Coverage:13.2%
                                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                                Signature Coverage:0%
                                                                                                Total number of Nodes:2000
                                                                                                Total number of Limit Nodes:20
                                                                                                execution_graph 17547 41e063 VirtualFree 17548 4093c3 17550 4093c8 17548->17550 17551 4093e7 17550->17551 17554 424640 WaitForSingleObject 17550->17554 17557 412e95 17550->17557 17561 424700 SetEvent 17550->17561 17555 424658 17554->17555 17556 42464e GetLastError 17554->17556 17555->17550 17556->17555 17558 412e9f __EH_prolog 17557->17558 17565 412ed4 17558->17565 17560 412eb5 17560->17550 17562 424710 GetLastError 17561->17562 17563 42470d 17561->17563 17564 42471a 17562->17564 17563->17550 17564->17550 17566 412ede __EH_prolog 17565->17566 17574 4160ed 17566->17574 17569 4160ed 4 API calls 17570 412f24 17569->17570 17571 412fc1 17570->17571 17582 4084f5 17570->17582 17588 41e043 VirtualAlloc 17570->17588 17571->17560 17575 416100 17574->17575 17581 412f17 17574->17581 17576 416108 _CxxThrowException 17575->17576 17577 41611d 17575->17577 17576->17577 17589 403ba5 free 17577->17589 17579 416124 17590 403b71 17579->17590 17581->17569 17586 408508 17582->17586 17583 40870c 17583->17571 17586->17583 17587 4086ae memmove 17586->17587 17595 4092d9 17586->17595 17600 409347 17586->17600 17587->17586 17588->17571 17589->17579 17591 403b81 malloc 17590->17591 17592 403b7a 17590->17592 17593 403ba3 17591->17593 17594 403b8f _CxxThrowException 17591->17594 17592->17591 17593->17581 17594->17593 17596 4092ed 17595->17596 17597 40931c 17596->17597 17605 408cd4 17596->17605 17609 407b7e 17596->17609 17597->17586 17601 409354 17600->17601 17602 40937e 17601->17602 17619 4162b3 17601->17619 17624 41635e 17601->17624 17602->17586 17606 408cf8 17605->17606 17607 408d17 17606->17607 17608 407b7e 2 API calls 17606->17608 17607->17596 17608->17607 17614 406553 17609->17614 17612 407bab GetLastError 17613 407ba7 17612->17613 17613->17596 17615 406560 17614->17615 17618 406526 ReadFile 17615->17618 17617 406571 17617->17612 17617->17613 17618->17617 17620 4162bd 17619->17620 17631 4055cd SetFileAttributesW 17620->17631 17632 40af6f 17620->17632 17621 4162f2 17621->17601 17625 41636d 17624->17625 17628 416447 17625->17628 17629 416322 51 API calls 17625->17629 17734 407f2a 17625->17734 17739 416171 17625->17739 17743 4162f6 17625->17743 17628->17601 17629->17625 17631->17621 17633 40af79 __EH_prolog 17632->17633 17640 40af1a 17633->17640 17636 40af9f 17639 40afe5 17636->17639 17653 40af1f 17636->17653 17639->17621 17642 40ae26 17640->17642 17641 40ae38 17641->17636 17641->17639 17650 409cf1 17641->17650 17642->17641 17643 40ae91 17642->17643 17658 406654 17642->17658 17645 40aeee 17643->17645 17657 4065a9 SetFileTime 17643->17657 17668 407f16 17645->17668 17723 40e212 17650->17723 17654 40af6c 17653->17654 17655 40af2a 17653->17655 17654->17639 17655->17654 17656 409e15 7 API calls 17655->17656 17656->17654 17657->17645 17671 406459 17658->17671 17661 40667f 17661->17643 17663 409e15 17661->17663 17681 4062c4 GetLastError 17663->17681 17720 40631a 17668->17720 17675 4063e4 SetFilePointer 17671->17675 17673 40646c 17673->17661 17674 406645 SetEndOfFile 17673->17674 17674->17661 17676 406411 GetLastError 17675->17676 17680 406432 17675->17680 17677 40641d 17676->17677 17676->17680 17678 406389 SetFilePointer GetLastError 17677->17678 17679 406427 SetLastError 17678->17679 17679->17680 17680->17673 17682 4062ce 17681->17682 17683 409d78 17682->17683 17684 409d82 __EH_prolog 17683->17684 17699 40338e 17684->17699 17687 409dce 17714 409d5d 17687->17714 17696 409dc2 17713 403ba5 free 17696->17713 17697 409df0 17697->17643 17700 4033a4 17699->17700 17700->17700 17701 403134 malloc _CxxThrowException 17700->17701 17702 4033b3 17701->17702 17702->17687 17703 403737 17702->17703 17704 403749 17703->17704 17705 40319a _CxxThrowException malloc _CxxThrowException free 17704->17705 17706 403758 17705->17706 17707 409e02 17706->17707 17708 405484 6 API calls 17707->17708 17709 409db5 17708->17709 17710 4036fb 17709->17710 17711 40319a _CxxThrowException malloc _CxxThrowException free 17710->17711 17712 40370c 17711->17712 17712->17696 17712->17712 17713->17687 17715 403737 _CxxThrowException malloc _CxxThrowException free 17714->17715 17716 409d6d 17715->17716 17717 4036fb _CxxThrowException malloc _CxxThrowException free 17716->17717 17718 409d75 17717->17718 17719 403ba5 free 17718->17719 17719->17697 17721 406324 CloseHandle 17720->17721 17722 40632f 17720->17722 17721->17722 17722->17641 17724 40e21c __EH_prolog 17723->17724 17725 40e2ac 17724->17725 17729 40e254 17724->17729 17727 406f66 VariantClear 17725->17727 17728 409d0a 17727->17728 17728->17636 17730 406f66 17729->17730 17731 406f8e 17730->17731 17733 406f6e 17730->17733 17731->17728 17732 406f87 VariantClear 17732->17731 17733->17731 17733->17732 17747 406600 17734->17747 17737 407f5b 17737->17625 17740 41617b __EH_prolog 17739->17740 17756 40aa7b 17740->17756 17741 4161f6 17741->17625 17744 4162fd 17743->17744 17745 4162b3 17 API calls 17744->17745 17746 416321 17745->17746 17746->17625 17748 40660d 17747->17748 17750 406639 17748->17750 17753 4065c6 17748->17753 17750->17737 17751 407c2f GetLastError 17750->17751 17752 407c39 17751->17752 17752->17737 17754 4065d4 17753->17754 17755 4065d7 WriteFile 17753->17755 17754->17755 17755->17748 17757 40aa85 __EH_prolog 17756->17757 17780 40aa68 17757->17780 17759 40ab6b 17762 406f66 VariantClear 17759->17762 17761 40ab8e 17763 406f66 VariantClear 17761->17763 17779 40ab89 17762->17779 17764 40abaf 17763->17764 17783 40df0c 17764->17783 17767 409cf1 VariantClear 17768 40abce 17767->17768 17773 40abe5 17768->17773 17768->17779 17848 409ef4 17768->17848 17770 40ac16 17770->17779 17787 40b286 17770->17787 17773->17770 17773->17779 17851 404664 17773->17851 17774 40acc0 17776 403b71 ctype 2 API calls 17774->17776 17775 40ad0d 17793 40a565 17775->17793 17776->17779 17779->17741 17856 40e1b5 17780->17856 17784 40df35 17783->17784 17785 406f66 VariantClear 17784->17785 17786 40abbf 17785->17786 17786->17767 17786->17779 17788 40b2b3 17787->17788 17789 40b295 17787->17789 17897 40b3a1 17788->17897 17789->17788 17792 403ba5 free ctype 17789->17792 17792->17789 17794 40a56f __EH_prolog 17793->17794 17900 409f0a 17794->17900 17797 40a92d 17797->17779 17798 40df0c VariantClear 17799 40a5a7 17798->17799 17799->17797 17915 40a07a 17799->17915 17804 40a5d3 17929 4033db 17804->17929 17807 40a5df 17810 40a61d 17807->17810 18046 40a942 17807->18046 17812 40a627 17810->17812 17813 40a65b 17810->17813 17811 4034ab 3 API calls 17814 40a611 17811->17814 17816 4034ab 3 API calls 17812->17816 17822 40a66d 17813->17822 17932 40a23c 17813->17932 18056 403ba5 free 17814->18056 17818 40a638 17816->17818 17821 40a645 17818->17821 18057 4055ee RemoveDirectoryW 17818->18057 17824 40af1f 7 API calls 17821->17824 17847 40a656 17821->17847 17822->17847 18005 4034ab 17822->18005 17824->17847 17825 403b71 ctype 2 API calls 17829 40a6a8 17825->17829 17827 40a925 18065 403ba5 free 17827->18065 18011 406592 17829->18011 17832 40a70f 17833 409e15 7 API calls 17832->17833 17833->17847 17834 40a744 17835 40a82c 17834->17835 17837 40a7a5 17834->17837 17836 406654 6 API calls 17835->17836 17835->17847 17838 40a878 17836->17838 18058 40461b 17837->18058 17839 40a890 17838->17839 17842 409e15 7 API calls 17838->17842 17839->17847 18014 40646f 17839->18014 17842->17839 17845 403b71 ctype 2 API calls 17845->17847 17846 409e15 7 API calls 17846->17847 18064 403ba5 free 17847->18064 18323 409ec6 17848->18323 17852 404672 17851->17852 17853 40466d 17851->17853 17854 404727 17852->17854 17855 402b04 CharUpperW 17852->17855 17853->17773 17854->17773 17855->17852 17865 402835 17856->17865 17861 40aa78 17861->17759 17861->17761 17861->17779 17866 40285e 17865->17866 17868 402840 17865->17868 17869 40df6b 17866->17869 17867 403ba5 free ctype 17867->17868 17868->17866 17868->17867 17870 40df0c VariantClear 17869->17870 17871 40df76 17870->17871 17871->17861 17872 40e16b 17871->17872 17873 40df87 8 API calls 17872->17873 17874 40e17d 17873->17874 17875 40e1ae 17874->17875 17876 40df79 VariantClear 17874->17876 17875->17861 17879 404738 17875->17879 17877 40e197 17876->17877 17877->17875 17878 4038f3 memmove _CxxThrowException malloc _CxxThrowException free 17877->17878 17878->17875 17880 404742 __EH_prolog 17879->17880 17881 402835 free 17880->17881 17882 404754 17881->17882 17883 403308 malloc _CxxThrowException 17882->17883 17896 4047da 17882->17896 17895 404765 17883->17895 17884 4047ad 17885 403503 _CxxThrowException malloc _CxxThrowException free 17884->17885 17886 4047be 17885->17886 17888 40d5c9 malloc _CxxThrowException free _CxxThrowException memcpy 17886->17888 17887 403503 _CxxThrowException malloc _CxxThrowException free 17887->17895 17889 4047c6 17888->17889 17891 402292 malloc _CxxThrowException 17889->17891 17890 40d5c9 malloc _CxxThrowException free _CxxThrowException memcpy 17890->17895 17892 4047d2 17891->17892 17894 403ba5 ctype free 17892->17894 17893 402292 malloc _CxxThrowException 17893->17895 17894->17896 17895->17884 17895->17887 17895->17890 17895->17893 17896->17861 17898 40b3ad memmove 17897->17898 17899 40acaa 17897->17899 17898->17899 17899->17774 17899->17775 17899->17779 17901 409f14 __EH_prolog 17900->17901 17902 406f66 VariantClear 17901->17902 17905 409f51 17901->17905 17906 409f72 17902->17906 17903 406f66 VariantClear 17904 409fb1 17903->17904 17904->17797 17904->17798 17905->17903 17906->17905 17907 409fbc 17906->17907 17908 406f66 VariantClear 17907->17908 17909 409fd8 17908->17909 18066 409c25 17909->18066 17912 409c25 VariantClear 17913 40a002 17912->17913 17913->17904 17914 409c25 VariantClear 17913->17914 17914->17904 18070 40d801 17915->18070 17918 40d993 17919 40d99d __EH_prolog 17918->17919 18095 403308 17919->18095 17921 40d9dd 17922 4033db 2 API calls 17921->17922 17923 40d9e9 17922->17923 18098 403ba5 free 17923->18098 17925 4036fb 4 API calls 17927 40d9b3 17925->17927 17927->17921 17927->17925 18099 404f62 17927->18099 17928 40a5c4 17928->17804 18017 40a130 17928->18017 18103 403134 17929->18103 17933 40a246 __EH_prolog 17932->17933 17934 403308 2 API calls 17933->17934 17935 40a267 17934->17935 18106 405c98 17935->18106 17938 40a283 17967 40a39e 17938->17967 17999 40a37c 17938->17999 18189 40a54a 17938->18189 17939 40a385 18199 4078ab 17939->18199 17940 40a3bf 17943 40a433 17940->17943 17944 40a3c4 17940->17944 17942 40a4a8 17953 4033db 2 API calls 17942->17953 17994 40a3b3 17942->17994 17949 40a455 17943->17949 17950 40a43f 17943->17950 17947 4033db 2 API calls 17944->17947 17954 40a3cd 17947->17954 17948 40a349 17948->17822 18250 406168 17949->18250 18249 4055ee RemoveDirectoryW 17950->18249 17969 40a4c7 17953->17969 17959 4078ab 20 API calls 17954->17959 17957 40a390 18221 409d0b 17957->18221 17964 40a3d9 17959->17964 17960 40a444 17965 40a44c 17960->17965 17960->17994 17970 40a3ed 17964->17970 17971 40a3dd 17964->17971 17974 409e15 7 API calls 17965->17974 18265 403ba5 free 17967->18265 17968 40a462 18258 4057da 17968->18258 17975 403308 2 API calls 17969->17975 18229 4055fb MoveFileW 17970->18229 17976 409d0b 4 API calls 17971->17976 17974->17967 17981 40a4ed 17975->17981 17998 40a31a 17976->17998 17978 40a2c9 17978->17998 18198 403ba5 free 17978->18198 17979 40a469 17980 40a471 GetLastError 17979->17980 17979->17994 17983 40a480 17980->17983 17980->17994 17984 405c98 20 API calls 17981->17984 17982 40a3f7 17985 40a426 17982->17985 17986 40a3fb 17982->17986 17983->17965 17990 40a500 17984->17990 18248 403ba5 free 17985->18248 17988 4062c4 GetLastError 17986->17988 17992 40a400 17988->17992 17989 40a42e 17989->17994 17991 40a517 17990->17991 18266 4055cd SetFileAttributesW 17990->18266 18267 403ba5 free 17991->18267 18230 409e31 17992->18230 18269 403ba5 free 17994->18269 18196 403ba5 free 17998->18196 17999->17939 17999->17940 18000 40a341 18197 403ba5 free 18000->18197 18002 40a51f 18268 403ba5 free 18002->18268 18006 4034bb 18005->18006 18008 4034b7 18005->18008 18007 403b71 ctype 2 API calls 18006->18007 18006->18008 18009 4034cf 18007->18009 18008->17825 18008->17847 18270 403ba5 free 18009->18270 18271 406575 18011->18271 18015 406459 5 API calls 18014->18015 18016 406489 18015->18016 18016->17846 18016->17847 18018 40a13a __EH_prolog 18017->18018 18274 4050af 18018->18274 18021 40a16a 18022 40a1b6 18021->18022 18025 403308 2 API calls 18021->18025 18315 401f6a 18022->18315 18027 40a189 18025->18027 18286 409af6 18027->18286 18030 40a1ae 18297 403ba5 free 18030->18297 18032 40a1b8 18033 403308 2 API calls 18032->18033 18035 40a1c0 18033->18035 18034 40a206 18313 403ba5 free 18034->18313 18035->18034 18037 4034ab 3 API calls 18035->18037 18038 40a1e6 18037->18038 18298 40b17a 18038->18298 18039 40a20e 18314 403ba5 free 18039->18314 18044 40a1fb 18307 40b3d4 18044->18307 18047 40a94c __EH_prolog 18046->18047 18048 4033db 2 API calls 18047->18048 18051 40a963 18048->18051 18049 4036fb 4 API calls 18050 40a9b2 18049->18050 18052 4033db 2 API calls 18050->18052 18051->18049 18053 40a9be 18052->18053 18321 403ba5 free 18053->18321 18055 40a604 18055->17811 18056->17810 18057->17821 18059 404628 18058->18059 18060 404646 18058->18060 18061 404634 18059->18061 18322 403ba5 free 18059->18322 18060->17845 18061->18060 18063 403b71 ctype 2 API calls 18061->18063 18063->18060 18064->17827 18065->17797 18068 409c2f __EH_prolog 18066->18068 18067 406f66 VariantClear 18069 409c9a 18067->18069 18068->18067 18069->17904 18069->17912 18073 40d80b __EH_prolog 18070->18073 18071 40d935 18075 40d942 18071->18075 18076 40d96f 18071->18076 18093 40a097 18071->18093 18072 40d867 18074 40d8c7 18072->18074 18085 40334b malloc _CxxThrowException 18072->18085 18073->18072 18073->18074 18077 40d850 wcscmp 18073->18077 18074->18071 18080 40d6a7 _CxxThrowException memmove malloc _CxxThrowException free 18074->18080 18082 403409 malloc _CxxThrowException free 18074->18082 18086 401f9f memmove free 18074->18086 18078 40332b malloc _CxxThrowException 18075->18078 18079 403409 malloc _CxxThrowException free 18076->18079 18076->18093 18077->18072 18077->18074 18081 40d94c 18078->18081 18079->18093 18080->18074 18083 40d5c9 malloc _CxxThrowException free _CxxThrowException memcpy 18081->18083 18082->18074 18084 40d95c 18083->18084 18087 402292 malloc _CxxThrowException 18084->18087 18088 40d8ab 18085->18088 18086->18074 18089 40d964 18087->18089 18090 405188 6 API calls 18088->18090 18091 403ba5 ctype free 18089->18091 18092 40d8bb 18090->18092 18091->18093 18094 403ba5 ctype free 18092->18094 18093->17918 18094->18074 18096 403b71 ctype malloc _CxxThrowException 18095->18096 18097 403315 18096->18097 18097->17927 18098->17928 18100 404f72 18099->18100 18101 404f6d 18099->18101 18100->17927 18102 403157 _CxxThrowException malloc _CxxThrowException free 18101->18102 18102->18100 18104 403b71 ctype malloc _CxxThrowException 18103->18104 18105 403149 18104->18105 18105->17807 18107 405ca2 __EH_prolog 18106->18107 18108 40334b malloc _CxxThrowException 18107->18108 18111 405e6d 18107->18111 18109 405cd6 18108->18109 18110 40334b malloc _CxxThrowException 18109->18110 18118 405ce3 18110->18118 18112 405ef4 18111->18112 18113 405ea1 18111->18113 18114 405f15 18112->18114 18116 405f10 18112->18116 18133 405f40 18112->18133 18117 405c89 GetFileAttributesW 18113->18117 18121 405a8d malloc _CxxThrowException free FindClose FindFirstFileW 18114->18121 18123 405eed 18114->18123 18115 403737 _CxxThrowException malloc _CxxThrowException free 18124 405d21 18115->18124 18119 405c89 GetFileAttributesW 18116->18119 18120 405ea8 18117->18120 18118->18115 18118->18124 18119->18114 18120->18114 18122 405ebc 18120->18122 18127 406010 18121->18127 18132 403447 malloc _CxxThrowException free 18122->18132 18128 405a6d FindClose 18123->18128 18125 405d66 18124->18125 18139 405d41 18124->18139 18126 405c98 18 API calls 18125->18126 18129 405d71 18126->18129 18127->18123 18130 406097 GetFileInformationByHandle CreateFileW CloseHandle 18127->18130 18131 405e56 18128->18131 18134 405d64 18129->18134 18135 405e5d 18129->18135 18130->18123 18131->17938 18131->17942 18136 405ed3 18132->18136 18133->18114 18137 406097 GetFileInformationByHandle CreateFileW CloseHandle 18133->18137 18141 4033db malloc _CxxThrowException 18134->18141 18138 403ba5 ctype free 18135->18138 18144 406097 GetFileInformationByHandle CreateFileW CloseHandle 18136->18144 18140 405f75 18137->18140 18142 405e65 18138->18142 18139->18134 18143 4034ab malloc _CxxThrowException free 18139->18143 18145 405f87 18140->18145 18146 405f79 18140->18146 18147 405d9a 18141->18147 18148 403ba5 ctype free 18142->18148 18143->18134 18144->18123 18151 40334b malloc _CxxThrowException 18145->18151 18149 403447 malloc _CxxThrowException free 18146->18149 18150 403308 malloc _CxxThrowException 18147->18150 18148->18111 18152 405f82 18149->18152 18175 405da6 18150->18175 18153 405f90 18151->18153 18156 405a6d FindClose 18152->18156 18155 404f62 _CxxThrowException malloc _CxxThrowException free 18153->18155 18154 405c49 10 API calls 18154->18175 18157 405f9c 18155->18157 18156->18131 18159 403634 _CxxThrowException malloc _CxxThrowException free 18157->18159 18158 405df2 18162 403ba5 ctype free 18158->18162 18161 405fa6 18159->18161 18160 405dea SetLastError 18160->18158 18164 405a8d malloc _CxxThrowException free FindClose FindFirstFileW 18161->18164 18165 405e34 18162->18165 18163 402ac7 CharUpperW 18163->18175 18166 405fb6 18164->18166 18169 403ba5 ctype free 18165->18169 18167 405fdc 18166->18167 18168 405fba wcscmp 18166->18168 18171 405c89 GetFileAttributesW 18167->18171 18168->18167 18188 405fd2 18168->18188 18172 405e3c 18169->18172 18170 405df6 18177 4036fb _CxxThrowException malloc _CxxThrowException free 18170->18177 18176 405fe7 18171->18176 18174 405a6d FindClose 18172->18174 18173 403ba5 ctype free 18173->18175 18178 405e46 18174->18178 18175->18154 18175->18158 18175->18160 18175->18163 18175->18170 18175->18173 18179 403308 malloc _CxxThrowException 18175->18179 18182 405ff9 18176->18182 18176->18188 18177->18158 18181 403ba5 ctype free 18178->18181 18179->18175 18180 403447 malloc _CxxThrowException free 18183 40606d 18180->18183 18185 405e4e 18181->18185 18186 403ba5 ctype free 18182->18186 18184 403ba5 ctype free 18183->18184 18184->18152 18187 403ba5 ctype free 18185->18187 18186->18114 18187->18131 18188->18180 18190 4031f9 malloc _CxxThrowException 18189->18190 18191 40a2ab 18190->18191 18192 4032e4 18191->18192 18193 403288 malloc _CxxThrowException 18192->18193 18194 403301 18193->18194 18195 403ba5 free 18194->18195 18195->17978 18196->18000 18197->17948 18198->17999 18200 4078b5 __EH_prolog 18199->18200 18201 4033db malloc _CxxThrowException 18200->18201 18202 4078db 18201->18202 18203 403308 malloc _CxxThrowException 18202->18203 18204 4078e7 18203->18204 18205 40790e 18204->18205 18207 403447 malloc _CxxThrowException free 18204->18207 18206 403634 _CxxThrowException malloc _CxxThrowException free 18205->18206 18208 407918 18206->18208 18207->18205 18209 403308 malloc _CxxThrowException 18208->18209 18211 407920 18209->18211 18210 407993 20 API calls 18210->18211 18211->18210 18212 407950 18211->18212 18213 407993 20 API calls 18212->18213 18214 40795f 18213->18214 18215 403ba5 ctype free 18214->18215 18216 40796f 18215->18216 18217 403ba5 ctype free 18216->18217 18218 407977 18217->18218 18219 403ba5 ctype free 18218->18219 18220 40797f 18219->18220 18220->17957 18220->17994 18222 409d15 __EH_prolog 18221->18222 18223 40338e malloc _CxxThrowException 18222->18223 18224 409d26 18223->18224 18225 409d5d _CxxThrowException malloc _CxxThrowException free 18224->18225 18226 409d35 18225->18226 18227 403ba5 ctype free 18226->18227 18228 409d4b 18227->18228 18228->17967 18229->17982 18231 409e3b __EH_prolog 18230->18231 18232 40338e malloc _CxxThrowException 18231->18232 18233 409e4c 18232->18233 18234 409e87 18233->18234 18236 403737 _CxxThrowException malloc _CxxThrowException free 18233->18236 18235 409d5d _CxxThrowException malloc _CxxThrowException free 18234->18235 18237 409e93 18235->18237 18238 409e63 18236->18238 18239 409d5d _CxxThrowException malloc _CxxThrowException free 18237->18239 18240 409e02 6 API calls 18238->18240 18241 409e9e 18239->18241 18242 409e6e 18240->18242 18245 403ba5 ctype free 18241->18245 18243 4036fb _CxxThrowException malloc _CxxThrowException free 18242->18243 18244 409e7b 18243->18244 18246 403ba5 ctype free 18244->18246 18247 409eb4 18245->18247 18246->18234 18247->17998 18248->17989 18249->17960 18251 406172 __EH_prolog 18250->18251 18252 403308 malloc _CxxThrowException 18251->18252 18253 406189 18252->18253 18254 405c98 20 API calls 18253->18254 18255 406198 18254->18255 18256 403ba5 ctype free 18255->18256 18257 4061b0 18256->18257 18257->17968 18257->17994 18259 405c89 GetFileAttributesW 18258->18259 18261 4057e2 18259->18261 18260 405801 DeleteFileW 18260->17979 18261->18260 18262 4055cd SetFileAttributesW 18261->18262 18263 4057fb 18262->18263 18263->18260 18264 4057ff 18263->18264 18264->17979 18265->17948 18266->17991 18267->18002 18268->17994 18269->17948 18270->18008 18272 4062e1 CreateFileW CloseHandle 18271->18272 18273 40658f 18272->18273 18273->17832 18273->17834 18276 4050b9 __EH_prolog 18274->18276 18275 40510b 18275->18021 18280 4051d7 18275->18280 18276->18275 18277 403b71 ctype malloc _CxxThrowException 18276->18277 18278 4050ed 18277->18278 18278->18275 18279 402292 malloc _CxxThrowException 18278->18279 18279->18278 18281 4051f5 18280->18281 18282 4051e8 18280->18282 18281->18021 18283 403ba5 ctype free 18282->18283 18284 4051ef 18283->18284 18285 403ba5 ctype free 18284->18285 18285->18281 18287 409b11 18286->18287 18288 4034ab malloc _CxxThrowException free 18287->18288 18293 409b35 18287->18293 18288->18293 18289 409c1e 18289->18030 18289->18032 18290 404f62 _CxxThrowException malloc _CxxThrowException free 18290->18293 18291 4036fb _CxxThrowException malloc _CxxThrowException free 18291->18293 18292 405609 CreateDirectoryW 18292->18293 18293->18289 18293->18290 18293->18291 18293->18292 18294 4062c4 GetLastError 18293->18294 18295 40621c 20 API calls 18293->18295 18296 409d78 6 API calls 18293->18296 18294->18293 18295->18293 18296->18293 18297->18022 18299 405584 CreateFileW SetFileTime CloseHandle 18298->18299 18300 40a1ee 18299->18300 18301 40d5c9 18300->18301 18302 40d5d6 18301->18302 18303 40d60a 18301->18303 18304 40d5f4 18302->18304 18305 40d5df _CxxThrowException 18302->18305 18303->18044 18306 410098 malloc _CxxThrowException free memcpy 18304->18306 18305->18304 18306->18303 18308 40b3de __EH_prolog 18307->18308 18309 403b71 ctype malloc _CxxThrowException 18308->18309 18310 40b3e9 18309->18310 18311 40b410 18310->18311 18312 4033db malloc _CxxThrowException 18310->18312 18311->18034 18312->18311 18313->18039 18314->18022 18316 401f93 18315->18316 18320 401f75 18315->18320 18317 403ba5 ctype free 18316->18317 18318 401f9b 18317->18318 18318->17804 18319 403ba5 free ctype 18319->18320 18320->18316 18320->18319 18321->18055 18322->18061 18326 404bb0 18323->18326 18327 404bba __EH_prolog 18326->18327 18328 404b73 CharUpperW 18327->18328 18329 404bd0 18328->18329 18330 404c43 18329->18330 18332 404a6c CharUpperW 18329->18332 18333 404bd4 18329->18333 18331 404b73 CharUpperW 18330->18331 18331->18333 18334 404bef 18332->18334 18333->17773 18334->18330 18335 4050af malloc _CxxThrowException 18334->18335 18336 404bfe 18335->18336 18337 401f9f memmove free 18336->18337 18338 404c0c 18337->18338 18339 404bb0 memmove CharUpperW malloc _CxxThrowException free 18338->18339 18340 404c23 18339->18340 18341 404c37 18340->18341 18342 404c27 18340->18342 18344 401f6a ctype free 18341->18344 18343 401f6a ctype free 18342->18343 18343->18333 18344->18330 18345 401c04 18350 403ba5 free 18345->18350 18347 401c18 18351 41233d 18347->18351 18350->18347 18352 412347 __EH_prolog 18351->18352 18369 4123af 18352->18369 18356 412367 18378 40cee9 18356->18378 18360 41237c 18384 403ba5 free 18360->18384 18362 412384 18385 403ba5 free 18362->18385 18364 41238c 18386 403ba5 free 18364->18386 18366 412394 18367 40cee9 ctype free 18366->18367 18368 401c21 18367->18368 18371 412421 18369->18371 18373 4123c2 18369->18373 18370 41235c 18377 403ba5 free 18370->18377 18371->18370 18394 403cdf fflush 18371->18394 18372 4123d6 fputs 18372->18371 18373->18372 18387 402cc8 18373->18387 18377->18356 18396 403ba5 free 18378->18396 18380 40cef4 18397 403ba5 free 18380->18397 18382 40cefc 18383 403ba5 free 18382->18383 18383->18360 18384->18362 18385->18364 18386->18366 18388 402cda _CxxThrowException 18387->18388 18389 402cef 18387->18389 18388->18389 18390 403b71 ctype 2 API calls 18389->18390 18391 402cf9 18390->18391 18395 403ba5 free 18391->18395 18393 402d05 18393->18372 18394->18370 18395->18393 18396->18380 18397->18382 18398 416f84 18399 416f91 18398->18399 18400 416fa2 18398->18400 18399->18400 18404 416fa9 18399->18404 18405 416fb3 __EH_prolog 18404->18405 18413 417899 18405->18413 18409 416fdc 18420 417003 18409->18420 18412 403ba5 free 18412->18400 18416 4178a3 __EH_prolog 18413->18416 18429 417901 18416->18429 18419 403ba5 free 18419->18409 18475 403ba5 free 18420->18475 18422 417011 18476 403ba5 free 18422->18476 18424 41701c 18477 403ba5 free 18424->18477 18426 417027 18478 417033 18426->18478 18439 417986 18429->18439 18431 417937 18446 403ba5 free 18431->18446 18433 417953 18447 403ba5 free 18433->18447 18435 4178ca 18436 415a25 18435->18436 18437 415a45 18436->18437 18438 415a2e memset 18436->18438 18437->18419 18438->18437 18448 417a02 18439->18448 18444 4179a8 18465 403ba5 free 18444->18465 18445 4179bf 18445->18431 18446->18433 18447->18435 18467 403ba5 free 18448->18467 18450 417a12 18468 403ba5 free 18450->18468 18452 417a26 18469 403ba5 free 18452->18469 18454 417a31 18470 403ba5 free 18454->18470 18456 417a3c 18471 403ba5 free 18456->18471 18458 417a47 18472 403ba5 free 18458->18472 18460 417a52 18473 403ba5 free 18460->18473 18462 417a5d 18463 417990 18462->18463 18474 403ba5 free 18462->18474 18463->18444 18466 403ba5 free 18463->18466 18465->18445 18466->18444 18467->18450 18468->18452 18469->18454 18470->18456 18471->18458 18472->18460 18473->18462 18474->18463 18475->18422 18476->18424 18477->18426 18509 403ba5 free 18478->18509 18480 417042 18510 403ba5 free 18480->18510 18482 41704d 18511 403ba5 free 18482->18511 18484 417058 18512 403ba5 free 18484->18512 18486 417069 18513 403ba5 free 18486->18513 18488 417070 18514 403ba5 free 18488->18514 18490 417081 18515 403ba5 free 18490->18515 18492 417088 18516 403ba5 free 18492->18516 18494 417099 18517 403ba5 free 18494->18517 18496 4170a0 18518 403ba5 free 18496->18518 18498 4170ae 18519 403ba5 free 18498->18519 18500 4170b5 18520 403ba5 free 18500->18520 18502 4170bd 18521 403ba5 free 18502->18521 18504 4170c5 18522 403ba5 free 18504->18522 18506 4170cd 18523 4170da 18506->18523 18509->18480 18510->18482 18511->18484 18512->18486 18513->18488 18514->18490 18515->18492 18516->18494 18517->18496 18518->18498 18519->18500 18520->18502 18521->18504 18522->18506 18546 403ba5 free 18523->18546 18525 4170e5 18547 403ba5 free 18525->18547 18527 4170ed 18548 403ba5 free 18527->18548 18529 4170f5 18549 403ba5 free 18529->18549 18531 4170fd 18550 403ba5 free 18531->18550 18533 417105 18551 403ba5 free 18533->18551 18535 41710d 18552 403ba5 free 18535->18552 18537 417115 18553 403ba5 free 18537->18553 18539 41711d 18554 403ba5 free 18539->18554 18541 417125 18555 403ba5 free 18541->18555 18543 41712d 18556 403ba5 free 18543->18556 18545 416f9c 18545->18412 18546->18525 18547->18527 18548->18529 18549->18531 18550->18533 18551->18535 18552->18537 18553->18539 18554->18541 18555->18543 18556->18545 18557 415bc9 18562 415be9 18557->18562 18560 415be1 18563 415bf3 __EH_prolog 18562->18563 18571 415fa4 18563->18571 18570 403ba5 free 18570->18560 18572 415fae __EH_prolog 18571->18572 18589 403ba5 free 18572->18589 18574 415c09 18575 415f68 18574->18575 18576 415f98 18575->18576 18580 415f73 18575->18580 18591 403ba5 free 18576->18591 18578 415c15 18582 415b22 18578->18582 18579 424610 CloseHandle GetLastError ctype 18579->18580 18580->18576 18580->18579 18590 403ba5 free 18580->18590 18592 403ba5 free 18582->18592 18584 415b33 18593 403ba5 free 18584->18593 18586 415b3b 18594 415a47 18586->18594 18589->18574 18590->18580 18591->18578 18592->18584 18593->18586 18605 403ba5 free 18594->18605 18596 415a52 18606 403ba5 free 18596->18606 18598 415a5a 18607 403ba5 free 18598->18607 18600 415a62 18608 403ba5 free 18600->18608 18602 415a6a 18609 403ba5 free 18602->18609 18604 415a71 18604->18560 18604->18570 18605->18596 18606->18598 18607->18600 18608->18602 18609->18604 18610 425e4c __set_app_type __p__fmode __p__commode 18611 425eba 18610->18611 18612 425ec3 __setusermatherr 18611->18612 18613 425ecf 18611->18613 18612->18613 18618 425f7a _controlfp 18613->18618 18615 425ed4 _initterm __getmainargs _initterm __p___initenv 18619 411e83 18615->18619 18618->18615 18620 411e8d __EH_prolog 18619->18620 18633 412153 GetVersionExW 18620->18633 18623 411eb3 fputs 18632 412142 exit _XcptFilter 18623->18632 18624 411ecf 18635 41040f SetConsoleCtrlHandler 18624->18635 18634 411eaf 18633->18634 18634->18623 18634->18624 18636 410427 _CxxThrowException 18635->18636 18637 41043c 18635->18637 18636->18637 18638 41eb90 GetVersion 18637->18638 18639 41eb9c GetModuleHandleW GetProcAddress 18638->18639 18640 411ee8 18638->18640 18639->18640 18641 41ebb7 18639->18641 18642 40100a 18640->18642 18641->18640 18643 401014 __EH_prolog 18642->18643 18838 41ebc0 GetVersion 18643->18838 18647 401049 GetCommandLineW 18846 40334b 18647->18846 18653 401077 18654 403308 2 API calls 18653->18654 18655 401080 18654->18655 18656 403308 2 API calls 18655->18656 18657 40108c 18656->18657 18872 40542c GetModuleFileNameW 18657->18872 18662 4010a7 fputs 19039 403ba5 free 18662->19039 18663 4010cc 18880 403ba5 free 18663->18880 18666 4010d8 18668 4010e7 18666->18668 19041 401f9f 18666->19041 18667 4010bc 19040 403ba5 free 18667->19040 18881 40248b 18668->18881 18673 401f6a ctype free 18703 40117e 18673->18703 18676 401114 fputs 19049 403cee fputc 18676->19049 18677 401869 19142 401e69 fputs 18677->19142 18680 40112f fputs 19050 403cee fputc 18680->19050 18681 40186e 18684 4024d3 free 18681->18684 18682 401198 18682->18677 18701 4011c0 18682->18701 19075 401e16 18682->19075 18687 40187d 18684->18687 18686 401146 19051 403d01 18686->19051 19143 403ba5 free 18687->19143 18690 4011df fputs 19080 403cee fputc 18690->19080 18695 401885 18698 401f6a ctype free 18695->18698 18696 4011fc 18699 403d01 11 API calls 18696->18699 18697 40115a 19064 4024d3 18697->19064 18698->18703 18704 401204 18699->18704 18702 401265 18701->18702 18707 40338e 2 API calls 18701->18707 18706 401293 18702->18706 18710 4012f7 _CxxThrowException 18702->18710 18717 401ec3 8 API calls 18702->18717 18837 410461 SetConsoleCtrlHandler 18703->18837 19081 403cee fputc 18704->19081 18711 403308 2 API calls 18706->18711 18712 401245 18707->18712 18714 40130c 18710->18714 18718 4012b0 18711->18718 19082 401ec3 18712->19082 18720 403308 2 API calls 18714->18720 18715 40120b 18725 4024d3 free 18715->18725 18716 401171 18721 401f6a ctype free 18716->18721 18717->18702 18722 4012cf 18718->18722 18726 4034ab 3 API calls 18718->18726 18724 401314 18720->18724 18721->18703 18901 4061c1 18722->18901 18729 401330 18724->18729 18732 4034ab 3 API calls 18724->18732 18730 4016a6 18725->18730 18726->18722 18909 40504a 18729->18909 19126 403ba5 free 18730->19126 18731 4012db _CxxThrowException 18731->18710 18732->18729 18735 4016ae 18737 401f6a ctype free 18735->18737 18737->18703 18738 40d5c9 5 API calls 18739 401362 18738->18739 18915 402292 18739->18915 18742 40d5c9 5 API calls 18743 401376 18742->18743 18744 402292 2 API calls 18743->18744 18745 401382 18744->18745 18746 403b71 ctype 2 API calls 18745->18746 18747 401397 18746->18747 18921 40db57 18747->18921 18749 4013d5 18750 4013f0 18749->18750 18751 4013d9 _CxxThrowException 18749->18751 18752 401854 _CxxThrowException 18750->18752 18753 4013fa 18750->18753 18751->18750 18752->18677 18754 403b71 ctype 2 API calls 18753->18754 18755 401404 18754->18755 18757 401417 18755->18757 19088 401a02 18755->19088 18758 4034ab 3 API calls 18757->18758 18759 401464 18758->18759 18934 40190f 18759->18934 18762 4034ab 3 API calls 18763 4014b0 18762->18763 18764 403308 2 API calls 18763->18764 18765 4014b8 18764->18765 18937 40c369 18765->18937 18771 40153d 19107 4019e5 18771->19107 18775 40155a fputs 18777 403d01 11 API calls 18775->18777 18776 4016c2 18779 4016ea 18776->18779 19127 403cee fputc 18776->19127 18778 401576 18777->18778 18778->18776 18799 4015f7 18778->18799 18781 40171f 18779->18781 19129 403cee fputc 18779->19129 18784 401764 18781->18784 19131 403cee fputc 18781->19131 18782 4016d4 fputs 19128 403cee fputc 18782->19128 18785 4017a9 18784->18785 19136 403cee fputc 18784->19136 18787 401709 fputs 19130 403cee fputc 18787->19130 18792 40173b fputs 18800 401615 18799->18800 18801 4015fe _CxxThrowException 18799->18801 19112 403ba5 free 18800->19112 18801->18800 18807 40161d 19113 4019ce 18807->19113 18836 4010c4 18836->18673 18837->18632 18839 41ebd3 GetModuleHandleW GetProcAddress 18838->18839 18840 41ebfd GetSystemDirectoryW 18838->18840 18839->18840 18842 41ebee 18839->18842 18841 401025 SetFileApisToOEM fputs 18840->18841 18843 41ec15 18840->18843 18845 402250 18841->18845 18842->18840 18842->18841 18843->18841 18844 41ec6b LoadLibraryExW 18843->18844 18844->18841 18844->18843 18845->18647 18847 40335b 18846->18847 18848 403134 2 API calls 18847->18848 18849 40105d 18848->18849 18850 4023c8 18849->18850 18851 4023d2 __EH_prolog 18850->18851 18852 4033db 2 API calls 18851->18852 18853 4023e1 18852->18853 19144 403831 18853->19144 18856 402835 free 18869 4023fc 18856->18869 18857 403308 malloc _CxxThrowException 18857->18869 18859 402463 19154 403ba5 free 18859->19154 18860 40d5c9 5 API calls 18860->18869 18861 4034ab 3 API calls 18861->18869 18863 402292 2 API calls 18863->18869 18864 40246b 19155 403ba5 free 18864->19155 18865 403ba5 free ctype 18865->18869 18867 402473 19156 403ba5 free 18867->19156 18869->18857 18869->18859 18869->18860 18869->18861 18869->18863 18869->18865 19148 40231c 18869->19148 18870 40106c 18871 403ba5 free 18870->18871 18871->18653 18873 401098 18872->18873 18874 405469 18872->18874 18876 405814 18873->18876 18874->18873 18875 403447 3 API calls 18874->18875 18875->18873 18877 406e42 18876->18877 19176 406b60 18877->19176 18880->18666 18882 402495 __EH_prolog 18881->18882 19258 402dda 18882->19258 18885 403308 2 API calls 18886 4010f2 18885->18886 18887 402706 18886->18887 18888 402710 __EH_prolog 18887->18888 18889 402835 free 18888->18889 18890 40273c 18889->18890 18891 402749 18890->18891 19261 402523 18890->19261 18893 403b71 ctype 2 API calls 18891->18893 18898 40275e 18893->18898 18894 40110c 18894->18676 18894->18682 18895 40d5c9 5 API calls 18895->18898 18896 402292 2 API calls 18896->18898 18898->18894 18898->18895 18898->18896 18899 402818 18898->18899 19267 402576 18898->19267 18900 4034ab 3 API calls 18899->18900 18900->18894 18902 4061cb __EH_prolog 18901->18902 18903 403308 2 API calls 18902->18903 18904 4061e2 18903->18904 18905 405c98 20 API calls 18904->18905 18906 4061f3 18905->18906 19290 403ba5 free 18906->19290 18908 4012d7 18908->18714 18908->18731 18910 405075 18909->18910 18911 405055 18909->18911 19338 405336 18910->19338 18911->18910 19291 404cba 18911->19291 18916 40229c __EH_prolog 18915->18916 18917 403b71 ctype 2 API calls 18916->18917 18918 4022a7 18917->18918 18919 40136e 18918->18919 18920 4033db 2 API calls 18918->18920 18919->18742 18920->18919 18922 40db61 __EH_prolog 18921->18922 19432 40dc98 18922->19432 18924 40dc52 18924->18749 18926 40db6f 18926->18924 18927 403308 malloc _CxxThrowException 18926->18927 18928 4035c8 malloc _CxxThrowException free 18926->18928 18930 40d5c9 5 API calls 18926->18930 18933 403ba5 free ctype 18926->18933 19437 40dc71 18926->19437 19440 40da4f 18926->19440 19458 40dd83 18926->19458 19464 4021ee 18926->19464 18927->18926 18928->18926 18930->18926 18933->18926 19529 401929 18934->19529 18948 40c373 __EH_prolog 18937->18948 18938 40c4bd 18939 40c4d6 18938->18939 18941 403b71 ctype 2 API calls 18938->18941 18942 403b71 ctype 2 API calls 18939->18942 18940 403308 2 API calls 18940->18948 18941->18939 18943 40c502 18942->18943 19000 40c515 18943->19000 19724 40941e 18943->19724 18944 4033db 2 API calls 18944->18948 18947 405c98 20 API calls 18947->18948 18948->18938 18948->18940 18948->18944 18948->18947 18949 40c519 18948->18949 18951 40c51e 18948->18951 18953 403ba5 free ctype 18948->18953 19718 40c097 18948->19718 18950 4062c4 GetLastError 18949->18950 18950->18951 19738 40cf00 18951->19738 18953->18948 18955 40c608 19792 403ba5 free 18955->19792 18958 403308 2 API calls 18958->19000 18960 40cd33 19793 403ba5 free 18960->19793 18961 40c54c 19755 403ba5 free 18961->19755 18965 405c98 20 API calls 18965->19000 18966 40c554 19756 403ba5 free 18966->19756 18968 40cab2 18972 4062c4 GetLastError 18968->18972 18969 40cc4a 18971 4062c4 GetLastError 18969->18971 18970 40151f 19100 40205a 18970->19100 18973 40cc4f 18971->18973 18974 40cab7 18972->18974 18975 40cf00 6 API calls 18973->18975 19778 403ba5 free 18974->19778 18977 40cc61 18975->18977 19791 403ba5 free 18977->19791 18978 40cad7 19779 403ba5 free 18978->19779 18984 40cc39 19790 403ba5 free 18984->19790 18988 40caf6 19780 403ba5 free 18988->19780 18990 40cb01 18991 40205a free 18990->18991 18994 40cb0e 18991->18994 18992 40cb3e 19782 403ba5 free 18992->19782 18996 40ce93 free 18994->18996 18995 40cb49 18997 40205a free 18995->18997 18998 40cb1d 18996->18998 18999 40cb56 18997->18999 19781 403ba5 free 18998->19781 19003 40ce93 free 18999->19003 19000->18955 19000->18958 19000->18965 19000->18968 19000->18969 19000->18978 19000->18988 19000->18992 19002 40205a free 19000->19002 19006 4033db 2 API calls 19000->19006 19011 40cb87 19000->19011 19013 40cbc2 19000->19013 19018 4034ab malloc _CxxThrowException free 19000->19018 19021 40cbe9 19000->19021 19025 403ba5 free ctype 19000->19025 19037 403cee fputc 19000->19037 19535 4097c2 19000->19535 19539 410dc7 19000->19539 19552 40cde7 19000->19552 19558 40d4c8 19000->19558 19564 40cd50 19000->19564 19568 40fdab 19000->19568 19571 4110b7 19000->19571 19616 40cf6f 19000->19616 19706 40ce93 19000->19706 19757 4059a9 19000->19757 19766 40593d 19000->19766 19774 40c320 19000->19774 19002->19000 19005 40cb65 19003->19005 19004 40cac1 19789 403ba5 free 19004->19789 19783 403ba5 free 19005->19783 19006->19000 19784 403ba5 free 19011->19784 19786 403ba5 free 19013->19786 19015 40cb92 19017 40205a free 19015->19017 19020 40cb9f 19017->19020 19018->19000 19019 40cbcd 19022 40205a free 19019->19022 19024 40ce93 free 19020->19024 19787 403ba5 free 19021->19787 19026 40cbda 19022->19026 19028 40cbae 19024->19028 19025->19000 19029 40ce93 free 19026->19029 19027 40cbf9 19030 40205a free 19027->19030 19785 403ba5 free 19028->19785 19029->19021 19032 40cc06 19030->19032 19033 40ce93 free 19032->19033 19034 40cc15 19033->19034 19788 403ba5 free 19034->19788 19037->19000 19039->18667 19040->18836 19042 401fbe 19041->19042 19043 401fb1 19041->19043 21497 40225d memmove 19042->21497 21495 403ba5 free 19043->21495 19046 401fb8 21496 403ba5 free 19046->21496 19047 401fc8 19047->18668 19049->18680 19050->18686 19052 403d0b __EH_prolog 19051->19052 19053 402dda 2 API calls 19052->19053 19054 403d19 19053->19054 19055 40334b 2 API calls 19054->19055 19056 403d28 19055->19056 19057 403d5e 11 API calls 19056->19057 19058 403d3b 19057->19058 21498 403ba5 free 19058->21498 19060 403d43 21499 403ba5 free 19060->21499 19062 401153 19063 403cee fputc 19062->19063 19063->18697 19065 4024dd __EH_prolog 19064->19065 19066 4024f8 19065->19066 19067 402523 free 19065->19067 21500 403ba5 free 19066->21500 19067->19066 19069 402500 21501 403ba5 free 19069->21501 19071 402508 19072 401f6a ctype free 19071->19072 19073 401169 19072->19073 19074 403ba5 free 19073->19074 19074->18716 19076 4033db 2 API calls 19075->19076 19077 401e29 19076->19077 21502 403ba5 free 19077->21502 19079 4011db 19079->18690 19079->18701 19080->18696 19081->18715 21503 401ee5 19082->21503 19085 401259 19087 403ba5 free 19085->19087 19087->18702 19089 401a0c __EH_prolog 19088->19089 21532 401ac5 19089->21532 19092 402dda 2 API calls 19093 401a56 19092->19093 19094 403308 2 API calls 19093->19094 19095 401a65 19094->19095 19096 403308 2 API calls 19095->19096 19097 401a74 19096->19097 19098 403308 2 API calls 19097->19098 19099 401a83 19098->19099 19099->18757 19104 402061 19100->19104 19101 402073 21560 403ba5 free 19101->21560 19104->19101 21561 403ba5 free 19104->21561 19105 401531 19106 403ba5 free 19105->19106 19106->18771 19108 401545 19107->19108 19109 4019ee 19107->19109 19108->18778 19111 403cee fputc 19108->19111 19109->19108 19110 4123af ctype 6 API calls 19109->19110 19110->19108 19111->18775 19112->18807 19126->18735 19127->18782 19128->18779 19129->18787 19130->18781 19131->18792 19142->18681 19143->18695 19145 403839 19144->19145 19146 4023f5 19145->19146 19147 40385a memmove 19145->19147 19146->18856 19147->19146 19149 4023a1 19148->19149 19152 402347 19148->19152 19149->18869 19150 4023b3 19163 403447 19150->19163 19152->19149 19152->19150 19157 403157 19152->19157 19154->18864 19155->18867 19156->18870 19158 40316d 19157->19158 19159 403192 19158->19159 19160 40317d _CxxThrowException 19158->19160 19169 40309b 19159->19169 19160->19159 19164 403459 19163->19164 19165 40347d 19164->19165 19166 403b71 ctype 2 API calls 19164->19166 19165->19149 19167 403473 19166->19167 19175 403ba5 free 19167->19175 19170 403b71 ctype 2 API calls 19169->19170 19171 4030b0 19170->19171 19174 403ba5 free 19171->19174 19173 4030d6 19173->19152 19174->19173 19175->19165 19177 406b6a __EH_prolog 19176->19177 19178 403447 3 API calls 19177->19178 19180 406b7d 19178->19180 19179 406be3 19181 403308 2 API calls 19179->19181 19180->19179 19186 406b8f 19180->19186 19182 406beb 19181->19182 19183 406c42 19182->19183 19187 406bfa 19182->19187 19220 405819 19183->19220 19185 4010a3 19185->18662 19185->18663 19186->19185 19189 40334b 2 API calls 19186->19189 19188 403447 3 API calls 19187->19188 19194 406c03 19188->19194 19190 406ba8 19189->19190 19215 406cc9 19190->19215 19198 403308 2 API calls 19194->19198 19211 406c4e 19194->19211 19195 406bd3 19219 403ba5 free 19195->19219 19197 4036fb 4 API calls 19197->19195 19199 406c1d 19198->19199 19200 406c52 19199->19200 19201 406c25 19199->19201 19202 403447 3 API calls 19200->19202 19203 406c3d 19201->19203 19205 404f62 4 API calls 19201->19205 19202->19203 19236 4036af 19203->19236 19205->19203 19207 406cc9 memmove 19208 406c72 19207->19208 19210 4034ab 3 API calls 19208->19210 19214 406c76 19208->19214 19212 406c96 19210->19212 19241 403ba5 free 19211->19241 19213 4036fb 4 API calls 19212->19213 19213->19214 19240 403ba5 free 19214->19240 19217 406cdc 19215->19217 19216 406bb4 19216->19195 19216->19197 19217->19216 19218 403a54 memmove 19217->19218 19218->19217 19219->19185 19242 425a80 19220->19242 19222 405823 GetCurrentDirectoryW 19223 40585f 19222->19223 19233 40585b 19222->19233 19224 405863 19223->19224 19225 40587b 19223->19225 19226 403447 3 API calls 19224->19226 19227 403308 2 API calls 19225->19227 19226->19233 19228 405883 19227->19228 19229 405896 GetCurrentDirectoryW 19228->19229 19243 4030e3 19228->19243 19231 4058cb 19229->19231 19234 4058a0 19229->19234 19250 403ba5 free 19231->19250 19233->19194 19234->19231 19235 4034ab 3 API calls 19234->19235 19235->19231 19237 4036bf 19236->19237 19252 40319a 19237->19252 19240->19211 19241->19185 19242->19222 19244 4030f5 _CxxThrowException 19243->19244 19245 40310a 19243->19245 19244->19245 19246 403b71 ctype 2 API calls 19245->19246 19247 403115 19246->19247 19251 403ba5 free 19247->19251 19249 403122 19249->19229 19250->19233 19251->19249 19253 4031de 19252->19253 19255 4031ae 19252->19255 19253->19207 19254 4031e4 _CxxThrowException 19255->19254 19256 4031d7 19255->19256 19257 40309b 3 API calls 19256->19257 19257->19253 19259 403b71 ctype 2 API calls 19258->19259 19260 4024b8 19259->19260 19260->18885 19262 402530 19261->19262 19264 402554 19261->19264 19263 40254e 19262->19263 19280 403ba5 free 19262->19280 19263->18891 19264->19263 19281 403ba5 free 19264->19281 19268 402580 __EH_prolog 19267->19268 19270 402691 19268->19270 19271 4026c0 19268->19271 19275 402601 19268->19275 19272 40334b 2 API calls 19270->19272 19271->18898 19273 40269f 19272->19273 19274 40d5c9 5 API calls 19273->19274 19276 4026ad 19274->19276 19275->19271 19283 402e21 19275->19283 19277 402292 2 API calls 19276->19277 19278 4026b8 19277->19278 19282 403ba5 free 19278->19282 19280->19263 19281->19263 19282->19271 19285 402e33 19283->19285 19284 402e52 19284->19271 19285->19284 19286 403b71 ctype 2 API calls 19285->19286 19287 402e48 19286->19287 19289 403ba5 free 19287->19289 19289->19284 19290->18908 19292 404cc4 __EH_prolog 19291->19292 19293 404cd5 _CxxThrowException 19292->19293 19294 404cea 19292->19294 19293->19294 19295 404738 6 API calls 19294->19295 19296 404d00 19295->19296 19297 4051d7 free 19296->19297 19298 404d2e 19296->19298 19297->19298 19299 403308 2 API calls 19298->19299 19300 404d50 19299->19300 19301 404d8b 19300->19301 19303 404d78 wcscmp 19300->19303 19302 404e58 19301->19302 19357 404f8e 19301->19357 19343 404c66 19302->19343 19303->19301 19307 404e81 19309 404ed2 19307->19309 19316 402835 free 19307->19316 19363 40511e 19309->19363 19310 404dcf wcscmp 19312 404da8 19310->19312 19313 404de5 wcscmp 19310->19313 19312->19310 19322 404e00 19312->19322 19313->19312 19314 4034ab 3 API calls 19314->19307 19317 404ea6 19316->19317 19320 40338e 2 API calls 19317->19320 19319 4036fb 4 API calls 19319->19322 19323 404eb3 19320->19323 19322->19302 19322->19319 19325 404f62 4 API calls 19322->19325 19329 401f9f 2 API calls 19322->19329 19326 40d5c9 5 API calls 19323->19326 19325->19322 19330 404ec1 19326->19330 19327 401f6a ctype free 19328 404f3c 19327->19328 19380 403ba5 free 19328->19380 19329->19322 19332 402292 2 API calls 19330->19332 19334 404eca 19332->19334 19333 404f44 19335 401f6a ctype free 19333->19335 19362 403ba5 free 19334->19362 19337 404f51 19335->19337 19337->18911 19340 401344 19338->19340 19341 405341 19338->19341 19340->18738 19341->19340 19427 412d32 19341->19427 19430 403ba5 free 19341->19430 19344 404c8d 19343->19344 19346 404c71 19343->19346 19344->19307 19347 405276 19344->19347 19345 404664 CharUpperW 19345->19346 19346->19344 19346->19345 19348 405280 __EH_prolog 19347->19348 19349 40d5c9 5 API calls 19348->19349 19350 40528a 19349->19350 19351 403b71 ctype 2 API calls 19350->19351 19352 405291 19351->19352 19353 403308 2 API calls 19352->19353 19356 404e7a 19352->19356 19354 4052a7 19353->19354 19381 405246 19354->19381 19356->19314 19358 404f9a 19357->19358 19361 404fa9 19357->19361 19359 404fd7 wcscmp 19358->19359 19358->19361 19360 404ff0 wcscmp 19359->19360 19359->19361 19360->19361 19361->19312 19362->19309 19364 405130 19363->19364 19365 404f01 19363->19365 19366 402835 free 19364->19366 19373 404ac5 19365->19373 19367 405137 19366->19367 19368 405147 _CxxThrowException 19367->19368 19369 40515c 19367->19369 19372 405164 19367->19372 19368->19369 19384 410098 19369->19384 19371 402292 2 API calls 19371->19372 19372->19365 19372->19371 19376 404ad4 19373->19376 19377 404b0e 19376->19377 19379 401f9f 2 API calls 19376->19379 19393 404b3b 19376->19393 19400 404aa1 19377->19400 19379->19376 19380->19333 19382 403308 2 API calls 19381->19382 19383 405256 19382->19383 19383->19356 19385 4100aa 19384->19385 19386 403b71 ctype 2 API calls 19385->19386 19387 4100b5 19386->19387 19388 4100bf memcpy 19387->19388 19389 4100ce 19387->19389 19388->19389 19392 403ba5 free 19389->19392 19391 4100d5 19391->19372 19392->19391 19406 404a6c 19393->19406 19396 404b4b 19396->19376 19399 4034ab 3 API calls 19399->19396 19401 404aac 19400->19401 19402 40d5c9 5 API calls 19401->19402 19403 404ab6 19402->19403 19418 4053a7 19403->19418 19408 404a95 19406->19408 19409 404a77 19406->19409 19407 404664 CharUpperW 19407->19409 19408->19396 19410 4051fd 19408->19410 19409->19407 19409->19408 19411 405207 __EH_prolog 19410->19411 19412 40d5c9 5 API calls 19411->19412 19413 405210 19412->19413 19414 403b71 ctype 2 API calls 19413->19414 19415 405217 19414->19415 19416 404b5c 19415->19416 19417 405246 2 API calls 19415->19417 19416->19399 19417->19416 19419 4053b1 __EH_prolog 19418->19419 19420 403b71 ctype 2 API calls 19419->19420 19421 4053bc 19420->19421 19422 404ac1 19421->19422 19424 4053f5 19421->19424 19422->19327 19425 4050af 2 API calls 19424->19425 19426 405403 19425->19426 19426->19422 19431 403ba5 free 19427->19431 19429 412d39 19429->19341 19430->19341 19431->19429 19433 40dcc0 19432->19433 19435 40dca3 19432->19435 19433->18926 19435->19433 19470 4021bb 19435->19470 19476 403ba5 free 19435->19476 19438 403308 2 API calls 19437->19438 19439 40dc8a 19438->19439 19439->18926 19441 40da59 __EH_prolog 19440->19441 19478 403aa2 19441->19478 19444 403aa2 6 API calls 19457 40da92 19444->19457 19445 40db2f 19446 401f6a ctype free 19445->19446 19448 40db3a 19446->19448 19447 403308 malloc _CxxThrowException 19447->19457 19449 401f6a ctype free 19448->19449 19450 40db46 19449->19450 19450->18926 19451 4034ab 3 API calls 19451->19457 19452 4034ab 3 API calls 19454 40dad9 wcscmp 19452->19454 19453 40d5c9 5 API calls 19453->19457 19454->19457 19456 403ba5 free ctype 19456->19457 19457->19445 19457->19447 19457->19451 19457->19452 19457->19453 19457->19456 19494 40dd20 19457->19494 19459 40dd8d __EH_prolog 19458->19459 19460 403b71 ctype 2 API calls 19459->19460 19461 40dd98 19460->19461 19463 40ddae 19461->19463 19503 40dde6 19461->19503 19463->18926 19465 4021f8 __EH_prolog 19464->19465 19466 40221e 19465->19466 19515 402234 19465->19515 19520 403ba5 free 19466->19520 19469 402225 19469->18926 19471 4021c5 __EH_prolog 19470->19471 19472 4021ee ctype free 19471->19472 19473 4021d8 19472->19473 19477 403ba5 free 19473->19477 19475 4021e0 19475->19435 19476->19435 19477->19475 19479 403aac __EH_prolog 19478->19479 19480 402835 free 19479->19480 19481 403abe 19480->19481 19482 403b61 19481->19482 19483 403308 2 API calls 19481->19483 19482->19444 19488 403ad6 19483->19488 19484 403b40 19485 403b59 19484->19485 19486 40d5c9 5 API calls 19484->19486 19502 403ba5 free 19485->19502 19490 403b4d 19486->19490 19488->19484 19489 403157 4 API calls 19488->19489 19491 40d5c9 5 API calls 19488->19491 19493 402292 2 API calls 19488->19493 19489->19488 19492 402292 2 API calls 19490->19492 19491->19488 19492->19485 19493->19488 19495 40dd2a __EH_prolog 19494->19495 19496 403b71 ctype 2 API calls 19495->19496 19497 40dd36 19496->19497 19498 40dd60 19497->19498 19499 4033db 2 API calls 19497->19499 19498->19457 19500 40dd50 19499->19500 19501 4033db 2 API calls 19500->19501 19501->19498 19502->19482 19504 40ddf0 __EH_prolog 19503->19504 19505 4033db 2 API calls 19504->19505 19506 40de1d 19505->19506 19509 40de9d 19506->19509 19511 40dea7 __EH_prolog 19509->19511 19510 40de2d 19510->19463 19511->19510 19512 403b71 ctype 2 API calls 19511->19512 19513 40dedb 19512->19513 19513->19510 19514 40dd20 2 API calls 19513->19514 19514->19513 19521 4185e3 19515->19521 19518 402249 19518->19465 19520->19469 19527 403ba5 free 19521->19527 19523 4185ee 19528 403ba5 free 19523->19528 19525 40223c 19525->19518 19526 403ba5 free 19525->19526 19526->19518 19527->19523 19528->19525 19530 401933 __EH_prolog 19529->19530 19531 403308 2 API calls 19530->19531 19532 401967 19531->19532 19533 403308 2 API calls 19532->19533 19534 40146f 19533->19534 19534->18762 19536 4097d3 19535->19536 19537 4097d9 19535->19537 19794 403ba5 free 19536->19794 19537->19000 19540 403447 3 API calls 19539->19540 19541 410ddc 19540->19541 19542 410e8a 19541->19542 19795 410a5b 19541->19795 19542->19000 19545 410e6c 19545->19542 19547 402e21 3 API calls 19545->19547 19547->19542 19548 410e46 fputs 19800 403eb1 19548->19800 19553 40cdf1 __EH_prolog 19552->19553 19554 403308 2 API calls 19553->19554 19555 40ce26 19554->19555 19847 40ce41 19555->19847 19560 40d4d2 __EH_prolog 19558->19560 19559 40d524 19559->19000 19560->19559 19561 403b71 ctype 2 API calls 19560->19561 19562 40d506 19561->19562 19562->19559 19853 40d60d 19562->19853 19565 40cd60 19564->19565 19566 403308 2 API calls 19565->19566 19567 40cd7d 19566->19567 19567->19000 19856 40f9e0 19568->19856 19572 4110c1 __EH_prolog 19571->19572 19573 403447 3 API calls 19572->19573 19574 4110d7 19573->19574 19575 4019e5 6 API calls 19574->19575 19576 4110e8 19575->19576 20415 41075c 19576->20415 19578 411397 19580 4113b6 19578->19580 20470 403cdf fflush 19578->20470 19579 411366 19593 411392 19579->19593 20419 41171e 19579->20419 19582 4113c4 fputs 19580->19582 19580->19593 19584 403eb1 11 API calls 19582->19584 19586 4113e4 19584->19586 20471 403cee fputc 19586->20471 19587 4111c5 fputs 20443 403cee fputc 19587->20443 19589 410e92 9 API calls 19605 411119 19589->19605 19592 4113ef 20472 411e0b 19592->20472 19593->19000 19595 403d01 11 API calls 19595->19605 19596 41135f 19596->19578 19596->19579 19598 403cdf fflush ctype 19598->19605 19599 4112ad fputs 20444 403cee fputc 19599->20444 19602 403cee fputc 19602->19605 19603 403e56 11 API calls 19603->19605 19605->19587 19605->19589 19605->19595 19605->19596 19605->19598 19605->19599 19605->19602 19605->19603 20445 410fa2 19605->20445 19617 40cf79 __EH_prolog 19616->19617 19618 4033db 2 API calls 19617->19618 19619 40cfc9 19618->19619 19620 4033db 2 API calls 19619->19620 19624 40cfdf 19620->19624 19621 40d01f 20793 40d643 19621->20793 19624->19621 19627 4034ab 3 API calls 19624->19627 19625 40338e 2 API calls 19627->19621 19707 40ce9d __EH_prolog 19706->19707 19708 40f31e free 19707->19708 19709 40ceb0 19708->19709 19710 40cee9 ctype free 19709->19710 19711 40cebc 19710->19711 21470 403ba5 free 19711->21470 19713 40cec4 19714 401f6a ctype free 19713->19714 19715 40ced1 19714->19715 21471 40d477 19715->21471 19719 40c0a4 19718->19719 19720 40c0d8 19718->19720 19721 40c0c2 19719->19721 19722 40c0ad _CxxThrowException 19719->19722 19720->18948 21480 40c17f 19721->21480 19722->19721 19725 409428 __EH_prolog 19724->19725 19726 403308 2 API calls 19725->19726 19727 409487 19726->19727 19728 403308 2 API calls 19727->19728 19729 409493 19728->19729 21489 409572 19729->21489 19732 403308 2 API calls 19733 4094ae 19732->19733 19734 403308 2 API calls 19733->19734 19735 409512 19734->19735 19736 403b71 ctype 2 API calls 19735->19736 19737 409538 19736->19737 19737->19000 19739 40cf0a __EH_prolog 19738->19739 19740 4035c8 3 API calls 19739->19740 19741 40cf1d 19740->19741 19742 403737 4 API calls 19741->19742 19743 40cf2a 19742->19743 19744 409e02 6 API calls 19743->19744 19745 40cf35 19744->19745 19746 4036fb 4 API calls 19745->19746 19747 40cf41 19746->19747 21492 403ba5 free 19747->21492 19749 40cf4d 19750 403737 4 API calls 19749->19750 19751 40cf56 19750->19751 19752 4036fb 4 API calls 19751->19752 19753 40c544 19752->19753 19754 403ba5 free 19753->19754 19754->18961 19755->18966 19756->18970 19758 4059b9 19757->19758 21493 407455 GetSystemTimeAsFileTime 19758->21493 19760 4059ca SetLastError GetStdHandle 19761 4059f6 19760->19761 19762 405a58 GetLastError 19760->19762 19761->19762 19763 4059fb GetFileInformationByHandle 19761->19763 19764 405a62 SetLastError 19762->19764 19765 405a0a 19762->19765 19763->19765 19764->19765 19765->19000 19767 405947 __EH_prolog 19766->19767 19768 403308 2 API calls 19767->19768 19769 405959 19768->19769 19770 4058eb 9 API calls 19769->19770 19771 40596a 19770->19771 21494 403ba5 free 19771->21494 19773 405974 19773->19000 19775 40c35c 19774->19775 19777 40c334 19774->19777 19775->19000 19776 404664 CharUpperW 19776->19777 19777->19775 19777->19776 19778->19004 19779->19004 19780->18990 19781->19004 19782->18995 19783->19004 19784->19015 19785->18955 19786->19019 19787->19027 19788->19004 19789->18984 19790->18970 19791->19004 19792->18960 19793->18970 19794->19537 19796 410a65 19795->19796 19797 410a84 19795->19797 19796->19797 19798 4123af ctype 6 API calls 19796->19798 19797->19545 19799 403cee fputc 19797->19799 19798->19797 19799->19548 19801 403ebb __EH_prolog 19800->19801 19802 40334b 2 API calls 19801->19802 19803 403ecc 19802->19803 19804 402dda 2 API calls 19803->19804 19805 403ee3 19804->19805 19813 403d5e 19805->19813 19818 403d81 19813->19818 19819 403d89 19818->19819 19820 403da2 19819->19820 19821 403d93 19819->19821 19828 4040a1 19820->19828 19825 40460f 19821->19825 19831 40440c 19825->19831 19837 4040b6 19828->19837 19832 404430 19831->19832 19838 4040dc WideCharToMultiByte 19837->19838 19846 4040b2 19837->19846 19848 40ce4b __EH_prolog 19847->19848 19849 403308 2 API calls 19848->19849 19850 40ce78 19849->19850 19851 403308 2 API calls 19850->19851 19852 40ce32 19851->19852 19852->19000 19854 403b71 ctype 2 API calls 19853->19854 19855 40d617 19854->19855 19855->19562 19857 40f9ea __EH_prolog 19856->19857 19858 403b71 ctype 2 API calls 19857->19858 19859 40fa04 19858->19859 19860 40fa16 19859->19860 19962 40fb8e 19859->19962 19862 403308 2 API calls 19860->19862 19863 40fa42 19862->19863 19864 403308 2 API calls 19863->19864 19865 40fa4e 19864->19865 19866 40faae 19865->19866 19891 4058eb 19865->19891 19914 40f345 19866->19914 19872 40fad6 19972 403ba5 free 19872->19972 19876 40fb5b 19883 4032e4 2 API calls 19889 40fafd 19883->19889 19887 40d5c9 5 API calls 19887->19889 19888 402292 2 API calls 19888->19889 19889->19876 19889->19883 19889->19887 19889->19888 19974 403ba5 free 19889->19974 19892 405814 9 API calls 19891->19892 19893 4058fb 19892->19893 19894 40590a 19893->19894 19895 403447 3 API calls 19893->19895 19896 403447 3 API calls 19894->19896 19895->19894 19897 405924 19896->19897 19898 40b564 19897->19898 19899 40b56e __EH_prolog 19898->19899 19977 40b883 19899->19977 19915 40f34f __EH_prolog 19914->19915 19988 40f31e 19915->19988 19917 4034ab malloc _CxxThrowException free 19960 40f360 19917->19960 19918 40f766 19920 406f66 VariantClear 19918->19920 19919 40f93d 19922 406f66 VariantClear 19919->19922 19932 40f36e 19920->19932 19922->19932 19923 40f72c 19924 40f752 19923->19924 20099 40ecee 19923->20099 20104 40d537 19924->20104 19925 406f66 VariantClear 19925->19960 19928 40fe71 malloc _CxxThrowException 19928->19960 19931 40d537 free 19931->19960 19932->19872 19932->19889 19933 40f94a malloc _CxxThrowException 19933->19960 19935 40f775 19936 40d537 free 19935->19936 19936->19932 19937 40df0c VariantClear 19937->19960 19938 40f7bf 19939 40d537 free 19938->19939 19939->19932 19940 40cd50 2 API calls 19940->19960 19942 40f809 19943 40ecee 3 API calls 19942->19943 19945 40f81b 19943->19945 19944 40f8a0 20118 403ba5 free 19944->20118 19949 40f8a8 19953 40d5c9 malloc _CxxThrowException free _CxxThrowException memcpy 19953->19960 19960->19917 19960->19918 19960->19919 19960->19923 19960->19925 19960->19928 19960->19931 19960->19932 19960->19933 19960->19935 19960->19937 19960->19938 19960->19940 19960->19942 19960->19944 19960->19953 19961 403ba5 free ctype 19960->19961 19992 40efa5 19960->19992 20027 40df87 19960->20027 20044 40ed49 19960->20044 20093 40e2c7 19960->20093 19961->19960 19963 40fb98 __EH_prolog 19962->19963 19964 403308 2 API calls 19963->19964 19965 40fbfd 19964->19965 19966 403308 2 API calls 19965->19966 19967 40fc09 19966->19967 19968 403308 2 API calls 19967->19968 19969 40fc1f 19968->19969 19969->19860 19974->19889 19980 40bfd5 19977->19980 19989 40f329 19988->19989 19990 40f343 19989->19990 20120 40fe19 19989->20120 19990->19960 19993 40efaf __EH_prolog 19992->19993 19994 40efd2 19993->19994 19995 40efff 19993->19995 20032 40df91 __EH_prolog 20027->20032 20038 4030e3 4 API calls 20032->20038 20041 40dfe1 20032->20041 20038->20041 20045 40ed53 __EH_prolog 20044->20045 20175 40e825 20045->20175 20097 40e2d1 __EH_prolog 20093->20097 20094 40e310 20097->20094 20407 406fe2 20097->20407 20100 4034ab 3 API calls 20099->20100 20118->19949 20121 40fe2a 20120->20121 20125 40fe37 20120->20125 20122 40d537 free 20121->20122 20123 40fe31 20122->20123 20126 403ba5 free 20123->20126 20125->19989 20126->20125 20416 41077b 20415->20416 20417 410768 20415->20417 20416->19605 20417->20416 20418 4123af ctype 6 API calls 20417->20418 20418->20416 20420 411728 __EH_prolog 20419->20420 20421 411744 fputs 20420->20421 20422 41137f 20420->20422 20424 411777 fputs 20420->20424 20427 40334b 2 API calls 20420->20427 20431 411ce8 25 API calls 20420->20431 20434 4118cc fputs 20420->20434 20436 4118a9 SysFreeString 20420->20436 20437 41199e SysFreeString 20420->20437 20438 4119a9 20420->20438 20441 406f66 VariantClear 20420->20441 20495 411a47 20420->20495 20510 411d49 20420->20510 20517 403ba5 free 20420->20517 20518 411da5 20420->20518 20528 411a25 20420->20528 20535 4119c1 20420->20535 20542 411c2a 20420->20542 20492 411c1a 20421->20492 20422->19593 20469 403cee fputc 20422->20469 20509 403cee fputc 20424->20509 20427->20420 20431->20420 20434->20420 20436->20420 20437->20422 20439 406f66 VariantClear 20438->20439 20439->20437 20442 411966 SysFreeString 20441->20442 20442->20420 20443->19605 20444->19605 20752 425a80 20445->20752 20447 410fac fputs 20753 403e56 20447->20753 20469->19593 20470->19580 20471->19592 20473 411e25 20472->20473 20475 411e1c fputs 20472->20475 20473->20475 20476 411e2b 20473->20476 20478 411e52 20475->20478 20493 411a47 17 API calls 20492->20493 20494 411c29 20493->20494 20494->20420 20566 425a80 20495->20566 20497 411a51 fputs fputs 20498 411a81 20497->20498 20499 411a75 20497->20499 20501 40334b 2 API calls 20498->20501 20567 411ad2 20499->20567 20503 411a8c 20501->20503 20504 403d01 11 API calls 20503->20504 20509->20420 20511 411d60 fputs fputs fputs 20510->20511 20512 411d5b 20510->20512 20513 403d01 11 API calls 20511->20513 20512->20511 20514 411d8a fputs 20513->20514 20622 403cee fputc 20514->20622 20516 411d9e 20516->20420 20517->20420 20519 411db6 20518->20519 20623 410e92 20519->20623 20522 411ddc 20524 410e92 9 API calls 20522->20524 20523 411a47 17 API calls 20523->20522 20525 411df0 20524->20525 20681 4119e3 20528->20681 20530 411a2d 20684 403fa9 20530->20684 20536 4119e3 2 API calls 20535->20536 20537 4119c9 20536->20537 20538 403fd5 fputs 20537->20538 20539 4119d8 20538->20539 20690 403cee fputc 20539->20690 20541 4119df 20541->20420 20543 411c34 __EH_prolog 20542->20543 20544 403308 2 API calls 20543->20544 20545 411c45 20544->20545 20691 4103d8 20545->20691 20566->20497 20568 411adc __EH_prolog 20567->20568 20569 40334b 2 API calls 20568->20569 20622->20516 20624 410ea5 20623->20624 20625 410eda 20623->20625 20633 410ee2 20624->20633 20625->20522 20625->20523 20634 410eec __EH_prolog 20633->20634 20635 402dda 2 API calls 20634->20635 20683 4119f4 20681->20683 20682 411a0a fputs fputs 20682->20530 20683->20682 20688 4029a7 20684->20688 20690->20541 20692 4103f1 20691->20692 20693 4103e7 20691->20693 20711 41026d 20692->20711 20694 403575 4 API calls 20693->20694 20752->20447 20754 403e60 __EH_prolog 20753->20754 20755 403308 2 API calls 20754->20755 20756 403e6e 20755->20756 20757 402dda 2 API calls 20756->20757 20758 403e7a 20757->20758 20783 403e29 20758->20783 20784 4034ab 3 API calls 20783->20784 20794 40d64d __EH_prolog 20793->20794 20795 4033db 2 API calls 20794->20795 20796 40d660 20795->20796 20956 40d6a7 20796->20956 20799 40d684 20801 4033db 2 API calls 20799->20801 20802 40d68f 20801->20802 20960 403ba5 free 20802->20960 20804 40d02d 20804->19625 20957 40d6af 20956->20957 20958 40d674 20957->20958 20967 4038ba 20957->20967 20958->20799 20961 403409 20958->20961 20960->20804 20962 403415 20961->20962 20963 403426 20961->20963 20964 403b71 ctype 2 API calls 20962->20964 20963->20799 20965 40341d 20964->20965 20971 403ba5 free 20965->20971 20968 4038c5 20967->20968 20969 4038ca memmove 20967->20969 20970 403157 4 API calls 20968->20970 20969->20958 20970->20969 20971->20963 21470->19713 21475 40d481 __EH_prolog 21471->21475 21472 40d4b1 21479 403ba5 free 21472->21479 21474 40cedc 21474->19000 21475->21472 21476 40d537 free 21475->21476 21478 403ba5 free 21475->21478 21476->21475 21478->21475 21479->21474 21481 40c191 21480->21481 21482 403b71 ctype 2 API calls 21481->21482 21483 40c19c 21482->21483 21484 40c1b5 21483->21484 21485 40c1a6 memcpy 21483->21485 21488 403ba5 free 21484->21488 21485->21484 21487 40c1bc 21487->19720 21488->21487 21490 403308 2 API calls 21489->21490 21491 40949f 21490->21491 21491->19732 21492->19749 21493->19760 21494->19773 21495->19046 21496->19042 21497->19047 21498->19060 21499->19062 21500->19069 21501->19071 21502->19079 21504 401ef6 21503->21504 21515 405082 21504->21515 21507 401e91 fputs 21531 403cee fputc 21507->21531 21509 401eb1 _CxxThrowException 21510 401ec3 21509->21510 21511 401ee5 5 API calls 21510->21511 21512 401ed0 21511->21512 21513 401ee2 21512->21513 21514 401e91 6 API calls 21512->21514 21513->19085 21514->21513 21520 4052d1 21515->21520 21518 4034ab 3 API calls 21519 401ed0 21518->21519 21519->19085 21519->21507 21521 4052db __EH_prolog 21520->21521 21522 40d5c9 5 API calls 21521->21522 21523 4052e4 21522->21523 21524 403b71 ctype 2 API calls 21523->21524 21525 4052eb 21524->21525 21526 40508c 21525->21526 21528 40531a 21525->21528 21526->21518 21529 403308 2 API calls 21528->21529 21530 405322 21529->21530 21530->21526 21531->21509 21533 401acf __EH_prolog 21532->21533 21538 401b26 21533->21538 21536 403308 2 API calls 21537 401a32 21536->21537 21537->19092 21539 401b30 __EH_prolog 21538->21539 21554 401bba 21539->21554 21542 402dda 2 API calls 21543 401b52 21542->21543 21544 402dda 2 API calls 21543->21544 21545 401b5e 21544->21545 21546 402dda 2 API calls 21545->21546 21547 401b6a 21546->21547 21548 403308 2 API calls 21547->21548 21549 401b76 21548->21549 21550 401bba 2 API calls 21549->21550 21551 401b82 21550->21551 21552 402dda 2 API calls 21551->21552 21553 401ae3 21552->21553 21553->21536 21555 401bc4 __EH_prolog 21554->21555 21556 402dda 2 API calls 21555->21556 21557 401be9 21556->21557 21558 403308 2 API calls 21557->21558 21559 401b3c 21558->21559 21559->21542 21560->19105 21561->19104 21609 41e010 21610 41e014 21609->21610 21611 41e017 malloc 21609->21611 21612 41e030 free 21613 422450 21614 422475 21613->21614 21615 42245e 21613->21615 21629 424610 21614->21629 21617 424700 ctype 2 API calls 21615->21617 21618 422466 21617->21618 21620 424700 ctype 2 API calls 21618->21620 21621 42246e 21620->21621 21623 424660 WaitForSingleObject 21621->21623 21624 424681 21623->21624 21625 42467b GetLastError 21623->21625 21626 42468e CloseHandle 21624->21626 21627 42469f 21624->21627 21625->21624 21626->21627 21628 424699 GetLastError 21626->21628 21627->21614 21628->21627 21630 42247d 21629->21630 21631 424619 CloseHandle 21629->21631 21631->21630 21632 424624 GetLastError 21631->21632 21632->21630 21633 4220d0 EnterCriticalSection 21634 422115 21633->21634 21635 422138 LeaveCriticalSection 21633->21635 21634->21635 21638 4076df 21634->21638 21636 42212d 21636->21635 21639 4076f1 21638->21639 21641 408e58 26 API calls 21639->21641 21640 407715 21640->21636 21641->21640 21642 4077b4 21643 4077c3 21642->21643 21645 4077c9 21642->21645 21644 409347 53 API calls 21643->21644 21644->21645 21646 408435 21647 408453 21646->21647 21648 408442 21646->21648 21648->21647 21650 403ba5 free 21648->21650 21650->21647 21651 41383a 21656 413856 21651->21656 21654 41384f 21657 413860 __EH_prolog 21656->21657 21673 4093f9 21657->21673 21659 413879 21684 4139df 21659->21684 21662 413989 ctype free 21663 413891 21662->21663 21690 403ba5 free 21663->21690 21665 413899 21691 403ba5 free 21665->21691 21667 4138a1 21692 4138cf 21667->21692 21672 403ba5 free 21672->21654 21674 409409 21673->21674 21675 40940e 21673->21675 21677 424700 ctype 2 API calls 21674->21677 21676 40941d 21675->21676 21678 424660 WaitForSingleObject 21675->21678 21676->21659 21677->21675 21679 424681 21678->21679 21680 42467b GetLastError 21678->21680 21681 42468e CloseHandle 21679->21681 21683 42469f 21679->21683 21680->21679 21682 424699 GetLastError 21681->21682 21681->21683 21682->21683 21683->21659 21688 4139e9 __EH_prolog 21684->21688 21685 413a1e 21708 403ba5 free 21685->21708 21687 413885 21687->21662 21688->21685 21709 403ba5 free 21688->21709 21690->21665 21691->21667 21693 4138d9 __EH_prolog 21692->21693 21694 4093f9 ctype 6 API calls 21693->21694 21695 4138f2 21694->21695 21696 424610 ctype 2 API calls 21695->21696 21697 4138fa 21696->21697 21698 424610 ctype 2 API calls 21697->21698 21699 413902 21698->21699 21700 424610 ctype 2 API calls 21699->21700 21701 4138ae 21700->21701 21702 413938 21701->21702 21703 413942 __EH_prolog 21702->21703 21710 403ba5 free 21703->21710 21705 413955 21711 403ba5 free 21705->21711 21707 413842 21707->21654 21707->21672 21708->21687 21709->21688 21710->21705 21711->21707 21712 407afd 21713 407b0a 21712->21713 21714 407b1b 21712->21714 21713->21714 21718 407b22 21713->21718 21719 407b2c __EH_prolog 21718->21719 21720 40631a CloseHandle 21719->21720 21721 407b15 21720->21721 21722 403ba5 free 21721->21722 21722->21714
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 00414F35
                                                                                                  • Part of subcall function 0041836A: _CxxThrowException.MSVCRT(?,0042C050), ref: 004183B3
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionH_prologThrow
                                                                                                • String ID:
                                                                                                • API String ID: 461045715-3916222277
                                                                                                • Opcode ID: 4249ef1111995ac6341149bd16243148716db58c60e65aaca3a2581c99e17d69
                                                                                                • Instruction ID: 9730df7e2326ecd6f3b7c656d3358000a3777ff4a4df54740873238864095401
                                                                                                • Opcode Fuzzy Hash: 4249ef1111995ac6341149bd16243148716db58c60e65aaca3a2581c99e17d69
                                                                                                • Instruction Fuzzy Hash: 1A829F30900659DFDB15DFA8C884BEEBBB1BF48314F14419EE815AB391C738AE85CB65
                                                                                                APIs
                                                                                                  • Part of subcall function 00405A6D: FindClose.KERNELBASE(00000000,000000FF,00405A9E), ref: 00405A78
                                                                                                • FindFirstFileW.KERNELBASE(?,?), ref: 00405AAC
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: Find$CloseFileFirst
                                                                                                • String ID:
                                                                                                • API String ID: 2295610775-0
                                                                                                • Opcode ID: d3e20e893d103623865192cbfbd50d7f980ab7106058d3680fa755dbd2b51631
                                                                                                • Instruction ID: ed05b2355a57328246007ee694caf2b5fc6674e02e4ec3abcb408285466e3139
                                                                                                • Opcode Fuzzy Hash: d3e20e893d103623865192cbfbd50d7f980ab7106058d3680fa755dbd2b51631
                                                                                                • Instruction Fuzzy Hash: DBE0923020091857CF20AF64CCC55EB3768EF51318F104376A861A72D1E7389D4A8FA8

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 0 40100a-4010a5 call 425a80 call 41ebc0 SetFileApisToOEM fputs call 402250 GetCommandLineW call 40334b call 4023c8 call 403ba5 call 403308 * 2 call 40542c call 405814 21 4010a7-4010c7 fputs call 403ba5 * 2 0->21 22 4010cc-4010dc call 403ba5 0->22 33 401843-40184f call 401f6a 21->33 27 4010e7-40110e call 40248b call 402706 22->27 28 4010de-4010e2 call 401f9f 22->28 40 401114-401180 fputs call 403cee fputs call 403cee call 403d01 call 403cee call 4024d3 call 403ba5 call 401f6a 27->40 41 401198-4011a7 27->41 28->27 39 401851-401852 33->39 42 401894-4018a2 39->42 40->39 43 401869-401892 call 401e69 call 4024d3 call 403ba5 call 401f6a 41->43 44 4011ad-4011b0 41->44 43->42 44->43 47 4011b6-4011be 44->47 50 4011c0-4011c7 47->50 51 4011c9-4011dd call 401e16 47->51 54 401216-401235 call 401000 call 4018a3 50->54 61 401213-401215 51->61 62 4011df-40120e fputs call 403cee call 403d01 call 403cee 51->62 76 401237-40126b call 40338e call 401ec3 call 403ba5 54->76 77 40126c 54->77 61->54 98 401697-4016bd call 4024d3 call 403ba5 call 401f6a 62->98 76->77 81 401293-4012b7 call 403308 77->81 82 40126e-40127a 77->82 101 4012b9-4012ca call 4034ab 81->101 102 4012cf-4012d2 call 4061c1 81->102 86 4012f7-401307 _CxxThrowException 82->86 87 40127c-401291 call 401ec3 82->87 91 40130c-401321 call 403308 86->91 87->81 87->82 111 401323-401333 call 4034ab call 406727 91->111 112 401338-4013a3 call 40504a call 40d5c9 call 402292 call 40d5c9 call 402292 call 403b71 91->112 98->42 101->102 109 4012d7-4012d9 102->109 109->91 114 4012db-4012f2 _CxxThrowException 109->114 111->112 134 4013b1-4013b4 112->134 135 4013a5-4013af call 4018bf 112->135 114->86 137 4013b6-4013c2 134->137 135->137 139 4013c4-4013c6 137->139 140 4013ca-4013d7 call 40db57 137->140 139->140 143 4013f0-4013f4 140->143 144 4013d9-4013eb _CxxThrowException 140->144 145 401854-401864 _CxxThrowException 143->145 146 4013fa-40140e call 403b71 143->146 144->143 145->43 149 401410-401419 call 401a02 146->149 150 40141b 146->150 152 40141d-401429 149->152 150->152 154 401431-40151a call 401d0f call 4034ab call 40190f call 4034ab call 403308 call 40c369 152->154 155 40142b-40142d 152->155 167 40151f-401548 call 40205a call 403ba5 call 4019e5 154->167 155->154 174 401584 167->174 175 40154a-401579 call 403cee fputs call 403d01 167->175 177 40158a-401598 174->177 175->177 191 40157b-401582 175->191 179 4016c2-4016c4 177->179 180 40159e-4015a0 177->180 183 4016c6-4016e5 call 403cee fputs call 403cee 179->183 184 4016ea-4016f9 179->184 180->179 182 4015a6-4015b2 180->182 182->179 189 4015b8-4015bb 182->189 183->184 187 4016fb-40171a call 403cee fputs call 403cee 184->187 188 40171f-40172b 184->188 187->188 193 401764-401770 188->193 194 40172d-40175f call 403cee fputs call 403fd5 call 403cee 188->194 189->179 195 4015c1-4015cd 189->195 191->177 196 401772-4017a4 call 403cee fputs call 403fd5 call 403cee 193->196 197 4017a9-4017c7 call 403ba5 call 4019ce 193->197 194->193 195->179 201 4015d3-4015d6 195->201 196->197 222 4017c9-4017cb 197->222 223 4017cf-4017d8 197->223 201->179 206 4015dc-4015e8 201->206 206->179 210 4015ee-4015f1 206->210 210->179 214 4015f7-4015fc 210->214 215 401615-401633 call 403ba5 call 4019ce 214->215 216 4015fe-401610 _CxxThrowException 214->216 232 401635-401637 215->232 233 40163b-401644 215->233 216->215 222->223 225 4017e0-401842 call 401f6a * 2 call 403ba5 * 2 call 401f6a call 401fce call 4024d3 call 403ba5 223->225 226 4017da-4017dc 223->226 225->33 226->225 232->233 235 401646-401648 233->235 236 40164c-401692 call 401f6a * 2 call 403ba5 * 2 call 401f6a call 401fce 233->236 235->236 236->98
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 0040100F
                                                                                                  • Part of subcall function 0041EBC0: GetVersion.KERNEL32 ref: 0041EBC7
                                                                                                  • Part of subcall function 0041EBC0: GetModuleHandleW.KERNEL32(kernel32.dll,SetDefaultDllDirectories), ref: 0041EBDD
                                                                                                  • Part of subcall function 0041EBC0: GetProcAddress.KERNEL32(00000000), ref: 0041EBE4
                                                                                                  • Part of subcall function 0041EBC0: GetSystemDirectoryW.KERNEL32(?,00000106), ref: 0041EC07
                                                                                                  • Part of subcall function 0041EBC0: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 0041EC8D
                                                                                                • SetFileApisToOEM.KERNEL32 ref: 00401025
                                                                                                • fputs.MSVCRT ref: 0040103D
                                                                                                • GetCommandLineW.KERNEL32 ref: 0040104E
                                                                                                  • Part of subcall function 004023C8: __EH_prolog.LIBCMT ref: 004023CD
                                                                                                  • Part of subcall function 00403BA5: free.MSVCRT ref: 00403BA9
                                                                                                  • Part of subcall function 0040542C: GetModuleFileNameW.KERNEL32(00000000,00000000,00000105), ref: 0040545C
                                                                                                • fputs.MSVCRT ref: 004010B2
                                                                                                • fputs.MSVCRT ref: 0040111F
                                                                                                • fputs.MSVCRT ref: 0040113B
                                                                                                • _CxxThrowException.MSVCRT(?,0042BC68), ref: 00401864
                                                                                                  • Part of subcall function 00401E69: fputs.MSVCRT ref: 00401E75
                                                                                                  • Part of subcall function 004024D3: __EH_prolog.LIBCMT ref: 004024D8
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: fputs$H_prolog$FileModule$AddressApisCommandDirectoryExceptionHandleLibraryLineLoadNameProcSystemThrowVersionfree
                                                                                                • String ID: F{v$@F{v$Archive Errors$Can't open as archive$Command line error:$ERROR: Unknown command:$Error: $GetFullPathName Error$Open Errors: $Sub items Errors:
                                                                                                • API String ID: 1316033296-242411509
                                                                                                • Opcode ID: 8a9c492448bef55a61859c969b5a1dbe21ce475c0d18a2cff95548d716863a0e
                                                                                                • Instruction ID: 37754d37836912fedcf3d689fcb171cea941b93a5e0cdad8537999c6aa24026e
                                                                                                • Opcode Fuzzy Hash: 8a9c492448bef55a61859c969b5a1dbe21ce475c0d18a2cff95548d716863a0e
                                                                                                • Instruction Fuzzy Hash: 47428D31900259DFDF25EFA5D895AEDBBB4AF04304F1440AFE44AB72E2DB381A45CB19

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 260 41171e-41173e call 425a80 263 411744-411770 fputs call 411c1a 260->263 264 41198b 260->264 268 411772-411775 263->268 269 4117cc-4117d1 263->269 265 41198d-41199b 264->265 272 411777-41178d fputs call 403cee 268->272 273 41178f-411791 268->273 270 4117d3-4117d8 269->270 271 4117da-4117e3 269->271 274 4117e6-4117f2 call 411a47 270->274 271->274 272->269 276 411793-411798 273->276 277 41179a-4117a3 273->277 281 4117f7-411816 call 411da5 274->281 280 4117a6-4117cb call 40334b call 411d49 call 403ba5 276->280 277->280 280->269 287 411824-411835 call 411ce8 281->287 288 411818-41181f call 411a25 281->288 287->265 295 41183b-411845 287->295 288->287 296 411853-411861 295->296 297 411847-41184e call 4119c1 295->297 296->265 300 411867-41186a 296->300 297->296 301 4118bc-4118c6 300->301 302 41186c-41188c 300->302 303 41197c-411985 301->303 304 4118cc-4118e7 fputs 301->304 306 411892-4118a3 call 411ce8 302->306 307 41199e-4119a3 302->307 303->263 303->264 304->303 310 4118ed-411901 304->310 306->307 315 4118a9-4118ba SysFreeString 306->315 311 4119b7-4119bf SysFreeString 307->311 313 411903-411925 310->313 314 411979 310->314 311->265 317 4119a5-4119a7 313->317 318 411927-41194b 313->318 314->303 315->301 315->302 319 4119b4 317->319 321 4119a9-4119b1 call 406f66 318->321 322 41194d-411977 call 411c2a call 406f66 SysFreeString 318->322 319->311 321->319 322->313 322->314
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 00411723
                                                                                                • fputs.MSVCRT ref: 00411759
                                                                                                • fputs.MSVCRT ref: 0041177E
                                                                                                  • Part of subcall function 00403CEE: fputc.MSVCRT ref: 00403CF5
                                                                                                  • Part of subcall function 00406F66: VariantClear.OLEAUT32(?), ref: 00406F88
                                                                                                • SysFreeString.OLEAUT32(00000000), ref: 004118B0
                                                                                                • fputs.MSVCRT ref: 004118D3
                                                                                                • SysFreeString.OLEAUT32(00000000), ref: 0041196D
                                                                                                • SysFreeString.OLEAUT32(00000000), ref: 004119B7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: FreeStringfputs$ClearH_prologVariantfputc
                                                                                                • String ID: --$----$Type$Warning: The archive is open with offset
                                                                                                • API String ID: 2072268484-1245056967
                                                                                                • Opcode ID: fb3390146c81334d396c99daa6d3461159feaf5986877ce0f5b400962f183e80
                                                                                                • Instruction ID: a3d5f6d9cfde6feea9fdbc4782c9a90494907b9087194ce7bf4d0a7410971838
                                                                                                • Opcode Fuzzy Hash: fb3390146c81334d396c99daa6d3461159feaf5986877ce0f5b400962f183e80
                                                                                                • Instruction Fuzzy Hash: D491AC71A10209EFDB14DFA5D981AEEB7B5FF48314F10412EE512A72A0DB38AD85CB58

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: _initterm$FilterXcpt__getmainargs__p___initenv__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                                                                • String ID:
                                                                                                • API String ID: 167530163-0
                                                                                                • Opcode ID: d4e87e20f13268a2368b37537ec0d8a4c7ebd2ceb8382e40c53da9a686bd4e22
                                                                                                • Instruction ID: 5d8486ae153206ccce82f6c4c9ba7e61262e203fc83edcfd9949eb2a5c758f24
                                                                                                • Opcode Fuzzy Hash: d4e87e20f13268a2368b37537ec0d8a4c7ebd2ceb8382e40c53da9a686bd4e22
                                                                                                • Instruction Fuzzy Hash: 16318575A00719EFDB14DFA0ED4AEAD7B74FB08321F50022AF515A32A0DB785900CF28

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 338 401190-4011a7 340 401869-401892 call 401e69 call 4024d3 call 403ba5 call 401f6a 338->340 341 4011ad-4011b0 338->341 371 401894-4018a2 340->371 341->340 343 4011b6-4011be 341->343 345 4011c0-4011c7 343->345 346 4011c9-4011dd call 401e16 343->346 348 401216-401235 call 401000 call 4018a3 345->348 353 401213-401215 346->353 354 4011df-40120e fputs call 403cee call 403d01 call 403cee 346->354 364 401237-40126b call 40338e call 401ec3 call 403ba5 348->364 365 40126c 348->365 353->348 384 401697-4016bd call 4024d3 call 403ba5 call 401f6a 354->384 364->365 368 401293-4012b7 call 403308 365->368 369 40126e-40127a 365->369 386 4012b9-4012ca call 4034ab 368->386 387 4012cf-4012d2 call 4061c1 368->387 373 4012f7-401307 _CxxThrowException 369->373 374 40127c-401291 call 401ec3 369->374 378 40130c-401321 call 403308 373->378 374->368 374->369 395 401323-401333 call 4034ab call 406727 378->395 396 401338-4013a3 call 40504a call 40d5c9 call 402292 call 40d5c9 call 402292 call 403b71 378->396 384->371 386->387 393 4012d7-4012d9 387->393 393->378 398 4012db-4012f2 _CxxThrowException 393->398 395->396 418 4013b1-4013b4 396->418 419 4013a5-4013af call 4018bf 396->419 398->373 421 4013b6-4013c2 418->421 419->421 423 4013c4-4013c6 421->423 424 4013ca-4013d7 call 40db57 421->424 423->424 427 4013f0-4013f4 424->427 428 4013d9-4013eb _CxxThrowException 424->428 429 401854-401864 _CxxThrowException 427->429 430 4013fa-40140e call 403b71 427->430 428->427 429->340 433 401410-401419 call 401a02 430->433 434 40141b 430->434 436 40141d-401429 433->436 434->436 438 401431-4014b3 call 401d0f call 4034ab call 40190f call 4034ab call 403308 436->438 439 40142b-40142d 436->439 449 4014b8-40151a call 40c369 438->449 439->438 451 40151f-401548 call 40205a call 403ba5 call 4019e5 449->451 458 401584 451->458 459 40154a-401579 call 403cee fputs call 403d01 451->459 461 40158a-401598 458->461 459->461 475 40157b-401582 459->475 463 4016c2-4016c4 461->463 464 40159e-4015a0 461->464 467 4016c6-4016e5 call 403cee fputs call 403cee 463->467 468 4016ea-4016f9 463->468 464->463 466 4015a6-4015b2 464->466 466->463 473 4015b8-4015bb 466->473 467->468 471 4016fb-40171a call 403cee fputs call 403cee 468->471 472 40171f-40172b 468->472 471->472 477 401764-401770 472->477 478 40172d-40175f call 403cee fputs call 403fd5 call 403cee 472->478 473->463 479 4015c1-4015cd 473->479 475->461 480 401772-4017a4 call 403cee fputs call 403fd5 call 403cee 477->480 481 4017a9-4017c7 call 403ba5 call 4019ce 477->481 478->477 479->463 485 4015d3-4015d6 479->485 480->481 506 4017c9-4017cb 481->506 507 4017cf-4017d8 481->507 485->463 490 4015dc-4015e8 485->490 490->463 494 4015ee-4015f1 490->494 494->463 498 4015f7-4015fc 494->498 499 401615-401633 call 403ba5 call 4019ce 498->499 500 4015fe-401610 _CxxThrowException 498->500 516 401635-401637 499->516 517 40163b-401644 499->517 500->499 506->507 509 4017e0-401852 call 401f6a * 2 call 403ba5 * 2 call 401f6a call 401fce call 4024d3 call 403ba5 call 401f6a 507->509 510 4017da-4017dc 507->510 509->371 510->509 516->517 519 401646-401648 517->519 520 40164c-401692 call 401f6a * 2 call 403ba5 * 2 call 401f6a call 401fce 517->520 519->520 520->384
                                                                                                APIs
                                                                                                • fputs.MSVCRT ref: 004011EC
                                                                                                • _CxxThrowException.MSVCRT(?,0042BC88), ref: 004012F2
                                                                                                • _CxxThrowException.MSVCRT(?,0042BC78), ref: 00401307
                                                                                                  • Part of subcall function 00403BA5: free.MSVCRT ref: 00403BA9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionThrow$fputsfree
                                                                                                • String ID: F{v$@F{v$Error:
                                                                                                • API String ID: 3322102733-619697466
                                                                                                • Opcode ID: 2f78c6be662f9775f649687e13d4bd9369e6b82b5191ee238eda4f6237683049
                                                                                                • Instruction ID: 4a2e7b9742cb2017b67176a9351b53f13f8677fefdef250d775b56a696d96fcd
                                                                                                • Opcode Fuzzy Hash: 2f78c6be662f9775f649687e13d4bd9369e6b82b5191ee238eda4f6237683049
                                                                                                • Instruction Fuzzy Hash: 3FE16C31900259DEDF21EFA4C991BEDBBB4AF14304F1444AFE449B72A2DB385A49CF25

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 548 4110b7-4110f0 call 425a80 call 403447 call 4019e5 555 411111-411122 call 41075c 548->555 556 4110f2-4110f8 548->556 560 411361-411364 555->560 561 411128-411140 555->561 556->555 557 4110fa-41110e 556->557 557->555 562 411397-4113af 560->562 563 411366-41136e 560->563 564 411142 561->564 565 411145-411147 561->565 570 4113b1 call 403cdf 562->570 571 4113b6-4113be 562->571 568 411374-41137a call 41171e 563->568 569 41145d call 4121d4 563->569 564->565 566 411152-41115a 565->566 567 411149-41114c 565->567 574 411184-411186 566->574 575 41115c-411165 call 403cee 566->575 567->566 573 411224-41122f call 411473 567->573 584 41137f-411381 568->584 581 411462-411470 569->581 570->571 571->569 576 4113c4-411402 fputs call 403eb1 call 403cee call 411e0b 571->576 601 411231-411234 573->601 602 41123a-411242 573->602 582 4111b5-4111b9 574->582 583 411188-411190 574->583 575->574 596 411167-41117f call 403e56 call 403cee 575->596 576->581 635 411404-41140a 576->635 592 4111bb-4111c3 582->592 593 41120a-411212 582->593 588 411192-411198 call 410e92 583->588 589 41119d-4111ae 583->589 584->581 590 411387-411392 call 403cee 584->590 588->589 589->582 590->569 594 4111f2-411203 592->594 595 4111c5-4111ed fputs call 403cee call 403d01 call 403cee 592->595 593->573 598 411214-41121f call 403cee call 403cdf 593->598 594->593 595->594 596->574 598->573 601->602 603 411315-411319 601->603 605 411244-41124d call 403cee 602->605 606 41126c-41126e 602->606 618 41131b-411329 603->618 619 41134d-411359 603->619 605->606 633 41124f-411267 call 403e56 call 403cee 605->633 615 411270-411278 606->615 616 41129d-4112a1 606->616 625 411285-411296 615->625 626 41127a-411280 call 410e92 615->626 628 4112a3-4112ab 616->628 629 4112f2-4112fa 616->629 630 411346 618->630 631 41132b-41133d call 410fa2 618->631 619->561 622 41135f 619->622 622->560 625->616 626->625 637 4112da-4112eb 628->637 638 4112ad-4112d5 fputs call 403cee call 403d01 call 403cee 628->638 629->603 634 4112fc-411308 call 403cee 629->634 630->619 631->630 648 41133f-411341 call 403cdf 631->648 633->606 634->603 657 41130a-411310 call 403cdf 634->657 645 411452-411458 call 403cdf 635->645 646 41140c-411412 635->646 637->629 638->637 645->569 652 411414-411424 fputs 646->652 653 411426-411441 call 409e02 call 403d01 call 403ba5 646->653 648->630 658 411446-41144d call 403cee 652->658 653->658 657->603 658->645
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 004110BC
                                                                                                • fputs.MSVCRT ref: 004111D2
                                                                                                • fputs.MSVCRT ref: 004112BA
                                                                                                • fputs.MSVCRT ref: 004113D2
                                                                                                • fputs.MSVCRT ref: 00411421
                                                                                                  • Part of subcall function 00403CDF: fflush.MSVCRT ref: 00403CE1
                                                                                                  • Part of subcall function 00403D01: __EH_prolog.LIBCMT ref: 00403D06
                                                                                                  • Part of subcall function 00403BA5: free.MSVCRT ref: 00403BA9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: fputs$H_prolog$fflushfree
                                                                                                • String ID: Can't allocate required memory$ERRORS:$WARNINGS:
                                                                                                • API String ID: 1750297421-1898165966
                                                                                                • Opcode ID: 8f306ed1555abaf5623ad89e118a3c979d97054053c85260dd150c3e60813d3e
                                                                                                • Instruction ID: 33d289f6b5c606ebc4a1115891c26e2319c58622cdac9781428c791bf3c2c158
                                                                                                • Opcode Fuzzy Hash: 8f306ed1555abaf5623ad89e118a3c979d97054053c85260dd150c3e60813d3e
                                                                                                • Instruction Fuzzy Hash: 2FB1A4306017059FEB24DF61C891BEAB7E1BF44308F04852FD65AA76A1CB39BD84CB59

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 668 4114d9-411505 call 425a80 EnterCriticalSection 671 411507-41150d 668->671 672 41152a-411532 668->672 671->672 675 41150f-411514 call 4123af 671->675 673 411534 call 403cdf 672->673 674 411539-41153e 672->674 673->674 677 411544-411550 674->677 678 41160d-411612 674->678 684 411519-411527 675->684 680 411592-4115aa 677->680 681 411552-411558 677->681 682 411618-41161d 678->682 683 4116ba 678->683 687 4115ac-4115bd call 403cee 680->687 688 4115ee-4115f6 680->688 681->680 685 41155a-411566 681->685 682->683 686 411623-41163b 682->686 689 4116bc-4116d3 LeaveCriticalSection 683->689 684->672 692 411568 685->692 693 41156e-41157c 685->693 690 4116ac-4116b8 call 4121d4 686->690 694 41163d-41165f call 403cee fputs 686->694 687->688 705 4115bf-4115e7 fputs call 403fd5 687->705 688->690 691 4115fc-411602 688->691 690->689 691->690 696 411608 691->696 692->693 693->688 698 41157e-411590 fputs 693->698 708 411661-411672 fputs 694->708 709 411674-411690 call 409e02 call 403d01 call 403ba5 694->709 701 4116a7 call 403cdf 696->701 703 4115e9 call 403cee 698->703 701->690 703->688 705->703 712 411695-4116a1 call 403cee 708->712 709->712 712->701
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 004114DE
                                                                                                • EnterCriticalSection.KERNEL32(00430538), ref: 004114F4
                                                                                                • fputs.MSVCRT ref: 00411586
                                                                                                • fputs.MSVCRT ref: 004115CC
                                                                                                • fputs.MSVCRT ref: 00411652
                                                                                                • fputs.MSVCRT ref: 0041166F
                                                                                                  • Part of subcall function 004123AF: fputs.MSVCRT ref: 00412418
                                                                                                  • Part of subcall function 00403D01: __EH_prolog.LIBCMT ref: 00403D06
                                                                                                  • Part of subcall function 00403BA5: free.MSVCRT ref: 00403BA9
                                                                                                • LeaveCriticalSection.KERNEL32(00430538), ref: 004116BD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: fputs$CriticalH_prologSection$EnterLeavefree
                                                                                                • String ID: Sub items Errors:
                                                                                                • API String ID: 777174534-2637271492
                                                                                                • Opcode ID: 7fae9a088714fc38a6a925baca4c77656e155b9a6abe2461155d56a4988a5f7c
                                                                                                • Instruction ID: c436f3324885b6c5f0cde1dde4f741d5a44cae6dcfed69199f3fe9034af22f22
                                                                                                • Opcode Fuzzy Hash: 7fae9a088714fc38a6a925baca4c77656e155b9a6abe2461155d56a4988a5f7c
                                                                                                • Instruction Fuzzy Hash: 36519D32601600DFDB25DF65D884AEABBE2FF84310F54852FE15B97261DB3A6D90CB09

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 720 40739d-4073d0 GetModuleHandleA GetProcAddress 721 4073d2-4073da GlobalMemoryStatusEx 720->721 722 4073fd-407414 GlobalMemoryStatus 720->722 721->722 725 4073dc-4073e5 721->725 723 407416 722->723 724 407419-40741b 722->724 723->724 726 40741f-407423 724->726 727 4073f3 725->727 728 4073e7 725->728 731 4073f6-4073fb 727->731 729 4073e9-4073ec 728->729 730 4073ee-4073f1 728->730 729->727 729->730 730->731 731->726
                                                                                                APIs
                                                                                                • GetModuleHandleA.KERNEL32(kernel32.dll,GlobalMemoryStatusEx), ref: 004073C1
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 004073C8
                                                                                                • GlobalMemoryStatusEx.KERNELBASE(00000040), ref: 004073D6
                                                                                                • GlobalMemoryStatus.KERNEL32(?), ref: 00407408
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: GlobalMemoryStatus$AddressHandleModuleProc
                                                                                                • String ID: $@$GlobalMemoryStatusEx$kernel32.dll
                                                                                                • API String ID: 180289352-802862622
                                                                                                • Opcode ID: 2a986c63f2b6fa7951a361114db15d026d7f1eb5d0adc5c4a8a9ed1fa11470ce
                                                                                                • Instruction ID: bd3d2fabc704362d9ca5d338a6c6718327ec6968a32443d636c6e2c65d652486
                                                                                                • Opcode Fuzzy Hash: 2a986c63f2b6fa7951a361114db15d026d7f1eb5d0adc5c4a8a9ed1fa11470ce
                                                                                                • Instruction Fuzzy Hash: 41113970E04219DBEB20DF94D989BAEBBF5FB04341F50042AE942F7280D778B844DB59

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 00411E88
                                                                                                  • Part of subcall function 00412153: GetVersionExW.KERNEL32(?), ref: 0041216D
                                                                                                • fputs.MSVCRT ref: 00411EBF
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prologVersionfputs
                                                                                                • String ID: F{v$@F{v$Unsupported Windows version
                                                                                                • API String ID: 1051792753-1168572466
                                                                                                • Opcode ID: 6c2c40629df218334bec5ec3bc1302cec0765b107ed07878728180e7a12435a0
                                                                                                • Instruction ID: a092db236a47294cc3f6e096509d2604d9432d6bca79f67c2c86b4b3dc796ef4
                                                                                                • Opcode Fuzzy Hash: 6c2c40629df218334bec5ec3bc1302cec0765b107ed07878728180e7a12435a0
                                                                                                • Instruction Fuzzy Hash: 8C01D871900245EFDB00EF99E9567EE77B0EB04329F20465FE502B31A1D7B81A458F59

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1075 404cba-404cd3 call 425a80 1078 404cd5-404ce5 _CxxThrowException 1075->1078 1079 404cea-404d20 call 404738 1075->1079 1078->1079 1082 404d30-404d35 1079->1082 1083 404d22-404d2e call 4051d7 1079->1083 1085 404d44 1082->1085 1086 404d37-404d39 1082->1086 1088 404d48-404d62 call 403308 1083->1088 1085->1088 1086->1088 1089 404d3b-404d42 call 404906 1086->1089 1094 404d92-404d96 1088->1094 1095 404d64-404d6d 1088->1095 1089->1085 1089->1088 1097 404e58-404e6a call 404c66 1094->1097 1098 404d9c-404db7 call 404f8e 1094->1098 1095->1094 1096 404d6f-404d76 1095->1096 1096->1094 1099 404d78-404d89 wcscmp 1096->1099 1105 404e81-404e85 1097->1105 1106 404e6c-404e75 call 405276 1097->1106 1107 404dc7-404dcd 1098->1107 1108 404db9-404dbb 1098->1108 1099->1094 1102 404d8b 1099->1102 1102->1094 1110 404ee3 1105->1110 1111 404e87-404e8b 1105->1111 1116 404e7a-404e7c call 4034ab 1106->1116 1113 404e12-404e17 1107->1113 1114 404dcf-404de3 wcscmp 1107->1114 1108->1107 1112 404dbd-404dbf 1108->1112 1117 404ee6-404f5f call 40511e call 404ac5 call 401f6a call 403ba5 call 401f6a 1110->1117 1118 404e8d-404e91 1111->1118 1119 404e9e-404ee1 call 402835 call 40338e call 40d5c9 call 402292 call 403ba5 1111->1119 1112->1107 1120 404dc1-404dc4 1112->1120 1113->1097 1115 404e19-404e25 1113->1115 1121 404df5 1114->1121 1122 404de5-404df3 wcscmp 1114->1122 1124 404e37-404e56 call 4036fb call 404f62 call 401f9f 1115->1124 1125 404e27-404e2a 1115->1125 1116->1105 1118->1110 1128 404e93-404e9c 1118->1128 1119->1117 1120->1107 1123 404df8-404dfe 1121->1123 1122->1121 1122->1123 1123->1114 1131 404e00-404e04 1123->1131 1124->1097 1124->1115 1125->1124 1132 404e2c-404e35 call 404906 1125->1132 1128->1110 1128->1119 1131->1113 1136 404e06-404e0c 1131->1136 1132->1097 1132->1124 1141 404e0e 1136->1141 1142 404e0f 1136->1142 1141->1142 1142->1113
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: wcscmp$ExceptionH_prologThrow
                                                                                                • String ID:
                                                                                                • API String ID: 2750596395-0
                                                                                                • Opcode ID: f23e2ef40910e6ffc54e826b8d0121cb1542fb9c33c64a9faf08078d31a669d3
                                                                                                • Instruction ID: a49034ca18766dd2985d6115f704c3eb646d16e2e938f66f16f9e822e2dcca93
                                                                                                • Opcode Fuzzy Hash: f23e2ef40910e6ffc54e826b8d0121cb1542fb9c33c64a9faf08078d31a669d3
                                                                                                • Instruction Fuzzy Hash: 4791BF71D002499FCF15DFA8C845AEEBBB0BF95304F54806EE500B72D1CB385A45CB58

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1161 417dfd-417e20 call 425a80 call 409325 1166 417e26-417e2f call 418029 1161->1166 1167 417fa8-417fb6 1161->1167 1170 417e31-417e33 1166->1170 1171 417e38-417e3d 1166->1171 1170->1167 1172 417e3f-417e44 1171->1172 1173 417e4e-417e5f call 41e080 1171->1173 1172->1173 1174 417e46-417e49 1172->1174 1177 417e61-417e71 _CxxThrowException 1173->1177 1178 417e76-417e8d memcpy 1173->1178 1174->1167 1177->1178 1179 417e91-417e9c 1178->1179 1180 417ea1-417ea3 1179->1180 1181 417e9e 1179->1181 1182 417ea5-417eb4 1180->1182 1183 417ec6-417ede call 407b7e 1180->1183 1181->1180 1184 417eb6 1182->1184 1185 417ebe-417ec0 1182->1185 1191 417ee0-417ee5 1183->1191 1192 417f59-417f5b 1183->1192 1186 417eb8-417eba 1184->1186 1187 417ebc 1184->1187 1185->1183 1188 417f5d-417f60 1185->1188 1186->1185 1186->1187 1187->1185 1190 417f9f-417fa6 call 41e0b0 1188->1190 1190->1167 1191->1188 1193 417ee7-417efd call 417fc0 1191->1193 1192->1190 1198 417f38-417f54 memmove 1193->1198 1199 417eff 1193->1199 1198->1179 1200 417f04-417f1a call 4251e0 1199->1200 1203 417f62-417f97 memcpy call 407c4c 1200->1203 1204 417f1c-417f33 call 417fc0 1200->1204 1207 417f9a-417f9d 1203->1207 1208 417f01 1204->1208 1209 417f35 1204->1209 1207->1190 1208->1200 1209->1198
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog
                                                                                                • String ID:
                                                                                                • API String ID: 3519838083-0
                                                                                                • Opcode ID: 6465af3b85f9c6ec0544edb33d8b4d85580d0812a5a0e51c2c98df890fa78ea5
                                                                                                • Instruction ID: fc13bfd809c8fc2b6a0ab506a486224924f27f492ec3e4f1722cabba43a86d91
                                                                                                • Opcode Fuzzy Hash: 6465af3b85f9c6ec0544edb33d8b4d85580d0812a5a0e51c2c98df890fa78ea5
                                                                                                • Instruction Fuzzy Hash: 9A519B76A043159FDB10DFA4C881BFFB7B5BF88314F14441AE905AB341D778AD868BA8

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1212 405c98-405cb8 call 425a80 call 4069e5 1217 405cbe-405cc4 1212->1217 1218 405e6f-405e85 call 40695f 1212->1218 1217->1218 1219 405cca-405cea call 40334b * 2 1217->1219 1224 405e87-405e89 1218->1224 1225 405e8a-405e97 call 406747 1218->1225 1232 405cf7-405cfd 1219->1232 1233 405cec-405cf2 1219->1233 1224->1225 1230 405ef4-405efb 1225->1230 1231 405e99-405e9f 1225->1231 1234 405f07-405f0e 1230->1234 1235 405efd-405f01 1230->1235 1231->1230 1236 405ea1-405ead call 405c89 1231->1236 1237 405d14-405d1c call 403737 1232->1237 1238 405cff-405d12 call 402b85 1232->1238 1233->1232 1241 405f40-405f47 call 4068e7 1234->1241 1242 405f10-405f1a call 405c89 1234->1242 1235->1234 1239 406006-40600b call 405a8d 1235->1239 1236->1239 1253 405eb3-405eb6 1236->1253 1246 405d21-405d2e call 406944 1237->1246 1238->1237 1238->1246 1255 406010-406014 1239->1255 1241->1239 1259 405f4d-405f58 1241->1259 1242->1239 1257 405f20-405f23 1242->1257 1263 405d30-405d33 1246->1263 1264 405d66-405d73 call 405c98 1246->1264 1253->1239 1258 405ebc-405ed9 call 405986 call 403447 1253->1258 1260 406016-406018 1255->1260 1261 40602d 1255->1261 1257->1239 1265 405f29-405f3e call 405986 1257->1265 1296 405ee5-405ee8 call 406097 1258->1296 1297 405edb-405ee0 1258->1297 1259->1239 1267 405f5e-405f67 call 406701 1259->1267 1260->1261 1268 40601a-406023 1260->1268 1262 40602f-406032 call 405a6d 1261->1262 1280 406037 1262->1280 1272 405d41-405d59 call 405986 1263->1272 1273 405d35-405d38 1263->1273 1286 405d79 1264->1286 1287 405e5d-405e6e call 403ba5 * 2 1264->1287 1289 405eed-405eef 1265->1289 1267->1239 1285 405f6d-405f77 call 406097 1267->1285 1268->1261 1270 406025-406028 call 406097 1268->1270 1270->1261 1293 405d7b-405da1 call 4033db call 403308 1272->1293 1295 405d5b-405d64 call 4034ab 1272->1295 1273->1264 1281 405d3a-405d3f 1273->1281 1288 406039-406047 1280->1288 1281->1264 1281->1272 1303 405f87-405fb8 call 40334b call 404f62 call 403634 call 405a8d 1285->1303 1304 405f79-405f82 call 403447 1285->1304 1286->1293 1287->1218 1289->1262 1313 405da6-405dbc call 405c49 1293->1313 1295->1293 1296->1289 1297->1296 1335 405fe0-405fed call 405c89 1303->1335 1336 405fba-405fd0 wcscmp 1303->1336 1315 406076-406080 call 405a6d 1304->1315 1322 405df2-405df4 1313->1322 1323 405dbe-405dc2 1313->1323 1315->1288 1325 405e2c-405e58 call 403ba5 * 2 call 405a6d call 403ba5 * 2 1322->1325 1326 405dc4-405dd1 call 402ac7 1323->1326 1327 405dea-405dec SetLastError 1323->1327 1325->1280 1338 405dd3-405de8 call 403ba5 call 403308 1326->1338 1339 405df6-405dfc 1326->1339 1327->1322 1355 40604a-406054 call 405986 1335->1355 1356 405fef-405ff2 1335->1356 1340 405fd2-405fd7 1336->1340 1341 405fdc 1336->1341 1338->1313 1343 405dfe-405e03 1339->1343 1344 405e0f-405e2a call 4036fb 1339->1344 1349 406068-406075 call 403447 call 403ba5 1340->1349 1341->1335 1343->1344 1351 405e05-405e0b 1343->1351 1344->1325 1349->1315 1351->1344 1372 406056-406059 1355->1372 1373 40605b 1355->1373 1361 405ff4-405ff7 1356->1361 1362 405ff9-406005 call 403ba5 1356->1362 1361->1355 1361->1362 1362->1239 1375 406062-406065 1372->1375 1373->1375 1375->1349
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 00405C9D
                                                                                                • SetLastError.KERNEL32(00000002,?,?,0000FBEF,:$DATA,?,00000000,00000000,?,00000001), ref: 00405DEC
                                                                                                  • Part of subcall function 00405C98: wcscmp.MSVCRT ref: 00405FC6
                                                                                                  • Part of subcall function 00405C89: GetFileAttributesW.KERNELBASE(?,00405FE7,?,?,0000002A,?,?,00000000,?,00000001), ref: 00405C8A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: AttributesErrorFileH_prologLastwcscmp
                                                                                                • String ID: :$DATA
                                                                                                • API String ID: 3506966624-2587938151
                                                                                                • Opcode ID: 87bfde631d3deb79e08e3bd7bfe69129d78864a065144b55b4a4eba179ff856b
                                                                                                • Instruction ID: 07b953e3390746c4a9dc82bd7aadb35804c006ab05ede8c66105daedd2d37e57
                                                                                                • Opcode Fuzzy Hash: 87bfde631d3deb79e08e3bd7bfe69129d78864a065144b55b4a4eba179ff856b
                                                                                                • Instruction Fuzzy Hash: E6C1D030900A059ADF25EFA5C485AEEBBB5EF14318F10813FE882772D2DB3D5A55CB18

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1376 40efa5-40efd0 call 425a80 1379 40efd2-40efdc call 403b71 1376->1379 1380 40efff-40f002 1376->1380 1389 40efe9 1379->1389 1390 40efde-40efe7 1379->1390 1381 40f008-40f019 call 403b71 1380->1381 1382 40f08e-40f091 call 40ed49 1380->1382 1391 40f024-40f052 call 40b2c2 call 4034ab call 406518 1381->1391 1392 40f01b-40f022 call 4079c2 1381->1392 1388 40f096-40f09f 1382->1388 1393 40f0a5-40f0a9 1388->1393 1394 40f278-40f281 1388->1394 1395 40efeb-40effa call 40b2c2 1389->1395 1390->1395 1424 40f084-40f08a 1391->1424 1425 40f054-40f064 call 4062c4 1391->1425 1392->1391 1393->1394 1400 40f0af-40f0b3 1393->1400 1396 40f283-40f285 1394->1396 1397 40f289-40f292 1394->1397 1395->1382 1396->1397 1402 40f294-40f296 1397->1402 1403 40f29a 1397->1403 1400->1394 1406 40f0b9-40f0c0 1400->1406 1402->1403 1408 40f29c-40f2aa 1403->1408 1410 40f0c2-40f0c8 1406->1410 1411 40f0ce-40f0d4 1406->1411 1410->1394 1410->1411 1412 40f219-40f222 1411->1412 1413 40f0da-40f0f3 call 402b85 1411->1413 1417 40f224-40f226 1412->1417 1418 40f22a-40f233 1412->1418 1413->1412 1423 40f0f9-40f119 call 40a54a 1413->1423 1417->1418 1420 40f235-40f237 1418->1420 1421 40f23b-40f23e 1418->1421 1420->1421 1421->1408 1432 40f210-40f218 call 403ba5 1423->1432 1433 40f11f-40f137 call 402b85 1423->1433 1424->1382 1430 40f066-40f068 1425->1430 1431 40f06c-40f075 1425->1431 1430->1431 1434 40f077-40f079 1431->1434 1435 40f07d-40f07f 1431->1435 1432->1412 1440 40f13d-40f1a0 call 4033db call 403661 call 40f2f2 call 4036fb call 403ba5 call 4034ab call 403737 call 40f2c5 1433->1440 1441 40f1ff-40f20a 1433->1441 1434->1435 1435->1408 1458 40f1a2-40f1b9 call 4034ab call 40f2c5 1440->1458 1459 40f1bb-40f1cf call 406518 1440->1459 1441->1432 1441->1433 1458->1459 1465 40f1f2-40f1fe call 403ba5 1458->1465 1464 40f1d1-40f1f0 call 40e3d4 call 40ed49 1459->1464 1459->1465 1464->1465 1474 40f240-40f25b call 403ba5 * 2 1464->1474 1465->1441 1479 40f263-40f26c 1474->1479 1480 40f25d-40f25f 1474->1480 1481 40f274-40f276 1479->1481 1482 40f26e-40f270 1479->1482 1480->1479 1481->1408 1482->1481
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 0040EFAA
                                                                                                  • Part of subcall function 00403B71: malloc.MSVCRT ref: 00403B84
                                                                                                  • Part of subcall function 00403B71: _CxxThrowException.MSVCRT(?,0042C1C8), ref: 00403B9E
                                                                                                  • Part of subcall function 0040ED49: __EH_prolog.LIBCMT ref: 0040ED4E
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog$ExceptionThrowmalloc
                                                                                                • String ID: .001$.exe$Split
                                                                                                • API String ID: 3744649731-1819480430
                                                                                                • Opcode ID: b0caf2b682cef3c7a4c66ef42f6e36627b6efe1c141464d3df3cc4290bd1e483
                                                                                                • Instruction ID: 6ee4b62a70a765373665152c840579a13589d10806b9eb9c9327f76c0b6f4a6d
                                                                                                • Opcode Fuzzy Hash: b0caf2b682cef3c7a4c66ef42f6e36627b6efe1c141464d3df3cc4290bd1e483
                                                                                                • Instruction Fuzzy Hash: 8AA1D334A00205DBCF21DFA5C445BAEBBB4AF45314F1445BEE845BB6D2CB39AE49CB14

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1483 411a47-411a73 call 425a80 fputs * 2 1486 411a81-411a9a call 40334b 1483->1486 1487 411a75-411a7f call 411ad2 1483->1487 1493 411aa3 call 403db3 1486->1493 1494 411a9c-411aa1 call 403dfe 1486->1494 1492 411ac2-411acf 1487->1492 1497 411aa8-411aad call 403d01 1493->1497 1494->1497 1500 411ab2-411ac1 call 403cee call 403ba5 1497->1500 1500->1492
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 00411A4C
                                                                                                • fputs.MSVCRT ref: 00411A61
                                                                                                • fputs.MSVCRT ref: 00411A6A
                                                                                                  • Part of subcall function 00411AD2: __EH_prolog.LIBCMT ref: 00411AD7
                                                                                                  • Part of subcall function 00411AD2: fputs.MSVCRT ref: 00411B17
                                                                                                  • Part of subcall function 00411AD2: fputs.MSVCRT ref: 00411BA6
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: fputs$H_prolog
                                                                                                • String ID: =
                                                                                                • API String ID: 2614055831-2525689732
                                                                                                • Opcode ID: cb02bf5d739171821884010db5d4c3a9afc62b04c47f741bb3b2f8847e761e53
                                                                                                • Instruction ID: 4685179e67a5387b9933c8bac1fb032a3b631e83bc1fbaf7f8a336648ebc960e
                                                                                                • Opcode Fuzzy Hash: cb02bf5d739171821884010db5d4c3a9afc62b04c47f741bb3b2f8847e761e53
                                                                                                • Instruction Fuzzy Hash: 84012831A00005ABDF15BF66D802BEE7F79AF80359F00402FF841622A1CB7C5A91CB9A

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1505 424660-424679 WaitForSingleObject 1506 424686 1505->1506 1507 42467b-42467f GetLastError 1505->1507 1509 424688-42468c 1506->1509 1507->1506 1508 424681-424684 1507->1508 1508->1509 1510 42468e-424697 CloseHandle 1509->1510 1511 4246ac 1509->1511 1512 4246a6 1510->1512 1513 424699-42469d GetLastError 1510->1513 1514 4246ae-4246b0 1511->1514 1512->1511 1513->1514 1515 42469f-4246a4 1513->1515 1516 4246b2 1514->1516 1517 4246b4-4246b7 1514->1517 1515->1514 1516->1517
                                                                                                APIs
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0042466A
                                                                                                • GetLastError.KERNEL32(?,000000FF), ref: 0042467B
                                                                                                • CloseHandle.KERNELBASE(00000000,?,000000FF), ref: 0042468F
                                                                                                • GetLastError.KERNEL32(?,000000FF), ref: 00424699
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$CloseHandleObjectSingleWait
                                                                                                • String ID:
                                                                                                • API String ID: 1796208289-0
                                                                                                • Opcode ID: 9ad817bcdee8a37bd63ddf115caa5bcabacb03681436272bee2871554aa3e524
                                                                                                • Instruction ID: 0e6695afe9b1d70dfe2be0eee00a61d69e8467993ccb29156463d7536a55e89f
                                                                                                • Opcode Fuzzy Hash: 9ad817bcdee8a37bd63ddf115caa5bcabacb03681436272bee2871554aa3e524
                                                                                                • Instruction Fuzzy Hash: 01F05E713046324BDB305AB9AC44A1776DCDFD2774BA10737E960C33D0DA6CCC028A68
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 0040C36E
                                                                                                  • Part of subcall function 004062C4: GetLastError.KERNEL32(0040CC4F,?,00000001,?,00000010,00000000,00000000), ref: 004062C4
                                                                                                  • Part of subcall function 0040CF00: __EH_prolog.LIBCMT ref: 0040CF05
                                                                                                  • Part of subcall function 00403BA5: free.MSVCRT ref: 00403BA9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog$ErrorLastfree
                                                                                                • String ID: Cannot find archive file$The item is a directory
                                                                                                • API String ID: 683690243-1569138187
                                                                                                • Opcode ID: ba4e93d295138a7c7a93445b13343d5f42624c3586502f83140f31495d1f815e
                                                                                                • Instruction ID: b5a1b32bc12d711d5e0a8161568501f8c01d54cd71bc8ef7c26888fa0a065d70
                                                                                                • Opcode Fuzzy Hash: ba4e93d295138a7c7a93445b13343d5f42624c3586502f83140f31495d1f815e
                                                                                                • Instruction Fuzzy Hash: D6724970900258DFDB21DF68C884BDEBBB5AF59304F1441AAE849B7392C778AE81CF55

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1779 4124e9-4124fb 1780 412501-412509 1779->1780 1781 412754-412758 1779->1781 1782 412514-41251b 1780->1782 1783 41250b-412511 GetTickCount 1780->1783 1784 41258d-4125a4 call 412442 1782->1784 1785 41251d-412522 1782->1785 1783->1782 1791 4125a6-4125b5 call 40303f 1784->1791 1792 4125bb-4125d1 call 402e7e 1784->1792 1787 412532-412542 call 40303f 1785->1787 1788 412524-41252c 1785->1788 1787->1784 1796 412544-412554 call 403a33 1787->1796 1788->1781 1788->1787 1791->1781 1791->1792 1801 4125d3-4125ea call 4028c3 call 402ef8 call 402f40 1792->1801 1802 4125ef-4125f2 1792->1802 1796->1784 1803 412556-41255c 1796->1803 1801->1802 1805 4125f4-412601 call 402ef8 call 402f82 1802->1805 1806 412606-412609 1802->1806 1803->1784 1807 41255e-412564 1803->1807 1805->1806 1810 4126f7-412703 call 412759 1806->1810 1811 41260f-412618 1806->1811 1807->1784 1812 412566-41256c 1807->1812 1826 412740-41274c call 412777 1810->1826 1827 412705-41272c call 4123af fputs 1810->1827 1811->1810 1816 41261e-41265b call 402ef8 call 4034ab call 403dfe call 403d81 1811->1816 1818 412589 1812->1818 1819 41256e-412574 1812->1819 1845 412661-412669 1816->1845 1846 4126ea-4126f5 call 402f82 1816->1846 1818->1784 1819->1818 1824 412576-41257b 1819->1824 1824->1818 1830 41257d-412583 1824->1830 1826->1781 1838 41274e-412751 1826->1838 1835 412735-41273e call 402e7e 1827->1835 1836 41272e-412730 call 403cdf 1827->1836 1830->1781 1830->1818 1835->1826 1836->1835 1838->1781 1847 4126e0-4126e7 1845->1847 1848 41266b-412671 1845->1848 1846->1810 1847->1846 1850 412673-412675 1848->1850 1851 412676-4126d2 call 4034ab call 403a54 call 4038f3 call 403dfe call 403d81 1848->1851 1850->1851 1863 4126d4-4126d8 1851->1863 1864 4126da-4126de 1851->1864 1863->1848 1863->1864 1864->1846 1864->1847
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: CountTickfputs
                                                                                                • String ID: .
                                                                                                • API String ID: 290905099-4150638102
                                                                                                • Opcode ID: 62978d2e05be1da6066eb87697aec2cc0ac5a4a437e1c063d05335f7abfea39d
                                                                                                • Instruction ID: cb26736c674bc8d9c7ca26a32cfd03a69c5f5ceaab9adc37427ae5af0aaaee1d
                                                                                                • Opcode Fuzzy Hash: 62978d2e05be1da6066eb87697aec2cc0ac5a4a437e1c063d05335f7abfea39d
                                                                                                • Instruction Fuzzy Hash: 21814C30600B459FCB25DF65C6D0AABB7F6AF40304F10482EE496D7691DBB8F989CB18
                                                                                                APIs
                                                                                                  • Part of subcall function 0040739D: GetModuleHandleA.KERNEL32(kernel32.dll,GlobalMemoryStatusEx), ref: 004073C1
                                                                                                  • Part of subcall function 0040739D: GetProcAddress.KERNEL32(00000000), ref: 004073C8
                                                                                                  • Part of subcall function 0040739D: GlobalMemoryStatusEx.KERNELBASE(00000040), ref: 004073D6
                                                                                                • __aulldiv.LIBCMT ref: 00416ECD
                                                                                                • __aulldiv.LIBCMT ref: 00416ED9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: __aulldiv$AddressGlobalHandleMemoryModuleProcStatus
                                                                                                • String ID: 3333
                                                                                                • API String ID: 3520896023-2924271548
                                                                                                • Opcode ID: 14d98df592c1ed9401447ad19b8c5cbbf4c4088a852356cff76e661ec3d3721c
                                                                                                • Instruction ID: 5119751143de8b55060969e9aa1b5a70445e0105ff33e8ddafc95c9096c2d0b2
                                                                                                • Opcode Fuzzy Hash: 14d98df592c1ed9401447ad19b8c5cbbf4c4088a852356cff76e661ec3d3721c
                                                                                                • Instruction Fuzzy Hash: 6521B7B5A00704AFE730DF6A9881A6FFAF8EB84714F44892FB145D3641D674ED408B59
                                                                                                APIs
                                                                                                • SetFilePointer.KERNELBASE(?,00000000,?,80004004,80004004,?,?,?,?,0040646C,80004004,80004004,00000000,?,0040666B,00000000), ref: 00406404
                                                                                                • GetLastError.KERNEL32(?,0040646C,80004004,80004004,00000000,?,0040666B,00000000,?,00000000,?,?,?,?,0040AE79,?), ref: 00406411
                                                                                                  • Part of subcall function 00406389: SetFilePointer.KERNEL32(?,00000000,?,00000001,00000000,?,?,?,00406427,?,?,0040646C,80004004,80004004,00000000,?), ref: 0040639D
                                                                                                  • Part of subcall function 00406389: GetLastError.KERNEL32(?,00406427,?,?,0040646C,80004004,80004004,00000000,?,0040666B,00000000,?,00000000,?,?,?), ref: 004063AA
                                                                                                • SetLastError.KERNEL32(00000000,?,?,0040646C,80004004,80004004,00000000,?,0040666B,00000000,?,00000000,?,?,?), ref: 00406428
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$FilePointer
                                                                                                • String ID:
                                                                                                • API String ID: 1156039329-0
                                                                                                • Opcode ID: 0b05d6185b408afcdee46b4b0f28ff2912608ed381f3cb98e0708fe1c876e7e2
                                                                                                • Instruction ID: 864dc6c6c593cf8bf19505ec3c4d2a71f9220abb1ddbe6d7f18ae570c31cdd18
                                                                                                • Opcode Fuzzy Hash: 0b05d6185b408afcdee46b4b0f28ff2912608ed381f3cb98e0708fe1c876e7e2
                                                                                                • Instruction Fuzzy Hash: 89018475300208AFCB119F68EC45A9F3BE9AF48320F51813AF906E7391D6758D119668
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 0040575E
                                                                                                • CreateDirectoryW.KERNELBASE(?,00000000,80004004,00000000), ref: 0040576E
                                                                                                • GetLastError.KERNEL32(?,00000000,80004004,00000000), ref: 0040577C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateDirectoryErrorH_prologLast
                                                                                                • String ID:
                                                                                                • API String ID: 2841023564-0
                                                                                                • Opcode ID: 9cacd7261072eef841eea90e155f46b680eb7036377b12a0fd961b6c2ca1e33c
                                                                                                • Instruction ID: 079377e55826ee0f4379d49620bbc90c1195ddaef26b68593b7f8623b37cd9bc
                                                                                                • Opcode Fuzzy Hash: 9cacd7261072eef841eea90e155f46b680eb7036377b12a0fd961b6c2ca1e33c
                                                                                                • Instruction Fuzzy Hash: E2F06D75A01A18DEDB14AF54E985AEF7778EB15348F50003EE802B72D2CA385E06DE69
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog
                                                                                                • String ID: Split
                                                                                                • API String ID: 3519838083-1882502421
                                                                                                • Opcode ID: d2399743dbce8c0cfa1657e305499ecf9d3750d973dcb538bf738901abf4c24c
                                                                                                • Instruction ID: 736ae2316e5d0145198b9a3bf66f2ac6d4ce90c3458676da96f14d14a3bbf3ba
                                                                                                • Opcode Fuzzy Hash: d2399743dbce8c0cfa1657e305499ecf9d3750d973dcb538bf738901abf4c24c
                                                                                                • Instruction Fuzzy Hash: 6F025070A00249DFDB11DFA6C884AAEBBB5BF08304F14887EE446BB391D739AD55CB54
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 0040CF74
                                                                                                  • Part of subcall function 00405618: __EH_prolog.LIBCMT ref: 0040561D
                                                                                                Strings
                                                                                                • Cannot create output directory, xrefs: 0040D32C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog
                                                                                                • String ID: Cannot create output directory
                                                                                                • API String ID: 3519838083-1181934277
                                                                                                • Opcode ID: e65345c544e7efc1230a7093f43446513c1aad28dde1dd46808d5c34d966500d
                                                                                                • Instruction ID: 1cab3c87023adceb4cf1cff07f82d3cc3a0dce552b336292f606194224630fe1
                                                                                                • Opcode Fuzzy Hash: e65345c544e7efc1230a7093f43446513c1aad28dde1dd46808d5c34d966500d
                                                                                                • Instruction Fuzzy Hash: 2FF18E31D00249DFCF11EFE4C8949EEBBB5AF59308F14806EE84577292DB389A49CB55
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 0040A56A
                                                                                                  • Part of subcall function 00409F0A: __EH_prolog.LIBCMT ref: 00409F0F
                                                                                                  • Part of subcall function 0040D993: __EH_prolog.LIBCMT ref: 0040D998
                                                                                                  • Part of subcall function 0040A130: __EH_prolog.LIBCMT ref: 0040A135
                                                                                                  • Part of subcall function 0040A23C: __EH_prolog.LIBCMT ref: 0040A241
                                                                                                Strings
                                                                                                • Cannot seek to begin of file, xrefs: 0040A8C0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog
                                                                                                • String ID: Cannot seek to begin of file
                                                                                                • API String ID: 3519838083-2298593816
                                                                                                • Opcode ID: bee1894de2faad67771b6db50f6893a6025d9f0d75ec941aa60c9f0f82a65786
                                                                                                • Instruction ID: ecade97c4e2ac40fd8b16c0bf8f986f2c90cabb7ab41a2d788bc46ed2bc5babc
                                                                                                • Opcode Fuzzy Hash: bee1894de2faad67771b6db50f6893a6025d9f0d75ec941aa60c9f0f82a65786
                                                                                                • Instruction Fuzzy Hash: B6C1F171A003419EDB21DB64C484BAEBBF4AF40304F14887FE486B72D2DB78AD55C75A
                                                                                                APIs
                                                                                                • fputs.MSVCRT ref: 00412418
                                                                                                  • Part of subcall function 00402CC8: _CxxThrowException.MSVCRT(00000000,0042C050), ref: 00402CEA
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionThrowfputs
                                                                                                • String ID:
                                                                                                • API String ID: 1334390793-399585960
                                                                                                • Opcode ID: ec99868a2370106556cac535b7a6e100cd634181ff94c6eddc8767ec8ac5bdfa
                                                                                                • Instruction ID: d8e4c1249425f7f36e7589520ef7ed907c8d3a90e64baa80d70663753212215a
                                                                                                • Opcode Fuzzy Hash: ec99868a2370106556cac535b7a6e100cd634181ff94c6eddc8767ec8ac5bdfa
                                                                                                • Instruction Fuzzy Hash: 6711DD716047049FEB25CF59D881BAABBE6FF4A304F44406EE186CB281C7B9BC54CB64
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: fputs
                                                                                                • String ID: Open
                                                                                                • API String ID: 1795875747-71445658
                                                                                                • Opcode ID: dc1672cedb5b06db92c9f3a5834d7b7fcc6fc189d1a6f73a6a8db1cb7b33b2b4
                                                                                                • Instruction ID: b3d4efdce60f7cf7a5ac5682edf5dbbf603c16c6f2166bcf7d74fcf7ccc6ffd6
                                                                                                • Opcode Fuzzy Hash: dc1672cedb5b06db92c9f3a5834d7b7fcc6fc189d1a6f73a6a8db1cb7b33b2b4
                                                                                                • Instruction Fuzzy Hash: A811EE321047449FE721EF32D891ADBBBA5BF10314F00882FE49A83291DB766994CF49
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 0040A241
                                                                                                  • Part of subcall function 00405C98: __EH_prolog.LIBCMT ref: 00405C9D
                                                                                                  • Part of subcall function 00403BA5: free.MSVCRT ref: 00403BA9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog$free
                                                                                                • String ID:
                                                                                                • API String ID: 2654054672-0
                                                                                                • Opcode ID: 3cad1ab7b769f2d1acacac0414ec1099ca9b1d7be8c662c3c923ed6bed840f9a
                                                                                                • Instruction ID: 119d2db5184c98bb620e655760488671e2cf7285567f933d7f5c7ab3a4145e28
                                                                                                • Opcode Fuzzy Hash: 3cad1ab7b769f2d1acacac0414ec1099ca9b1d7be8c662c3c923ed6bed840f9a
                                                                                                • Instruction Fuzzy Hash: F291D431900204ABCF21EFA5D885AAEBBB5AF85308F14403FE841B72D1CB395E55CB5A
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 0041923F
                                                                                                • _CxxThrowException.MSVCRT(?,0042E810), ref: 00419459
                                                                                                  • Part of subcall function 00414F30: __EH_prolog.LIBCMT ref: 00414F35
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog$ExceptionThrow
                                                                                                • String ID:
                                                                                                • API String ID: 2366012087-0
                                                                                                • Opcode ID: 5b91504e9a128caa8ba8520bba2a7aec4533bf77359d1d494c76c090470ab4c4
                                                                                                • Instruction ID: 4dd68368b573ab2b3fbb2926aa4f54af7d60f28f21f52d43cd7d550c9688040f
                                                                                                • Opcode Fuzzy Hash: 5b91504e9a128caa8ba8520bba2a7aec4533bf77359d1d494c76c090470ab4c4
                                                                                                • Instruction Fuzzy Hash: 2B816D70D00159DFCB11DFA4C891AEEBBB5BF09308F10809AE455B7292DB38AE95CF64
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 0040561D
                                                                                                  • Part of subcall function 00405C89: GetFileAttributesW.KERNELBASE(?,00405FE7,?,?,0000002A,?,?,00000000,?,00000001), ref: 00405C8A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: AttributesFileH_prolog
                                                                                                • String ID:
                                                                                                • API String ID: 3244726999-0
                                                                                                • Opcode ID: 7307f15d7dcd26a1028437531f8b3d46531374772733964b746c2e4a545ecfa4
                                                                                                • Instruction ID: 1ec97c357641f2a95409124c811880a2bc8558c2d5f8d70d5842d2e5aa1dfbfc
                                                                                                • Opcode Fuzzy Hash: 7307f15d7dcd26a1028437531f8b3d46531374772733964b746c2e4a545ecfa4
                                                                                                • Instruction Fuzzy Hash: 96318A31900916DACF24ABA8C5814FFB775EF11318F90047BD802B72D1DB3A6E469FA9
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 00419F30
                                                                                                  • Part of subcall function 00419C39: __EH_prolog.LIBCMT ref: 00419C3E
                                                                                                • _CxxThrowException.MSVCRT(?,0042E810), ref: 00419F7B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog$ExceptionThrow
                                                                                                • String ID:
                                                                                                • API String ID: 2366012087-0
                                                                                                • Opcode ID: f3ed8672d2c2e4200345710861aa6959bc24473354d3664b997b8fe4b6267530
                                                                                                • Instruction ID: 46f78fe5ae91ca0ba6bfca82b63fd184bcf2fa2220459aed858054068ed78b21
                                                                                                • Opcode Fuzzy Hash: f3ed8672d2c2e4200345710861aa6959bc24473354d3664b997b8fe4b6267530
                                                                                                • Instruction Fuzzy Hash: 0401DF32500248BFDF118F54C816BEE7BA4EB45314F44414AF4489B211C3BA9990CBA4
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast_beginthreadex
                                                                                                • String ID:
                                                                                                • API String ID: 4034172046-0
                                                                                                • Opcode ID: 84ad473c3d34086ae7fede349773d0ba2c5fd96f40ec9ed9a40fef1eb1428159
                                                                                                • Instruction ID: 467cfe1d8112a966019ebae5ced0304520bc6109d9d80bdd01151506748d1c69
                                                                                                • Opcode Fuzzy Hash: 84ad473c3d34086ae7fede349773d0ba2c5fd96f40ec9ed9a40fef1eb1428159
                                                                                                • Instruction Fuzzy Hash: C2E0CDB63042115FF3109B54AC01F7771DCDBD0701F80443EBA44CA180E6A5CD00C379
                                                                                                APIs
                                                                                                • GetCurrentProcess.KERNEL32(?,?,0040737C), ref: 00407360
                                                                                                • GetProcessAffinityMask.KERNEL32(00000000), ref: 00407367
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: Process$AffinityCurrentMask
                                                                                                • String ID:
                                                                                                • API String ID: 1231390398-0
                                                                                                • Opcode ID: 81c132c54f17672c127dd815764c6083acefeaec05c63578e1865d3c67dcce40
                                                                                                • Instruction ID: 6c427cee417cddacfba452fddf0a978d30e57e06aa7b4599873eb5b06c94d529
                                                                                                • Opcode Fuzzy Hash: 81c132c54f17672c127dd815764c6083acefeaec05c63578e1865d3c67dcce40
                                                                                                • Instruction Fuzzy Hash: C9B092B1500108ABCE209BA09D0CC163B2CBB052017508464B101C2010C636C802CB24
                                                                                                APIs
                                                                                                • EnterCriticalSection.KERNEL32(?,?,?,00422E61,?,?,?,?,00000000,00000000,00000000,00000000,?,?), ref: 004220D8
                                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 0042213C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterLeave
                                                                                                • String ID:
                                                                                                • API String ID: 3168844106-0
                                                                                                • Opcode ID: eac4f34b2d8b9f95b90929ce9a24efbc20dc996e9036948340617c887f31075f
                                                                                                • Instruction ID: f50e5a8d1bc7c2573474e86cbefc73510f32451a4931060e28914d4ecc17dea9
                                                                                                • Opcode Fuzzy Hash: eac4f34b2d8b9f95b90929ce9a24efbc20dc996e9036948340617c887f31075f
                                                                                                • Instruction Fuzzy Hash: DC11CE75700B019FC734CF19D980A2BB3F6AF88B10B44892DE59AD3B10D774F8068B61
                                                                                                APIs
                                                                                                • EnterCriticalSection.KERNEL32(00430538), ref: 004105D7
                                                                                                • LeaveCriticalSection.KERNEL32(00430538), ref: 00410616
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterLeave
                                                                                                • String ID:
                                                                                                • API String ID: 3168844106-0
                                                                                                • Opcode ID: b241e6e0a0e399f6be3b330eef631e663d5ca75de7b7d6124f0b7a41341d90da
                                                                                                • Instruction ID: 685853894ae39eee227984b1d0e7600127116368531782c57f48b05f3866eb5d
                                                                                                • Opcode Fuzzy Hash: b241e6e0a0e399f6be3b330eef631e663d5ca75de7b7d6124f0b7a41341d90da
                                                                                                • Instruction Fuzzy Hash: 04F058346412109FD318DF16C808FAA37A1AFD5315F1A80BEE00587362CB78CCC6CB94
                                                                                                APIs
                                                                                                • CloseHandle.KERNELBASE(00000000,00000000,00413A40,?,00413773,00000000,?,?,0041309F,?), ref: 0042461A
                                                                                                • GetLastError.KERNEL32(?,0041309F,?), ref: 00424624
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: CloseErrorHandleLast
                                                                                                • String ID:
                                                                                                • API String ID: 918212764-0
                                                                                                • Opcode ID: aa73dd18d57520f207ceaa29438d66ae8266170de33677e67130023f0a0b4a7c
                                                                                                • Instruction ID: 24836bce18bb2cca70c93d26269989a30084265c515bb5c490de6bd10a7965fa
                                                                                                • Opcode Fuzzy Hash: aa73dd18d57520f207ceaa29438d66ae8266170de33677e67130023f0a0b4a7c
                                                                                                • Instruction Fuzzy Hash: 4ED09E713141614BEB705F79BD087977ADCDF51B54F85086EF958C7240EA6CCC834658
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionThrowmalloc
                                                                                                • String ID:
                                                                                                • API String ID: 2436765578-0
                                                                                                • Opcode ID: 3e791b120deac60a940b24b1a74ec80c1e3bf78372a8eec457417a2a87f4d28b
                                                                                                • Instruction ID: 413c76808b874f20dff1fc6092fe03bbab6c47668a85a4a3cdc964c164a5b717
                                                                                                • Opcode Fuzzy Hash: 3e791b120deac60a940b24b1a74ec80c1e3bf78372a8eec457417a2a87f4d28b
                                                                                                • Instruction Fuzzy Hash: E2E0CD3120460C69DF105F50D8467AD3F7C5F10355F809026FC0C5D142C278D7D48744
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 00416499
                                                                                                  • Part of subcall function 00415A25: memset.MSVCRT ref: 00415A39
                                                                                                  • Part of subcall function 00403BA5: free.MSVCRT ref: 00403BA9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prologfreememset
                                                                                                • String ID:
                                                                                                • API String ID: 743394225-0
                                                                                                • Opcode ID: 87a9a78664fd45122a5da8fb1cfe3d7209b2e8fe7d627238ec6be8498e6135af
                                                                                                • Instruction ID: 2c44f47edba988f8aeb80a4babf8dfcf021c45bdc66655be1d995d0b6d76fbbe
                                                                                                • Opcode Fuzzy Hash: 87a9a78664fd45122a5da8fb1cfe3d7209b2e8fe7d627238ec6be8498e6135af
                                                                                                • Instruction Fuzzy Hash: B5528170900249DFDB15CFA8C588BEEBBB5AF49304F19409EE445AB391DB38DE85CB25
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog
                                                                                                • String ID:
                                                                                                • API String ID: 3519838083-0
                                                                                                • Opcode ID: 1aee6a2b02e4ed9202893e1c1d1e0e5268040115cd70fa0940a311bbe32e592f
                                                                                                • Instruction ID: 82ec2a547574f120ef1af248452345df4ce190c02b8900f5607f34d2821a8202
                                                                                                • Opcode Fuzzy Hash: 1aee6a2b02e4ed9202893e1c1d1e0e5268040115cd70fa0940a311bbe32e592f
                                                                                                • Instruction Fuzzy Hash: 5B128F71D00209DFCF24DFA4C984ADEBBB5AF45314F2441BAE445BB291DB38AE49CB15
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 0040AA80
                                                                                                  • Part of subcall function 0040A565: __EH_prolog.LIBCMT ref: 0040A56A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog
                                                                                                • String ID:
                                                                                                • API String ID: 3519838083-0
                                                                                                • Opcode ID: f93629fd31d4145120887d0a92158bcee26909b0a10fb315d0658743ecffe3ce
                                                                                                • Instruction ID: 0ab7f169d6ce1dd3c498451d8d56829bda81e7c46dbb63c9e1e9485555b509e8
                                                                                                • Opcode Fuzzy Hash: f93629fd31d4145120887d0a92158bcee26909b0a10fb315d0658743ecffe3ce
                                                                                                • Instruction Fuzzy Hash: 57A1B071504385DFDB21DF68C190AAABBE1BF15300F54887FE58AAB781D338A954CB1A
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog
                                                                                                • String ID:
                                                                                                • API String ID: 3519838083-0
                                                                                                • Opcode ID: 0ab9992a353954d997e20637339cdba53e6d589b3b11fbd1ffc9004d5494e72c
                                                                                                • Instruction ID: 1255ca181abffa466eb45554b4903856dd8a335ef0234f0ec3abff0dd25b2713
                                                                                                • Opcode Fuzzy Hash: 0ab9992a353954d997e20637339cdba53e6d589b3b11fbd1ffc9004d5494e72c
                                                                                                • Instruction Fuzzy Hash: F5A1A930A04646AFDB29DF65C4907EEFBF1BF18304F10452EE55AA3291C779AD80CB99
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 0040ED4E
                                                                                                  • Part of subcall function 0040E825: __EH_prolog.LIBCMT ref: 0040E82A
                                                                                                  • Part of subcall function 0040C1DC: __EH_prolog.LIBCMT ref: 0040C1E1
                                                                                                  • Part of subcall function 00403BA5: free.MSVCRT ref: 00403BA9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog$free
                                                                                                • String ID:
                                                                                                • API String ID: 2654054672-0
                                                                                                • Opcode ID: 1563f0183111ff3756f6a4956a005afc579fd9423b9086b0a952e52ce037ac1c
                                                                                                • Instruction ID: f06d9fa28c26d18b38afae9a2a45c1291361f954b2c40a63c05487aefbd1d087
                                                                                                • Opcode Fuzzy Hash: 1563f0183111ff3756f6a4956a005afc579fd9423b9086b0a952e52ce037ac1c
                                                                                                • Instruction Fuzzy Hash: CF51B570600206AFDB24EF62C891DAEBBB9AF54308F10487FF141B72D1DB78A945CB54
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 0040F9E5
                                                                                                  • Part of subcall function 00403B71: malloc.MSVCRT ref: 00403B84
                                                                                                  • Part of subcall function 00403B71: _CxxThrowException.MSVCRT(?,0042C1C8), ref: 00403B9E
                                                                                                  • Part of subcall function 0040FB8E: __EH_prolog.LIBCMT ref: 0040FB93
                                                                                                  • Part of subcall function 0040F345: __EH_prolog.LIBCMT ref: 0040F34A
                                                                                                  • Part of subcall function 00403BA5: free.MSVCRT ref: 00403BA9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog$ExceptionThrowfreemalloc
                                                                                                • String ID:
                                                                                                • API String ID: 2423332413-0
                                                                                                • Opcode ID: f2c6da9c2af833501a3f0a98a90cce2383feebc1580640127ebe05efa80fc277
                                                                                                • Instruction ID: f917c622738c18646c6016d604920ad8a146ceec9960691556415646441905d3
                                                                                                • Opcode Fuzzy Hash: f2c6da9c2af833501a3f0a98a90cce2383feebc1580640127ebe05efa80fc277
                                                                                                • Instruction Fuzzy Hash: C9518131900605DFCB25DFA5C48499EBBB4AF08328F14827FE455B76D2CB38AA45CF54
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 00417706
                                                                                                  • Part of subcall function 00419F2B: __EH_prolog.LIBCMT ref: 00419F30
                                                                                                  • Part of subcall function 00419F2B: _CxxThrowException.MSVCRT(?,0042E810), ref: 00419F7B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog$ExceptionThrow
                                                                                                • String ID:
                                                                                                • API String ID: 2366012087-0
                                                                                                • Opcode ID: 83cab5e49b25565b3939891e45a9a10d77df0106bca05394c1e75b10824dee2a
                                                                                                • Instruction ID: bd9aade3164a5327875f6b72e53f7940bc2ea94ed18cba3f1a24b0faa07c9e4a
                                                                                                • Opcode Fuzzy Hash: 83cab5e49b25565b3939891e45a9a10d77df0106bca05394c1e75b10824dee2a
                                                                                                • Instruction Fuzzy Hash: 1B515D74904249DFCB11DFA8C888BDEBBB4AF49304F1444AEE44AD7341C779AE85DB21
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog
                                                                                                • String ID:
                                                                                                • API String ID: 3519838083-0
                                                                                                • Opcode ID: 9d3f9eba52a6049b96d43d4433ba62f4fc9a9c7786f44eb93216ddbc3de23f8f
                                                                                                • Instruction ID: d11674bc6fe02063f26dadcb6afdd03e26e0ef6b4e536af382a12bfe63abda49
                                                                                                • Opcode Fuzzy Hash: 9d3f9eba52a6049b96d43d4433ba62f4fc9a9c7786f44eb93216ddbc3de23f8f
                                                                                                • Instruction Fuzzy Hash: 82518A74A00606CFCB14CF68C5809ABFBB2FF49304B10895EE5929B750D375E9A2DF94
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog
                                                                                                • String ID:
                                                                                                • API String ID: 3519838083-0
                                                                                                • Opcode ID: a997c84d03bd27bc7c58f18df43cd408c6534c18cfdddf53a5232f7de0750d7b
                                                                                                • Instruction ID: 8cea611797d63b8bfc20365acd018897896d5ffa812fa3ec194bbb2aa7859777
                                                                                                • Opcode Fuzzy Hash: a997c84d03bd27bc7c58f18df43cd408c6534c18cfdddf53a5232f7de0750d7b
                                                                                                • Instruction Fuzzy Hash: F541C070A00256EFDB20CF54C488BAABBE0BF15314F1586AED49A97791C774EDC0CB44
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog
                                                                                                • String ID:
                                                                                                • API String ID: 3519838083-0
                                                                                                • Opcode ID: 99f0c1ea61ba1c17496419a7e591ea91786ec0a304dbe574bacff4d7304d9231
                                                                                                • Instruction ID: 5b8ce99cd93288b9b3622ce56f3a952f4719c764294ef63b1931a13ebe5bf3d5
                                                                                                • Opcode Fuzzy Hash: 99f0c1ea61ba1c17496419a7e591ea91786ec0a304dbe574bacff4d7304d9231
                                                                                                • Instruction Fuzzy Hash: 4211B2B1900B909FD765DF24C48099BBBA4BF84308F44886FE0876B642D738BC04C715
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 0040B569
                                                                                                  • Part of subcall function 00405C98: __EH_prolog.LIBCMT ref: 00405C9D
                                                                                                  • Part of subcall function 00403BA5: free.MSVCRT ref: 00403BA9
                                                                                                  • Part of subcall function 004062C4: GetLastError.KERNEL32(0040CC4F,?,00000001,?,00000010,00000000,00000000), ref: 004062C4
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog$ErrorLastfree
                                                                                                • String ID:
                                                                                                • API String ID: 683690243-0
                                                                                                • Opcode ID: 7e91c0dde115849d1ad0c908fe74a0a5c3d4acead8dbe92c6034b86eb64ab493
                                                                                                • Instruction ID: fb4660edd494918f797c6894fe9440a752d3d01a1d336716f1c709085ebbaccd
                                                                                                • Opcode Fuzzy Hash: 7e91c0dde115849d1ad0c908fe74a0a5c3d4acead8dbe92c6034b86eb64ab493
                                                                                                • Instruction Fuzzy Hash: F901AD726407009EC725FF76D8929DEBBB5EF55314B00463FE883636D2CB78A609CA58
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 0041385B
                                                                                                  • Part of subcall function 004139DF: __EH_prolog.LIBCMT ref: 004139E4
                                                                                                  • Part of subcall function 00413989: __EH_prolog.LIBCMT ref: 0041398E
                                                                                                  • Part of subcall function 00403BA5: free.MSVCRT ref: 00403BA9
                                                                                                  • Part of subcall function 004138CF: __EH_prolog.LIBCMT ref: 004138D4
                                                                                                  • Part of subcall function 00413938: __EH_prolog.LIBCMT ref: 0041393D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog$free
                                                                                                • String ID:
                                                                                                • API String ID: 2654054672-0
                                                                                                • Opcode ID: aab47c9550c61e81e4e4e96012b6a7bc3c1ee662ec5293290cb8e2509aa26bae
                                                                                                • Instruction ID: e175e7f10f43f6cca05f6be96f189574f0e094f52caf40dd2350f9aae9621fc3
                                                                                                • Opcode Fuzzy Hash: aab47c9550c61e81e4e4e96012b6a7bc3c1ee662ec5293290cb8e2509aa26bae
                                                                                                • Instruction Fuzzy Hash: D0F0D170914A60DEEB19EF68D81639CBBE0AF04308F50429FE092622D2CBBC2B04874D
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 004061C6
                                                                                                  • Part of subcall function 00405C98: __EH_prolog.LIBCMT ref: 00405C9D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog
                                                                                                • String ID:
                                                                                                • API String ID: 3519838083-0
                                                                                                • Opcode ID: 4a6112fb950159eaf5e83c92a170fb4a182376475d04aa02fba525872de66c1e
                                                                                                • Instruction ID: e5ddfb142680ed3c69e4bb472637a6dcbd7afa6831621fbacd83d8a3cc0fb80d
                                                                                                • Opcode Fuzzy Hash: 4a6112fb950159eaf5e83c92a170fb4a182376475d04aa02fba525872de66c1e
                                                                                                • Instruction Fuzzy Hash: 2CF08932D415049ADB15EB94E991BEEB374DF1535DF10016FE852771C2CB396E09CA18
                                                                                                APIs
                                                                                                • SetFileTime.KERNEL32(00000018,00000000,000000FF,00000000,00000013,80000000,00000000,?,?,?,00000018,00000018,?,00406515,?,00000013), ref: 004064E9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileTime
                                                                                                • String ID:
                                                                                                • API String ID: 1425588814-0
                                                                                                • Opcode ID: 59be36acff0148b2a6399661b1d03899d1d288337076d1e5c4a00da86c42ff5d
                                                                                                • Instruction ID: 49423b807954fbf5132eddd10db361c8cf6ef33813656f7b93e5a35af05f7635
                                                                                                • Opcode Fuzzy Hash: 59be36acff0148b2a6399661b1d03899d1d288337076d1e5c4a00da86c42ff5d
                                                                                                • Instruction Fuzzy Hash: 1CF0F630100248BFEF228F14CD05BEA3FA8AB05324F14426EF9A6622E1C375DE20C758
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 0040527B
                                                                                                  • Part of subcall function 0040D5C9: _CxxThrowException.MSVCRT(?,0042C050), ref: 0040D5EF
                                                                                                  • Part of subcall function 00403B71: malloc.MSVCRT ref: 00403B84
                                                                                                  • Part of subcall function 00403B71: _CxxThrowException.MSVCRT(?,0042C1C8), ref: 00403B9E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionThrow$H_prologmalloc
                                                                                                • String ID:
                                                                                                • API String ID: 3044594480-0
                                                                                                • Opcode ID: f1bc381dacc679d8993db77570641906362337e7e61615f70a1999bd743c8d60
                                                                                                • Instruction ID: 856f92cbb3ab1a9cb96c509d1022807d22edc14e61e6e41c3b87f0c8937366d3
                                                                                                • Opcode Fuzzy Hash: f1bc381dacc679d8993db77570641906362337e7e61615f70a1999bd743c8d60
                                                                                                • Instruction Fuzzy Hash: ECF09071A006009FC714EF69D442AAEFBE5EF88318F00866FE406E7381DB78A900CE94
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 00416DCD
                                                                                                  • Part of subcall function 00416E44: __aulldiv.LIBCMT ref: 00416ECD
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog__aulldiv
                                                                                                • String ID:
                                                                                                • API String ID: 4125985754-0
                                                                                                • Opcode ID: 8bf19885dd5ea0e2f94d69bfacb549f2fcc5b7e4eebcd9df4adba7efa0999e04
                                                                                                • Instruction ID: f8137897850cfe31c0c95d7590cf4b9d67ad1fbb95bcf970c06535ca175f3cf8
                                                                                                • Opcode Fuzzy Hash: 8bf19885dd5ea0e2f94d69bfacb549f2fcc5b7e4eebcd9df4adba7efa0999e04
                                                                                                • Instruction Fuzzy Hash: FD0146B1A01BA0DFC325DF64D4A12DAFBE4FB04308F808A5FD5DA53601C7B8A504CB98
                                                                                                APIs
                                                                                                • SysAllocString.OLEAUT32(?), ref: 00412322
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocString
                                                                                                • String ID:
                                                                                                • API String ID: 2525500382-0
                                                                                                • Opcode ID: ee2f4b612f09316191009abfdc84f3a107c383a2d7f7fa7f0d7bdf75c4bc9c97
                                                                                                • Instruction ID: 84edb9678b7a745c0b725e3e0dbbada79bae0bb88cc8bfe653711e49ff3b59e2
                                                                                                • Opcode Fuzzy Hash: ee2f4b612f09316191009abfdc84f3a107c383a2d7f7fa7f0d7bdf75c4bc9c97
                                                                                                • Instruction Fuzzy Hash: 1AF027312007078AF7305B31DD01BDBB7D09F61318F14462EE8A9D3250EBBC98A4C769
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 00416FAE
                                                                                                  • Part of subcall function 00417899: __EH_prolog.LIBCMT ref: 0041789E
                                                                                                  • Part of subcall function 00403BA5: free.MSVCRT ref: 00403BA9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog$free
                                                                                                • String ID:
                                                                                                • API String ID: 2654054672-0
                                                                                                • Opcode ID: eb0fa4d0185cf915b7e1cd56f291fcce4e57fc542e8566139852d541875939b9
                                                                                                • Instruction ID: 410289a83d4ed025744fd943b1f64dcfed9d5ec8ab00e327c3d154e98af9d3b0
                                                                                                • Opcode Fuzzy Hash: eb0fa4d0185cf915b7e1cd56f291fcce4e57fc542e8566139852d541875939b9
                                                                                                • Instruction Fuzzy Hash: 82F0BE31901A20DBC322AF14D906ADEB7F4FF04324F00465FE4D263691CBB8AA408B88
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog
                                                                                                • String ID:
                                                                                                • API String ID: 3519838083-0
                                                                                                • Opcode ID: 573a2cf2bc836b99d9609f8487cba32822be38598a2facaf8ebd2ea7fbb3612e
                                                                                                • Instruction ID: 1b364a8ab76887425b7e3a6f64e7fe538d72e94d07a99577154da66e0cac4a81
                                                                                                • Opcode Fuzzy Hash: 573a2cf2bc836b99d9609f8487cba32822be38598a2facaf8ebd2ea7fbb3612e
                                                                                                • Instruction Fuzzy Hash: 7AE06D76B04204EFC700EF99D445F9EB7A8FF48314F40855EB00A97241C7389900CA68
                                                                                                APIs
                                                                                                  • Part of subcall function 0040631A: CloseHandle.KERNELBASE(00000000,000000FF,004062EC,?,?,0040612D,?,00000000,00000001,00000003,02000000,?,?,?,004060AB), ref: 00406325
                                                                                                • CreateFileW.KERNELBASE(004060AB,?,?,00000000,?,02000000,00000000,?,?,0040612D,?,00000000,00000001,00000003,02000000), ref: 00406303
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: CloseCreateFileHandle
                                                                                                • String ID:
                                                                                                • API String ID: 3498533004-0
                                                                                                • Opcode ID: 019bf48367bcf98dcb756a2f82181cd61b9fe9e8a00531e4bac9db3451219804
                                                                                                • Instruction ID: adc6e9f92411e864d9c6c7b87d178177d260d9e0db269cc12a015677b2bab9cc
                                                                                                • Opcode Fuzzy Hash: 019bf48367bcf98dcb756a2f82181cd61b9fe9e8a00531e4bac9db3451219804
                                                                                                • Instruction Fuzzy Hash: 4CE086321002197BCF215F649C01BCE3B55AF19370F100126FE15AA1E1D772C871AF98
                                                                                                APIs
                                                                                                • WriteFile.KERNELBASE(?,?,?,?,00000000), ref: 004065E9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileWrite
                                                                                                • String ID:
                                                                                                • API String ID: 3934441357-0
                                                                                                • Opcode ID: fe5bcde431ae922a75e4756504e17ece85435cb636739ef29d2279dd80125517
                                                                                                • Instruction ID: da683ac8c70a974cc3f8237807a5398f2218d9b128b4c0510ef96a262ff81173
                                                                                                • Opcode Fuzzy Hash: fe5bcde431ae922a75e4756504e17ece85435cb636739ef29d2279dd80125517
                                                                                                • Instruction Fuzzy Hash: 63E0E575600208FBCB11CFA5D801F8E7BB9AB08358F20C16AF919AA290D739DA10DF54
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 00415BEE
                                                                                                  • Part of subcall function 00415FA4: __EH_prolog.LIBCMT ref: 00415FA9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog
                                                                                                • String ID:
                                                                                                • API String ID: 3519838083-0
                                                                                                • Opcode ID: 80e3150f7c2d9fd7c4f1173715c9fe5ffee53762babf6db31bc0c1742898919b
                                                                                                • Instruction ID: ce869e3aab6ace1ce8533568d57fd8f5675fbc5f5a758563eac7a77371b3ba82
                                                                                                • Opcode Fuzzy Hash: 80e3150f7c2d9fd7c4f1173715c9fe5ffee53762babf6db31bc0c1742898919b
                                                                                                • Instruction Fuzzy Hash: 62E09AB1A10920CADB19EB64E4127EDB7A4EF44708F00065EA08393281CBB82A04C799
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 00412E9A
                                                                                                  • Part of subcall function 00412ED4: __EH_prolog.LIBCMT ref: 00412ED9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog
                                                                                                • String ID:
                                                                                                • API String ID: 3519838083-0
                                                                                                • Opcode ID: 15cde52958b12ac71acc7ce77910ede0c9b1ca9d699d2a10452ac9265fe0c123
                                                                                                • Instruction ID: 69d3665519c70779c744395f10d9950b652281d112e39adaa058e3f3ba64c18f
                                                                                                • Opcode Fuzzy Hash: 15cde52958b12ac71acc7ce77910ede0c9b1ca9d699d2a10452ac9265fe0c123
                                                                                                • Instruction Fuzzy Hash: B6D01271A14218AFD718DB45D947BEEB778EB41758F10465FF001A1240C3B95E008668
                                                                                                APIs
                                                                                                • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0040653C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileRead
                                                                                                • String ID:
                                                                                                • API String ID: 2738559852-0
                                                                                                • Opcode ID: 7b95e35fa55aa0e0c3428753206580943a288fc2de83e1cadcb6ea6cb1f466f9
                                                                                                • Instruction ID: aa511b6798c59930b0405c074b109464cadd0f08f127264607b407b712c08231
                                                                                                • Opcode Fuzzy Hash: 7b95e35fa55aa0e0c3428753206580943a288fc2de83e1cadcb6ea6cb1f466f9
                                                                                                • Instruction Fuzzy Hash: 97E0EC75600208FBCB11CF90CD01FCE7BBAAB49754F208158E90596160C375AA14EB54
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 0041A2AB
                                                                                                  • Part of subcall function 00403B71: malloc.MSVCRT ref: 00403B84
                                                                                                  • Part of subcall function 00403B71: _CxxThrowException.MSVCRT(?,0042C1C8), ref: 00403B9E
                                                                                                  • Part of subcall function 00416DC8: __EH_prolog.LIBCMT ref: 00416DCD
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog$ExceptionThrowmalloc
                                                                                                • String ID:
                                                                                                • API String ID: 3744649731-0
                                                                                                • Opcode ID: 66064fe4f8ad07cd0b864954b09a8cbe68f0ebe80e91fc1e077c362eaa252818
                                                                                                • Instruction ID: bffb35fe6662f17f768acfd319c4c1181e1a9fa832d6402326a06ee7331dc0b5
                                                                                                • Opcode Fuzzy Hash: 66064fe4f8ad07cd0b864954b09a8cbe68f0ebe80e91fc1e077c362eaa252818
                                                                                                • Instruction Fuzzy Hash: 9DD05E71B01514AFCB4CEFB8A447BADB6E0EB44348F50467FA012E2781EF7899408629
                                                                                                APIs
                                                                                                • FindClose.KERNELBASE(00000000,000000FF,00405A9E), ref: 00405A78
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: CloseFind
                                                                                                • String ID:
                                                                                                • API String ID: 1863332320-0
                                                                                                • Opcode ID: 771ecb549d2df5e9db96aaaa111c166b5f13e32054afe09ecd2ab3c97690b28b
                                                                                                • Instruction ID: fa3dde25846cff55b07d37752d80c8345f1936d69bcc94e9975f1054c5fe9f6f
                                                                                                • Opcode Fuzzy Hash: 771ecb549d2df5e9db96aaaa111c166b5f13e32054afe09ecd2ab3c97690b28b
                                                                                                • Instruction Fuzzy Hash: 81D012312045214ADA745E7C78849E333D89A12330321076AF4B4D32E0D3748C834E98
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: fputs
                                                                                                • String ID:
                                                                                                • API String ID: 1795875747-0
                                                                                                • Opcode ID: c078ba7b642f1437405dd27f64575dd6badec6b4367417118eb25951d77006ff
                                                                                                • Instruction ID: 1fba68da9fe9ae202432a53fb8ce6af3c3a1bc415edf3b5a9342c634e64c5272
                                                                                                • Opcode Fuzzy Hash: c078ba7b642f1437405dd27f64575dd6badec6b4367417118eb25951d77006ff
                                                                                                • Instruction Fuzzy Hash: 92D0C7361082519FE6155F16EC09C87FFA5FFD5321B11082FF450511609B726C26DA64
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: fputc
                                                                                                • String ID:
                                                                                                • API String ID: 1992160199-0
                                                                                                • Opcode ID: ca0c3902a19e84967535e1b89705d167b4bdcf58c56db1bb82e36f2fb91b2edc
                                                                                                • Instruction ID: bdcaa610731fbb92d061b186abac76fc107d3a3afa5d30b62c2ee034d17f0ff1
                                                                                                • Opcode Fuzzy Hash: ca0c3902a19e84967535e1b89705d167b4bdcf58c56db1bb82e36f2fb91b2edc
                                                                                                • Instruction Fuzzy Hash: 7FB092323082209BE7281A99BC0AA946794EB0D721F25006BF544C21909A911C528A99
                                                                                                APIs
                                                                                                • SetFileTime.KERNELBASE(?,?,?,?,0040AEEE,00000000,00000000,?,00000000,?,?,?,?,?,0040B26E,?), ref: 004065B7
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileTime
                                                                                                • String ID:
                                                                                                • API String ID: 1425588814-0
                                                                                                • Opcode ID: c1faabe7ee04c17a3e9dedf9d691a06c13326f8eaf91e6cc6540484f6927ee96
                                                                                                • Instruction ID: dd5313f992c8f3caee4660e88009fcd1fa651df6d34ad12b859f3340a0bd94a5
                                                                                                • Opcode Fuzzy Hash: c1faabe7ee04c17a3e9dedf9d691a06c13326f8eaf91e6cc6540484f6927ee96
                                                                                                • Instruction Fuzzy Hash: 4DC04C36158105FF8F120F70CC04D1ABBB2BB95315F10D918B155C5070C7328424EB02
                                                                                                APIs
                                                                                                • SetFileAttributesW.KERNELBASE ref: 004055CF
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: AttributesFile
                                                                                                • String ID:
                                                                                                • API String ID: 3188754299-0
                                                                                                • Opcode ID: dabda50b76c128f6b582b6eece111edba8ad408e96a23e841a2b7badc71f8a96
                                                                                                • Instruction ID: 414952e8fe1a2e075d93a374d6099bf3f4316265d06550280dff1d114576109c
                                                                                                • Opcode Fuzzy Hash: dabda50b76c128f6b582b6eece111edba8ad408e96a23e841a2b7badc71f8a96
                                                                                                • Instruction Fuzzy Hash: 53A002A0312216DBAA241B329E09A2F256DAEC1AD1B45C96C7401C5170DA2DCC515535
                                                                                                APIs
                                                                                                • SetEndOfFile.KERNELBASE(?,0040668A,00000000,?,00000000,?,?,?,?,0040AE79,?,80004004,?,00000000,?), ref: 00406647
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: File
                                                                                                • String ID:
                                                                                                • API String ID: 749574446-0
                                                                                                • Opcode ID: dbc56d001a548cd5070795bd2d90de6a3695ba147366a044821af2c85d996497
                                                                                                • Instruction ID: 86e43d1d87ccd767641ce6018b972dd42dd26830d60569e3cf728c40a3797de3
                                                                                                • Opcode Fuzzy Hash: dbc56d001a548cd5070795bd2d90de6a3695ba147366a044821af2c85d996497
                                                                                                • Instruction Fuzzy Hash: CFA002703E502FCB8F211F34DC098243AA6AB96707B6057B4B103D95F4DF224819AA15
                                                                                                APIs
                                                                                                • GetFileAttributesW.KERNELBASE(?,00405FE7,?,?,0000002A,?,?,00000000,?,00000001), ref: 00405C8A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: AttributesFile
                                                                                                • String ID:
                                                                                                • API String ID: 3188754299-0
                                                                                                • Opcode ID: 79a2f7dced282e2fb32e550a1d2b0904197e204eb4e7884ebd859e13ad972910
                                                                                                • Instruction ID: 880e6c9350023c768339967658fda1199bc4c9145147cf13f7093929cf76d2ce
                                                                                                • Opcode Fuzzy Hash: 79a2f7dced282e2fb32e550a1d2b0904197e204eb4e7884ebd859e13ad972910
                                                                                                • Instruction Fuzzy Hash: 91A001A0A26A04469A341B346C4899A29A5A996736BA00B75F132D01E4DB79C881A919
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: memmove
                                                                                                • String ID:
                                                                                                • API String ID: 2162964266-0
                                                                                                • Opcode ID: 4549de4e085ce23c5d742228b4179348cb2073e1a461e3f40e03bd9db6ea1aff
                                                                                                • Instruction ID: e6815487489208ab39f33fed76fb0e7ab78d55a9c6f4cab8f9f9bf2c978d5583
                                                                                                • Opcode Fuzzy Hash: 4549de4e085ce23c5d742228b4179348cb2073e1a461e3f40e03bd9db6ea1aff
                                                                                                • Instruction Fuzzy Hash: F2814171D002499FDF14CFA8C680AAEB7B1AB48304F24447FD581B7781DB39A980CF59
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast
                                                                                                • String ID:
                                                                                                • API String ID: 1452528299-0
                                                                                                • Opcode ID: 8c18664cc0e2afd8735706c9fad17548e6b9e64cdc38ad65294e7055b2357f7f
                                                                                                • Instruction ID: 540c822f5f08825451efabc7153c463d8467db7d585d389fc5b2ba1f3b10f2b9
                                                                                                • Opcode Fuzzy Hash: 8c18664cc0e2afd8735706c9fad17548e6b9e64cdc38ad65294e7055b2357f7f
                                                                                                • Instruction Fuzzy Hash: 53F04471A0820B9BCB14DE54DC40AB777B9FF44318B14843AAD17EB290D379FC119B9A
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: malloc
                                                                                                • String ID:
                                                                                                • API String ID: 2803490479-0
                                                                                                • Opcode ID: 4f3d972a2cc645180b03ab5989da7a7abdbb96092aef46b131a3a4169954ef89
                                                                                                • Instruction ID: 6a611e0c24855a470b21982780ef0240856e0dbfab85deb95be053ee113d5378
                                                                                                • Opcode Fuzzy Hash: 4f3d972a2cc645180b03ab5989da7a7abdbb96092aef46b131a3a4169954ef89
                                                                                                • Instruction Fuzzy Hash: A3D0A774A5251146CF8486328949B9735A83F04306F58857EEC13CE681FB6EC497C708
                                                                                                APIs
                                                                                                • CloseHandle.KERNELBASE(00000000,000000FF,004062EC,?,?,0040612D,?,00000000,00000001,00000003,02000000,?,?,?,004060AB), ref: 00406325
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: CloseHandle
                                                                                                • String ID:
                                                                                                • API String ID: 2962429428-0
                                                                                                • Opcode ID: 63bd52484c3e27620c52f78d23f88a666e8d75c923b48dba9752bb41ea792720
                                                                                                • Instruction ID: 37909153597268066c058ee49dc1832c7f7ed1a892d8ea3123e2061e027ab4fe
                                                                                                • Opcode Fuzzy Hash: 63bd52484c3e27620c52f78d23f88a666e8d75c923b48dba9752bb41ea792720
                                                                                                • Instruction Fuzzy Hash: 23D0123160417157DA741E3C7D455C233D85E1237032207AAF4B5D32E0D3748C9346D4
                                                                                                APIs
                                                                                                • VirtualAlloc.KERNELBASE(00000000), ref: 0041E051
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 4275171209-0
                                                                                                • Opcode ID: f56809b49086c6ed513efbd4586875a7e0a01cfb318715d2f5b7dbd5dc263cde
                                                                                                • Instruction ID: 37d545aa3dd278780438cb9abc06a095e6c0b675cb82c61b18e0c7a60c84fb8a
                                                                                                • Opcode Fuzzy Hash: f56809b49086c6ed513efbd4586875a7e0a01cfb318715d2f5b7dbd5dc263cde
                                                                                                • Instruction Fuzzy Hash: D2C09BE1E4E290DFDF0657109C55B603F319F97741F4A10C5E4445B0D3D5551D19C727
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: malloc
                                                                                                • String ID:
                                                                                                • API String ID: 2803490479-0
                                                                                                • Opcode ID: 896ef36176023112d6443d1c7dbb081b3f05f1399666896d001e6a3ed2194474
                                                                                                • Instruction ID: 2cf01b38eb4ee948cf265c98e74a8636803a57433c2cd1d462a5ffe318260026
                                                                                                • Opcode Fuzzy Hash: 896ef36176023112d6443d1c7dbb081b3f05f1399666896d001e6a3ed2194474
                                                                                                • Instruction Fuzzy Hash: CDA012CDE1001100994411322C41053101221E16057C8C479A80144104FF2DC804700A
                                                                                                APIs
                                                                                                • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 0041E06C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: FreeVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 1263568516-0
                                                                                                • Opcode ID: b969455fa2f22fc73ea04ac6af0352f9a8db9e597e97f0f7f8fcdc9855555cef
                                                                                                • Instruction ID: e16472afc0667f0882427de6cdc1df0a5e98d7cfee31e37e763c24b0fda5beb4
                                                                                                • Opcode Fuzzy Hash: b969455fa2f22fc73ea04ac6af0352f9a8db9e597e97f0f7f8fcdc9855555cef
                                                                                                • Instruction Fuzzy Hash: 71A00278F80714B6ED7467306D4FF6525246784F01F60C594B241681D49DE464459A2C
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: free
                                                                                                • String ID:
                                                                                                • API String ID: 1294909896-0
                                                                                                • Opcode ID: 215540552cff86145e4461e69ebfb5076cc52fc8c4b4bc72fa675cccf62c4148
                                                                                                • Instruction ID: 317c144e9e448446760cd229ef9c40f20c29eefaa629672554263170cc7ba9b1
                                                                                                • Opcode Fuzzy Hash: 215540552cff86145e4461e69ebfb5076cc52fc8c4b4bc72fa675cccf62c4148
                                                                                                • Instruction Fuzzy Hash:
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: free
                                                                                                • String ID:
                                                                                                • API String ID: 1294909896-0
                                                                                                • Opcode ID: c77b473b94ae96f42027579122339939922c3ef578ecea1100068d67e2cb92de
                                                                                                • Instruction ID: 8a4addd67d1395683a601ebee97e0ac27b042bf7b24b100f5c4dc94180559340
                                                                                                • Opcode Fuzzy Hash: c77b473b94ae96f42027579122339939922c3ef578ecea1100068d67e2cb92de
                                                                                                • Instruction Fuzzy Hash: 83A00271105101DBDB551B91ED0D55A7B61FB84652F654469F04B405708B314C31FA05
                                                                                                APIs
                                                                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00407091
                                                                                                • FileTimeToSystemTime.KERNEL32(?,?,?,?), ref: 004070A3
                                                                                                • __aullrem.LIBCMT ref: 00407205
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: Time$File$LocalSystem__aullrem
                                                                                                • String ID:
                                                                                                • API String ID: 2417234408-0
                                                                                                • Opcode ID: e2ea9a577c3c03632edbf28e011eeb485c98ebec837ccdf391d33486ad268604
                                                                                                • Instruction ID: 097ebb133b43d6c75499fc9ab10b51d9df6370fde1c7953e3ae636fd5b3e94c1
                                                                                                • Opcode Fuzzy Hash: e2ea9a577c3c03632edbf28e011eeb485c98ebec837ccdf391d33486ad268604
                                                                                                • Instruction Fuzzy Hash: 4271BC71E09345DBD711CF6984C06EEFBF69F79314F14806EE884A3282D27A5D5AC721
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 004194AE
                                                                                                  • Part of subcall function 004191A2: __EH_prolog.LIBCMT ref: 004191A7
                                                                                                • _CxxThrowException.MSVCRT(?,0042E810), ref: 00419986
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog$ExceptionThrow
                                                                                                • String ID:
                                                                                                • API String ID: 2366012087-0
                                                                                                • Opcode ID: 800fb9f3c2d82f9e2b0987539adecd0ab6a29e1bc71cd275f5283ebc7644eb9a
                                                                                                • Instruction ID: 3bae86e87b3cf8b9d8377ed57d25004214f6e4a97d94b5689226fb05ce5736f1
                                                                                                • Opcode Fuzzy Hash: 800fb9f3c2d82f9e2b0987539adecd0ab6a29e1bc71cd275f5283ebc7644eb9a
                                                                                                • Instruction Fuzzy Hash: 10325A7090424ADFCF14DF65C5A0AEEBBB1BF05308F14806EE449AB252D738AE95CF95
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: @
                                                                                                • API String ID: 0-2766056989
                                                                                                • Opcode ID: 387d9f5b0d722e16858b989fb5cf058498023d896b5906e39b88b724edac5b15
                                                                                                • Instruction ID: c4327a5b03a4357bab17156b007e5d35fc2f343ba8ec6b5de1daa222e62ab7b1
                                                                                                • Opcode Fuzzy Hash: 387d9f5b0d722e16858b989fb5cf058498023d896b5906e39b88b724edac5b15
                                                                                                • Instruction Fuzzy Hash: E8020AB16083058FC358DF4AD88045BF7E2BFC8314F58892EF59997315DB70A95ACB86
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: @
                                                                                                • API String ID: 0-2766056989
                                                                                                • Opcode ID: 20fb1e679b1ea7c9bc9397992702f5c06c27ebda3db9de964d82a84f63a00d7a
                                                                                                • Instruction ID: a5a46c98ad045cca7d8d22a35470739b0e600e8396af2da8c62bd07726d085e0
                                                                                                • Opcode Fuzzy Hash: 20fb1e679b1ea7c9bc9397992702f5c06c27ebda3db9de964d82a84f63a00d7a
                                                                                                • Instruction Fuzzy Hash: B3E11BB160C3058FC358DF4AD88045BF7E2BFC8314F58892DF59983356DB70A95ACA8A
                                                                                                APIs
                                                                                                  • Part of subcall function 0040735B: GetCurrentProcess.KERNEL32(?,?,0040737C), ref: 00407360
                                                                                                  • Part of subcall function 0040735B: GetProcessAffinityMask.KERNEL32(00000000), ref: 00407367
                                                                                                • GetSystemInfo.KERNEL32(?), ref: 00407392
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: Process$AffinityCurrentInfoMaskSystem
                                                                                                • String ID:
                                                                                                • API String ID: 3251479945-0
                                                                                                • Opcode ID: 12424a63e269e0877277bfdfa86892c8ee2fc88c8c4c8b17476209747d2dff76
                                                                                                • Instruction ID: 37ac09f4e8775b3dc7db151483154f559ecac358ef485f747e15dc97df7041dd
                                                                                                • Opcode Fuzzy Hash: 12424a63e269e0877277bfdfa86892c8ee2fc88c8c4c8b17476209747d2dff76
                                                                                                • Instruction Fuzzy Hash: F2D01270E0420997DF54E7F5D44699E77785E44348F0400799C01F21D0DB78F945D65A
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: Version
                                                                                                • String ID:
                                                                                                • API String ID: 1889659487-0
                                                                                                • Opcode ID: a8b240aa1cb2597892d2c620267438a9b7ed24a8c987694d8ca527b9fca9a5f6
                                                                                                • Instruction ID: 1a04f80bb725c75d3dd7a7d213ed030404e6ca71b9454b7eb32c971da4491ff5
                                                                                                • Opcode Fuzzy Hash: a8b240aa1cb2597892d2c620267438a9b7ed24a8c987694d8ca527b9fca9a5f6
                                                                                                • Instruction Fuzzy Hash: 55D05E71E5042443DB04B72CD94A12933E2F741300FC608EAD498C5226E92DAA16D64B
                                                                                                APIs
                                                                                                • GetSystemTimeAsFileTime.KERNEL32(?,004059CA,00000000,00000000,?,?,?,?,?,?,?,?,?,0040C681,?,00000010), ref: 00407456
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: Time$FileSystem
                                                                                                • String ID:
                                                                                                • API String ID: 2086374402-0
                                                                                                • Opcode ID: dd4d65d4735ecad5eff269bcc9c5ffcae217ccde2733e6e548aead3813e70d00
                                                                                                • Instruction ID: 03b31f416222a043bea4c947158f1946739afe019085366f262c6bff39aea67e
                                                                                                • Opcode Fuzzy Hash: dd4d65d4735ecad5eff269bcc9c5ffcae217ccde2733e6e548aead3813e70d00
                                                                                                • Instruction Fuzzy Hash:
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: PbB
                                                                                                • API String ID: 0-1558502971
                                                                                                • Opcode ID: 47ff404f096a15f6be07cdd7ff47f7c3a4c0280c46258968b647365bbcb83ffc
                                                                                                • Instruction ID: a90cc3db49980fd9bdf7688ba4c454fc12f945e6fdca8d25ef6de79eb1c97d35
                                                                                                • Opcode Fuzzy Hash: 47ff404f096a15f6be07cdd7ff47f7c3a4c0280c46258968b647365bbcb83ffc
                                                                                                • Instruction Fuzzy Hash: 4D41E432F10A3006B34CCE3AAC851662BC3DBC9382785D739D565C66D9D9BDC413D1A8
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterErrorLastLeaveObjectSingleWait
                                                                                                • String ID:
                                                                                                • API String ID: 1001467830-0
                                                                                                • Opcode ID: c2e93f49e507dd83a320957035e7cc1bd384210c5e44b5caa0bc2a24e808fe7a
                                                                                                • Instruction ID: a07709ed0249790d25947c5d4043c77be657826ad63f2b176fd792c5173063d6
                                                                                                • Opcode Fuzzy Hash: c2e93f49e507dd83a320957035e7cc1bd384210c5e44b5caa0bc2a24e808fe7a
                                                                                                • Instruction Fuzzy Hash: 8A621771A083519FCB24CF19D68052BFBE1BFC8740F948A2EE89597315D7B8E845CB46
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: dc8004adaa3259f52bc6ab735d8be8844deca4391a1dba6202427b66ce1407bc
                                                                                                • Instruction ID: 6779b2a74973eff395bcc09e7ec8ee8c4b47229ef48312d7df48326998885e9a
                                                                                                • Opcode Fuzzy Hash: dc8004adaa3259f52bc6ab735d8be8844deca4391a1dba6202427b66ce1407bc
                                                                                                • Instruction Fuzzy Hash: 60022A73B0836047D718CE19DD80229B7E3FBD0380FAA492FF89647395DAB49946C799
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: f4c3878cdf6dda1e5ca36c24f377bc52bcf6993d29949e9196dea34e7f5de905
                                                                                                • Instruction ID: 5fbcdf7e76c78e01b99a8ca8083e79c7bf9a59bce4f2b0593f3807deda067ad1
                                                                                                • Opcode Fuzzy Hash: f4c3878cdf6dda1e5ca36c24f377bc52bcf6993d29949e9196dea34e7f5de905
                                                                                                • Instruction Fuzzy Hash: 18024A32B043218BD708CE28D58027DBBE3FBE4345F550A3FE896976A4D7789845CB89
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 197aec8a6e2a317b323f6aae5095031827df40ea46c44a9cbc9116775b6008cc
                                                                                                • Instruction ID: 2dae5d15b16d92ed7caafcb73801ff926bcdae23959ce8009c2e2d6f19409047
                                                                                                • Opcode Fuzzy Hash: 197aec8a6e2a317b323f6aae5095031827df40ea46c44a9cbc9116775b6008cc
                                                                                                • Instruction Fuzzy Hash: 2A028C706047208FC328CF2EE49422AFBE1EFC5301F548A6EE5DA87791D23AE559CB55
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: ec21f2bc10a4140bfded27c6d5d1301f13af393237b8a6ab6090c49201403264
                                                                                                • Instruction ID: 9dbdf3cc36c0871e00d70d1cf73c890cd0849f4c1b349caee6c3423430388a93
                                                                                                • Opcode Fuzzy Hash: ec21f2bc10a4140bfded27c6d5d1301f13af393237b8a6ab6090c49201403264
                                                                                                • Instruction Fuzzy Hash: 95E1F6729043AA4FD31CEF58EC91635B7A1FF88380F09457DCA560B3B2D6746A01DB94
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 0be95466a501aa6df6135e314a315b2d27713a5a1a3cbbde2114f59cc96eeb67
                                                                                                • Instruction ID: 180b3774adec75c40f857ab56fa67e51ed4644e1aa4a0a04af6b9390553663a5
                                                                                                • Opcode Fuzzy Hash: 0be95466a501aa6df6135e314a315b2d27713a5a1a3cbbde2114f59cc96eeb67
                                                                                                • Instruction Fuzzy Hash: D2B192766012118FC750CF2EC8801597BA2BFC532977997AEC8A48F746D33AE857CB94
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 2e506fc7279a820970dcbf9ac392f20d839b71f7c0b8c4e9d2c3673edf14b0ee
                                                                                                • Instruction ID: 586f8480fd11126397f6699f5bfc9f0ef5ac81eadabf3b744486f71cccb0705d
                                                                                                • Opcode Fuzzy Hash: 2e506fc7279a820970dcbf9ac392f20d839b71f7c0b8c4e9d2c3673edf14b0ee
                                                                                                • Instruction Fuzzy Hash: 3231277B600A054EF620852B89883E77213FFD63A0F19C727DD16873E8CA399DC6814D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: b992da0320ec3f814fb582ec4cb6330d05488eb9d43a721a90b87cbfbd9ca5c7
                                                                                                • Instruction ID: 8a31634d1fb8d893b677315f844586136606d247691434bc821e591bcdba7911
                                                                                                • Opcode Fuzzy Hash: b992da0320ec3f814fb582ec4cb6330d05488eb9d43a721a90b87cbfbd9ca5c7
                                                                                                • Instruction Fuzzy Hash: FA5186315102399BC782EF5DF8D4AEA73E5FB4434EFD34A26DE8257141C624E826D6A0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: fc8755404496fa14fc5fc9ac73b9f104171496fa033ba51e4f77bd0a7ed76c6b
                                                                                                • Instruction ID: cec01148624ff6002e8d78b3abb26f3a7b04ecb4e699d004dc871b06b6aa27d5
                                                                                                • Opcode Fuzzy Hash: fc8755404496fa14fc5fc9ac73b9f104171496fa033ba51e4f77bd0a7ed76c6b
                                                                                                • Instruction Fuzzy Hash: 69217137AA0D1707D70C8A28EC37AB93281E744305F89567EE94BCB3D1DEAC8800C648
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 77e3b7086b35622f3edc5cc23a5ba1f7ddd0fc26d22bb20063e423d6306cc5fe
                                                                                                • Instruction ID: 3f22e8bbf1c80f18dc348f81ee196079cd90f877339ced02ae457c1f152bd803
                                                                                                • Opcode Fuzzy Hash: 77e3b7086b35622f3edc5cc23a5ba1f7ddd0fc26d22bb20063e423d6306cc5fe
                                                                                                • Instruction Fuzzy Hash: C8214BB1B043BA07E310BE7CDC8027777E6EBC1301F884276D9948F646D679889297A4
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 152ca77b835acdaa31470eaeb3eb3d3d2907b0f4df8f431f6db191a7075f4f47
                                                                                                • Instruction ID: 9e775abeed684ca77467d17cca6977048c68fff2285a19e0a564aa4dd6adc1c9
                                                                                                • Opcode Fuzzy Hash: 152ca77b835acdaa31470eaeb3eb3d3d2907b0f4df8f431f6db191a7075f4f47
                                                                                                • Instruction Fuzzy Hash: 27C002F6609606AF970CCF1FA480415FBE9FAD8321324C23FA02DC3700C77198258B64
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 004185FE
                                                                                                  • Part of subcall function 00417D89: _CxxThrowException.MSVCRT(?,0042E810), ref: 00417DAC
                                                                                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?,0000000B,00000000,?,?), ref: 004189F0
                                                                                                • _CxxThrowException.MSVCRT(?,0042E810), ref: 00418A8C
                                                                                                • _CxxThrowException.MSVCRT(?,0042E810), ref: 00418AA0
                                                                                                • _CxxThrowException.MSVCRT(?,0042E810), ref: 00418AB4
                                                                                                • _CxxThrowException.MSVCRT(?,0042E810), ref: 00418AC8
                                                                                                • _CxxThrowException.MSVCRT(?,0042E810), ref: 00418ADC
                                                                                                • _CxxThrowException.MSVCRT(?,0042E810), ref: 00418AF0
                                                                                                • _CxxThrowException.MSVCRT(?,0042E810), ref: 00418B04
                                                                                                • _CxxThrowException.MSVCRT(?,0042E810), ref: 00418B18
                                                                                                • _CxxThrowException.MSVCRT(?,0042E810), ref: 00418B2C
                                                                                                • _CxxThrowException.MSVCRT(?,0042E810), ref: 00418B40
                                                                                                • _CxxThrowException.MSVCRT(?,0042E810), ref: 00418B54
                                                                                                  • Part of subcall function 00417BB2: _CxxThrowException.MSVCRT(?,0042E7D0), ref: 00417BC5
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionThrow$H_prologmemcpy
                                                                                                • String ID: $!$@
                                                                                                • API String ID: 3273695820-2517134481
                                                                                                • Opcode ID: 86ab02d0ed812b2bc682d74ebd8090e91257ed431655c286634e8f5cefe57a90
                                                                                                • Instruction ID: a8af2338d33f97ab3af66800fc8919b7e7d9159ea038428e72aaae9fbbebb504
                                                                                                • Opcode Fuzzy Hash: 86ab02d0ed812b2bc682d74ebd8090e91257ed431655c286634e8f5cefe57a90
                                                                                                • Instruction Fuzzy Hash: 92126C74E05249EFCF04DFA5C981AEEBBB1BF09304F54845EE445AB352DB38A981CB58
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: fputs$H_prolog$fputcfree
                                                                                                • String ID: Modified: $Path: $Size:
                                                                                                • API String ID: 2632947726-3207571042
                                                                                                • Opcode ID: dad6ea9b37028dc7d9b6d66f9ca6d710003fafdbd0f38657ec1ce368b28c369f
                                                                                                • Instruction ID: b65d724bde5c915c69112c2f50a2259a5a42bfe36314ecb7860c7f1e00933a31
                                                                                                • Opcode Fuzzy Hash: dad6ea9b37028dc7d9b6d66f9ca6d710003fafdbd0f38657ec1ce368b28c369f
                                                                                                • Instruction Fuzzy Hash: 5121C431A00014ABCF11BFA6DC81AAE7F36EF44354F54402BF805662A1EB7A49A1DF95
                                                                                                APIs
                                                                                                • memcmp.MSVCRT(?,0042BB50,00000010), ref: 00408244
                                                                                                • memcmp.MSVCRT(?,004293D8,00000010), ref: 00408261
                                                                                                • memcmp.MSVCRT(?,004294C8,00000010), ref: 00408274
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcmp
                                                                                                • String ID:
                                                                                                • API String ID: 1475443563-0
                                                                                                • Opcode ID: 8910d6305239276ff3f7db42ecd347003804e214d9e1dbdd8d8a49be33777170
                                                                                                • Instruction ID: e96827f4b63efecacfe58e3eea22b3fe6ab2bc99bd733a1cd9902dd8c249a16e
                                                                                                • Opcode Fuzzy Hash: 8910d6305239276ff3f7db42ecd347003804e214d9e1dbdd8d8a49be33777170
                                                                                                • Instruction Fuzzy Hash: 1951AA72B00625ABE7105A15ED41FA733AC9E20754B40412EFD86E7381FB38FE05CA99
                                                                                                APIs
                                                                                                • GetVersion.KERNEL32 ref: 0041EBC7
                                                                                                • GetModuleHandleW.KERNEL32(kernel32.dll,SetDefaultDllDirectories), ref: 0041EBDD
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041EBE4
                                                                                                • GetSystemDirectoryW.KERNEL32(?,00000106), ref: 0041EC07
                                                                                                • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 0041EC8D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemVersion
                                                                                                • String ID: SetDefaultDllDirectories$\$\$kernel32.dll
                                                                                                • API String ID: 2515194075-2532076501
                                                                                                • Opcode ID: 82f5796dbf9e0cdcb216b5097f80af6bf4f1409dd4f72cd67fc1d0562e83a76e
                                                                                                • Instruction ID: 913686e8244bd061a2bcb12ad3078c3bbff088274ca3bb4e53c0d7fdda3888e6
                                                                                                • Opcode Fuzzy Hash: 82f5796dbf9e0cdcb216b5097f80af6bf4f1409dd4f72cd67fc1d0562e83a76e
                                                                                                • Instruction Fuzzy Hash: 2321C3346043159AE7349F59EC08F97BBE4AF40700F58942AD984D72A0F77998C5C79E
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: fputs
                                                                                                • String ID: : Cannot open the file as [$ERROR$Open $WARNING$] archive
                                                                                                • API String ID: 1795875747-657955069
                                                                                                • Opcode ID: 64877689ad02330c930da7756644846f4b0a693915e548a7d511e3b40fd6094c
                                                                                                • Instruction ID: 9c73f5e0e90770f140b12c62cfba92fc1376db5acbc4535256ac5aafa418b3ee
                                                                                                • Opcode Fuzzy Hash: 64877689ad02330c930da7756644846f4b0a693915e548a7d511e3b40fd6094c
                                                                                                • Instruction Fuzzy Hash: 8FF0E9327001257BD6102766BC40E6FBF1ADF89761F600027FD0493241EB3E1830DA69
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog
                                                                                                • String ID: Incorrect switch postfix:$Multiple instances for switch:$Too long switch:$Too short switch:$Unknown switch:
                                                                                                • API String ID: 3519838083-2104980125
                                                                                                • Opcode ID: d9e00402a8267a82a38b1fd4dfc1d301fca588ab41393d797d9d01ba006b6064
                                                                                                • Instruction ID: 801a60c05f7d27c0b30539d6495d90dca1c7defda93e75e34d4a3a70a0fcaa99
                                                                                                • Opcode Fuzzy Hash: d9e00402a8267a82a38b1fd4dfc1d301fca588ab41393d797d9d01ba006b6064
                                                                                                • Instruction Fuzzy Hash: C051B330A002569FCF24DF14CA88AAEBBB1BF11304F5444AFD845BB2D2D7BA9D41CB59
                                                                                                APIs
                                                                                                • EnterCriticalSection.KERNEL32(00430538), ref: 0041062E
                                                                                                • fputs.MSVCRT ref: 0041066D
                                                                                                • fputs.MSVCRT ref: 00410692
                                                                                                • LeaveCriticalSection.KERNEL32(00430538), ref: 0041072E
                                                                                                Strings
                                                                                                • Would you like to replace the existing file:, xrefs: 00410668
                                                                                                • with the file from archive:, xrefs: 0041068D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalSectionfputs$EnterLeave
                                                                                                • String ID: Would you like to replace the existing file:$with the file from archive:
                                                                                                • API String ID: 3346953513-686978020
                                                                                                • Opcode ID: 182b8e36cb8f0a887b3cc39515999b9dcb11ba1838c4aa99133f64ed9c068234
                                                                                                • Instruction ID: 8d30f5c3a769b9b05dc9022ead1e570209d6b32d37c02158444c586a9a64ffd4
                                                                                                • Opcode Fuzzy Hash: 182b8e36cb8f0a887b3cc39515999b9dcb11ba1838c4aa99133f64ed9c068234
                                                                                                • Instruction Fuzzy Hash: 2A317F75200204DBDB11AF25D940BDA77E1EF88314F11416BF92A97291CBB9ACE2CF5D
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 00410FA7
                                                                                                • fputs.MSVCRT ref: 00410FC0
                                                                                                  • Part of subcall function 00403E56: __EH_prolog.LIBCMT ref: 00403E5B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog$fputs
                                                                                                • String ID: Cannot open the file$The archive is open with offset$The file is open$WARNING:
                                                                                                • API String ID: 3822167597-1259944392
                                                                                                • Opcode ID: 3769bc2594a60d947f324f43e162f9542d25cae14344e564b9194a4f14147df9
                                                                                                • Instruction ID: 2fe33cfd7bd924c02116d12d6cc5e0899d97df651c7911a456f6b34765396213
                                                                                                • Opcode Fuzzy Hash: 3769bc2594a60d947f324f43e162f9542d25cae14344e564b9194a4f14147df9
                                                                                                • Instruction Fuzzy Hash: 6921C431B00511DFCB14EF65D542AAEBBB4EF48345B80442FE602E7691CB3DADC68B49
                                                                                                APIs
                                                                                                • fputs.MSVCRT ref: 0041292A
                                                                                                  • Part of subcall function 00403CDF: fflush.MSVCRT ref: 00403CE1
                                                                                                • GetStdHandle.KERNEL32(000000F6), ref: 0041293C
                                                                                                • GetConsoleMode.KERNEL32(00000000,00000000), ref: 0041295E
                                                                                                • SetConsoleMode.KERNEL32(00000000,00000000), ref: 0041296F
                                                                                                • SetConsoleMode.KERNEL32(00000000,00000000), ref: 0041298F
                                                                                                Strings
                                                                                                • Enter password (will not be echoed):, xrefs: 00412925
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: ConsoleMode$Handlefflushfputs
                                                                                                • String ID: Enter password (will not be echoed):
                                                                                                • API String ID: 108775803-3720017889
                                                                                                • Opcode ID: 25c804d01db33c1ab0bc5cb966c29544ee48e5892db4f5b428a53a560feb2906
                                                                                                • Instruction ID: 06c9a69e81cbb5c5db69f777e7cc9e6c7d4d2dc80c9e68aa15962718b8ebadc6
                                                                                                • Opcode Fuzzy Hash: 25c804d01db33c1ab0bc5cb966c29544ee48e5892db4f5b428a53a560feb2906
                                                                                                • Instruction Fuzzy Hash: 21110A76B041196BDB115BA99D056EEBFB9AF81724F14416BE810F32D0CB780D51CB9C
                                                                                                APIs
                                                                                                • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00405B4D
                                                                                                • GetProcAddress.KERNEL32(00000000,FindFirstStreamW), ref: 00405B61
                                                                                                • GetProcAddress.KERNEL32(00000000,FindNextStreamW), ref: 00405B6E
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressProc$HandleModule
                                                                                                • String ID: FindFirstStreamW$FindNextStreamW$kernel32.dll
                                                                                                • API String ID: 667068680-4044117955
                                                                                                • Opcode ID: 209bc51a69cd21a9cb9a554d552f349016e7f251f682d818fccc93cde8e55180
                                                                                                • Instruction ID: 993e4fd1b4b43a4bdfd4fb802b812d309aec3832960eb3898a326147e7614a50
                                                                                                • Opcode Fuzzy Hash: 209bc51a69cd21a9cb9a554d552f349016e7f251f682d818fccc93cde8e55180
                                                                                                • Instruction Fuzzy Hash: 74E0C231B043246BD3104BAABC89877FEECEAC4760760017BB509E3260E6F82C028F5D
                                                                                                APIs
                                                                                                • memcmp.MSVCRT(?,0042BB50,00000010), ref: 00407A34
                                                                                                • memcmp.MSVCRT(?,004291F8,00000010), ref: 00407A51
                                                                                                • memcmp.MSVCRT(?,004291D8,00000010), ref: 00407A64
                                                                                                • memcmp.MSVCRT(?,00429218,00000010), ref: 00407A77
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcmp
                                                                                                • String ID:
                                                                                                • API String ID: 1475443563-0
                                                                                                • Opcode ID: 1906f6f9a3bc8567207bf16f5b12049dd60c52ce4a1937d7281cae0f19a5e01e
                                                                                                • Instruction ID: 09fc6409721d384321c9daad9889d0c59f869200ca07e15681de2c6d8400d0c6
                                                                                                • Opcode Fuzzy Hash: 1906f6f9a3bc8567207bf16f5b12049dd60c52ce4a1937d7281cae0f19a5e01e
                                                                                                • Instruction Fuzzy Hash: 1721A372B442156BE7008A15AC82F7F33AC9A50754B54852AFD05E7381F678EE009AAB
                                                                                                APIs
                                                                                                • EnterCriticalSection.KERNEL32(00430538), ref: 00410C02
                                                                                                • fputs.MSVCRT ref: 00410CA2
                                                                                                • fputs.MSVCRT ref: 00410CBB
                                                                                                • LeaveCriticalSection.KERNEL32(00430538), ref: 00410CFD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalSectionfputs$EnterLeave
                                                                                                • String ID: :
                                                                                                • API String ID: 3346953513-3653984579
                                                                                                • Opcode ID: a61e537f1a5ebc49ed7eb163dcc44a7e566cab02f14b4025be8a2cde46201e41
                                                                                                • Instruction ID: 09d9808faf5bd919de83ef7c98426f172d115119e5f1a576890054117d399c7e
                                                                                                • Opcode Fuzzy Hash: a61e537f1a5ebc49ed7eb163dcc44a7e566cab02f14b4025be8a2cde46201e41
                                                                                                • Instruction Fuzzy Hash: EC319C31500208DFD714EF65D894EDAB7B4FF44318F50826FE81A9B252DB78A980CF58
                                                                                                APIs
                                                                                                • GetVersion.KERNEL32(00411EE8), ref: 0041EB90
                                                                                                • GetModuleHandleW.KERNEL32(kernel32.dll,SetDefaultDllDirectories), ref: 0041EBA6
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041EBAD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressHandleModuleProcVersion
                                                                                                • String ID: SetDefaultDllDirectories$kernel32.dll
                                                                                                • API String ID: 3310240892-2102062458
                                                                                                • Opcode ID: 612a3b4ddb9acc66ff93ecbb857bc4bfeff86ee96ca2284e8fffde39a6173eaf
                                                                                                • Instruction ID: 0862184ad8ba24335b569b053d5d12c6817f75253087d21a0b209ed3f2b8ea95
                                                                                                • Opcode Fuzzy Hash: 612a3b4ddb9acc66ff93ecbb857bc4bfeff86ee96ca2284e8fffde39a6173eaf
                                                                                                • Instruction Fuzzy Hash: 27C01234B4421D96DB2417A5AD0DF963666E7C4702FD80062BD03D00E4CF789982C61C
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: fputs$CriticalSection$EnterLeave
                                                                                                • String ID:
                                                                                                • API String ID: 1081906680-0
                                                                                                • Opcode ID: 5e82338f592fc34e1cc404cf4d0de40915fd742753c2a9b8b9984db827fb2d4d
                                                                                                • Instruction ID: 027993372e94a90fe108f72b057ff34fb2b178c490f9bd66c7364564f43692ce
                                                                                                • Opcode Fuzzy Hash: 5e82338f592fc34e1cc404cf4d0de40915fd742753c2a9b8b9984db827fb2d4d
                                                                                                • Instruction Fuzzy Hash: 7351D231604306DFEB24DF20C955BEA7BA1FF48314F04842FE45A6B291CBB8A9D5CB59
                                                                                                APIs
                                                                                                • WideCharToMultiByte.KERNEL32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,00000000), ref: 004040EE
                                                                                                • GetLastError.KERNEL32(?,00000000,?,?,?,00000000), ref: 004040F7
                                                                                                • _CxxThrowException.MSVCRT(?,0042C050), ref: 00404115
                                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,?,?,00000001,00000001,?,00000000,?,?), ref: 0040417C
                                                                                                • _CxxThrowException.MSVCRT(0000FDE9,0042C050), ref: 004041A4
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharExceptionMultiThrowWide$ErrorLast
                                                                                                • String ID:
                                                                                                • API String ID: 2296236218-0
                                                                                                • Opcode ID: cfd6c78358ac07a3c2f5c7783267483c925d2c8b350aec6f244fbd3ed4ca990f
                                                                                                • Instruction ID: ddf483936085a76ef41ae3a6c868e145893958370a6de898f5c65fa482b2d003
                                                                                                • Opcode Fuzzy Hash: cfd6c78358ac07a3c2f5c7783267483c925d2c8b350aec6f244fbd3ed4ca990f
                                                                                                • Instruction Fuzzy Hash: 8631E3B1604205BFDB11CFA4CC85BBEBBF8AF55344F10806AE544EB280C7789D85CBA4
                                                                                                APIs
                                                                                                • memcmp.MSVCRT(?,0042BB50,00000010), ref: 004147AB
                                                                                                • memcmp.MSVCRT(?,004293D8,00000010), ref: 004147C8
                                                                                                • memcmp.MSVCRT(?,004294A8,00000010), ref: 004147DB
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcmp
                                                                                                • String ID:
                                                                                                • API String ID: 1475443563-0
                                                                                                • Opcode ID: d1d27eebe698f95dafb466b7f552e0a33d146d414f17f5489ccea16cbcc13696
                                                                                                • Instruction ID: ab4dab2fae12ce32b20b6cfbf363ba4071ac0056bfb13e88cb7f35a40cc3fbe5
                                                                                                • Opcode Fuzzy Hash: d1d27eebe698f95dafb466b7f552e0a33d146d414f17f5489ccea16cbcc13696
                                                                                                • Instruction Fuzzy Hash: B221C576B00215ABE700AE15EC82FBB73A89BA07A4F14412AFD05DB341E678DD4146AA
                                                                                                APIs
                                                                                                  • Part of subcall function 00407455: GetSystemTimeAsFileTime.KERNEL32(?,004059CA,00000000,00000000,?,?,?,?,?,?,?,?,?,0040C681,?,00000010), ref: 00407456
                                                                                                • SetLastError.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,0040C681,?,00000010,00000000), ref: 004059E8
                                                                                                • GetStdHandle.KERNEL32(000000F6,?,?,?,?,?,?,?,?,0040C681,?,00000010,00000000,00000000), ref: 004059EC
                                                                                                • GetFileInformationByHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,0040C681,?,00000010,00000000,00000000), ref: 00405A00
                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,0040C681,?,00000010,00000000,00000000), ref: 00405A58
                                                                                                • SetLastError.KERNEL32(00000006,?,?,?,?,?,?,?,?,0040C681,?,00000010,00000000,00000000), ref: 00405A64
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$FileHandleTime$InformationSystem
                                                                                                • String ID:
                                                                                                • API String ID: 1030185623-0
                                                                                                • Opcode ID: 491123aa0d19b53963d0ba5624d9c6b6f027d198acf0d456067b5beaa04c73dd
                                                                                                • Instruction ID: 43247151832c92c783002a763622c32ca72b9f62b1d40b072dcd93f988fba4cd
                                                                                                • Opcode Fuzzy Hash: 491123aa0d19b53963d0ba5624d9c6b6f027d198acf0d456067b5beaa04c73dd
                                                                                                • Instruction Fuzzy Hash: 9421F774A00B059FCB20DF69D885A5BBBF4FF08320B10462AE569E3790E734E905CF54
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: fputs$H_prolog
                                                                                                • String ID: =
                                                                                                • API String ID: 2614055831-2525689732
                                                                                                • Opcode ID: 6c471a2ef6530a59ec5113148ca7b72510f446cde176fcdeb89754153c16460e
                                                                                                • Instruction ID: 1b0edf4538b9036d1089c6cef4bedea74b82e6cb5f1a31546f15677c97918bcb
                                                                                                • Opcode Fuzzy Hash: 6c471a2ef6530a59ec5113148ca7b72510f446cde176fcdeb89754153c16460e
                                                                                                • Instruction Fuzzy Hash: EA219F32900118AFDF05EB95D842BEDBBB5AF44319F20402FE401721A1EB792E81CB98
                                                                                                APIs
                                                                                                • memcmp.MSVCRT(?,0042BB50,00000010), ref: 0040FC76
                                                                                                • memcmp.MSVCRT(?,00429278,00000010), ref: 0040FC91
                                                                                                • memcmp.MSVCRT(?,004292A8,00000010), ref: 0040FCA5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcmp
                                                                                                • String ID:
                                                                                                • API String ID: 1475443563-0
                                                                                                • Opcode ID: a693b106da1646162e2325d0c3da7007423092edf42d73c4806106454a0f5857
                                                                                                • Instruction ID: b4b8cbf5b466e02db0d24476debb83d958eff9c092edf636f16ca7dc42c6bbb7
                                                                                                • Opcode Fuzzy Hash: a693b106da1646162e2325d0c3da7007423092edf42d73c4806106454a0f5857
                                                                                                • Instruction Fuzzy Hash: 75112932740209A7E7204A15EC43FBA33A45F54710F54453BFD46EB3C1F679E804569E
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000), ref: 0040402D
                                                                                                • GetLastError.KERNEL32(?,?,00000000,00000000), ref: 00404036
                                                                                                • _CxxThrowException.MSVCRT(?,0042C050), ref: 00404050
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000000,?,?,?,?,?,?,00000000,00000000), ref: 00404075
                                                                                                • _CxxThrowException.MSVCRT(?,0042C050), ref: 0040408B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharExceptionMultiThrowWide$ErrorLast
                                                                                                • String ID:
                                                                                                • API String ID: 2296236218-0
                                                                                                • Opcode ID: bdd5df10d88c5e80083a4577c3421ebdd7ddd51eeeca16ae066f61805f11393e
                                                                                                • Instruction ID: 4ac132360325015ebd2c62f9aad36c2b8b5ce9f4421ab3691f6160e0cd77abd7
                                                                                                • Opcode Fuzzy Hash: bdd5df10d88c5e80083a4577c3421ebdd7ddd51eeeca16ae066f61805f11393e
                                                                                                • Instruction Fuzzy Hash: 49110DB5200505BFD720DF65DC81E6BB7EDFF88384B50812AEA19E7240D775AD418BA8
                                                                                                APIs
                                                                                                  • Part of subcall function 00405A6D: FindClose.KERNELBASE(00000000,000000FF,00405A9E), ref: 00405A78
                                                                                                • SetLastError.KERNEL32(00000078), ref: 00405B9B
                                                                                                • SetLastError.KERNEL32(00000000), ref: 00405BA5
                                                                                                • FindFirstStreamW.KERNELBASE(?,00000000,?,00000000), ref: 00405BB9
                                                                                                • GetLastError.KERNEL32 ref: 00405BC6
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$Find$CloseFirstStream
                                                                                                • String ID:
                                                                                                • API String ID: 4071060300-0
                                                                                                • Opcode ID: 2749851167958df2b69f257e2b4f0fabe59ec9884642ac4421954b3e0dc01f9e
                                                                                                • Instruction ID: 8b1c33bf5c767727a663e7b38ed12da21a1870170c7a8d394256995f507f3ca5
                                                                                                • Opcode Fuzzy Hash: 2749851167958df2b69f257e2b4f0fabe59ec9884642ac4421954b3e0dc01f9e
                                                                                                • Instruction Fuzzy Hash: B8F08C30104A099BCB306F24DC09BAB3375EB10325F204276E552BA1E0EA78BD86CF69
                                                                                                APIs
                                                                                                • ResetEvent.KERNEL32(?,00409399,?,00413510,?,?), ref: 00424723
                                                                                                • GetLastError.KERNEL32(?,00413510,?,?), ref: 00424730
                                                                                                • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,00409399,?,00413510,?,?), ref: 0042474B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: Event$CreateErrorLastReset
                                                                                                • String ID:
                                                                                                • API String ID: 3053278375-0
                                                                                                • Opcode ID: ad2609b926203c852762c17253ddc8a92b970ffd877e63c396e861917d5cc8ee
                                                                                                • Instruction ID: 69587264c1ca5cd8272a9dfa6d0881f87e04865dcef00d1d77fbe5789d4fff4d
                                                                                                • Opcode Fuzzy Hash: ad2609b926203c852762c17253ddc8a92b970ffd877e63c396e861917d5cc8ee
                                                                                                • Instruction Fuzzy Hash: 0BF030743003159BE7305F34AD08B633994EBC2B42FD0047AB915DA2D0EB6DC842DA5C
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 0040E405
                                                                                                  • Part of subcall function 00406F66: VariantClear.OLEAUT32(?), ref: 00406F88
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: ClearH_prologVariant
                                                                                                • String ID: Unknown error$Unknown warning
                                                                                                • API String ID: 1166855276-4291957651
                                                                                                • Opcode ID: b83380f3ee18b6f9f934a345221d735d3a38ddd69aefc5361ffd61519bd1e1f7
                                                                                                • Instruction ID: e2c51ea3c9d5ff53c368fc9fea119ca8137ad16915fe70a45aa60a70686436fe
                                                                                                • Opcode Fuzzy Hash: b83380f3ee18b6f9f934a345221d735d3a38ddd69aefc5361ffd61519bd1e1f7
                                                                                                • Instruction Fuzzy Hash: C58147B1A00709DBCB10DFA6C5809EEB7F0FF58308F50896EE456A7290D779AE14CB58
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: wcscmp
                                                                                                • String ID: UNC
                                                                                                • API String ID: 3392835482-337201128
                                                                                                • Opcode ID: 0f50e1a4b89f9bb1c8fdf0474285ed29ed5cb079e505af0e673f1010bac49f26
                                                                                                • Instruction ID: d4f1103d63d9ba93538f6336bbde5048e2c91832e0775446ecdb83d365754428
                                                                                                • Opcode Fuzzy Hash: 0f50e1a4b89f9bb1c8fdf0474285ed29ed5cb079e505af0e673f1010bac49f26
                                                                                                • Instruction Fuzzy Hash: E9215CB53006019FD724CE48D984A2AB3E5EB85350B64847BE645AF3D1C63AEC42CF88
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: __aulldivstrlen
                                                                                                • String ID: M
                                                                                                • API String ID: 1892184250-3664761504
                                                                                                • Opcode ID: 5cb360c24d34eea26afc0b9a41df7248fd98ee7fc509eed417d6c7d163f83f1e
                                                                                                • Instruction ID: 4c523177f86cd1d8441d7e59bba430fadbe405382aa8792db896841e4d0aaa05
                                                                                                • Opcode Fuzzy Hash: 5cb360c24d34eea26afc0b9a41df7248fd98ee7fc509eed417d6c7d163f83f1e
                                                                                                • Instruction Fuzzy Hash: 41113D323006546BDF25DAA5C945FBF77E99B88314F14482FE287D71C1D9B8AC458328
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog
                                                                                                • String ID: 0$x
                                                                                                • API String ID: 3519838083-1948001322
                                                                                                • Opcode ID: 22b041c608f5a5e13fb34e29759c105454cba705c22a6f84aeb62827a4a014bc
                                                                                                • Instruction ID: e1ee27c14022c3c4861809de81e0fb68f5ccf3bdc354b16ac99790b939c913b1
                                                                                                • Opcode Fuzzy Hash: 22b041c608f5a5e13fb34e29759c105454cba705c22a6f84aeb62827a4a014bc
                                                                                                • Instruction Fuzzy Hash: 99218E32D0011A9BCF04EB99D6866EEB7B5EF48308F50006FE401772C1DBB95E45CBA9
                                                                                                APIs
                                                                                                Strings
                                                                                                • Cannot open encrypted archive. Wrong password?, xrefs: 00411E1E
                                                                                                • Cannot open the file as archive, xrefs: 00411E56
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: fputs
                                                                                                • String ID: Cannot open encrypted archive. Wrong password?$Cannot open the file as archive
                                                                                                • API String ID: 1795875747-1623556331
                                                                                                • Opcode ID: 903e6ea9d750758cf79017287e50944535a56994a1adf74cb8bda59e51e8e830
                                                                                                • Instruction ID: 0cf7914edf2aa8e7341596000c12c1df42a57dbecb04f7ec900b94d22c574bf8
                                                                                                • Opcode Fuzzy Hash: 903e6ea9d750758cf79017287e50944535a56994a1adf74cb8bda59e51e8e830
                                                                                                • Instruction Fuzzy Hash: C9012B313043004BDA14ABA6D494BBEB3ABEFC8305F54442FE90297691DB79A841CB49
                                                                                                APIs
                                                                                                • fputs.MSVCRT ref: 00401E9F
                                                                                                  • Part of subcall function 00403CEE: fputc.MSVCRT ref: 00403CF5
                                                                                                • _CxxThrowException.MSVCRT(?,0042BEC8), ref: 00401EBD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionThrowfputcfputs
                                                                                                • String ID: F{v
                                                                                                • API String ID: 216139821-2160915812
                                                                                                • Opcode ID: 371c0219cddd745f2fd22c0babe40867749c4025da24472a6f695e9493d75851
                                                                                                • Instruction ID: d2b0a6de4596742a9aade8aba5fa8a7106dfecfa37289e7a858a3f4501c6d105
                                                                                                • Opcode Fuzzy Hash: 371c0219cddd745f2fd22c0babe40867749c4025da24472a6f695e9493d75851
                                                                                                • Instruction Fuzzy Hash: D6E0E532204210BADB24ABA2EC468AF7FA8FF48364F90406FF544621A1CF3A5C00C79C
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: fputs
                                                                                                • String ID: =
                                                                                                • API String ID: 1795875747-2525689732
                                                                                                • Opcode ID: 0147c7e87789d73289e91d10756a9f56ae187d6ee00c8b5ffa58ce0ff1850403
                                                                                                • Instruction ID: fd7b5fc4074da5f726c61a76c532ff66209f63a2db578f74099ff53049078f53
                                                                                                • Opcode Fuzzy Hash: 0147c7e87789d73289e91d10756a9f56ae187d6ee00c8b5ffa58ce0ff1850403
                                                                                                • Instruction Fuzzy Hash: F9E06832B001165BDF00A7A9DC048BE3F29EB803407800833E92083240E734D821CBD9
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: fputs$fputc
                                                                                                • String ID: @F{v
                                                                                                • API String ID: 1185151155-3152675431
                                                                                                • Opcode ID: 9e1f21a1a5fb39f034f5dc85d9ede8fe86954530ca0cfcaa877b02d750cc075d
                                                                                                • Instruction ID: 5bb4c2b846e8c0631b0c11144f3aba1d019c83e257a75f4335b22dd781eada4b
                                                                                                • Opcode Fuzzy Hash: 9e1f21a1a5fb39f034f5dc85d9ede8fe86954530ca0cfcaa877b02d750cc075d
                                                                                                • Instruction Fuzzy Hash: 68D0C23270012077D6207BAA6D4089B771DDFC4715312042BE940E7211C6AA4CA14FE8
                                                                                                APIs
                                                                                                • memcmp.MSVCRT(?,0042BB50,00000010), ref: 0040959F
                                                                                                • memcmp.MSVCRT(?,00429298,00000010), ref: 004095B3
                                                                                                • memcmp.MSVCRT(?,004293A8,00000010), ref: 004095D1
                                                                                                • memcmp.MSVCRT(?,004293C8,00000010), ref: 004095EF
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcmp
                                                                                                • String ID:
                                                                                                • API String ID: 1475443563-0
                                                                                                • Opcode ID: 80e00aac9ef1727003516d7c20b7c01282fa0a3255e32e4d8766d31eaa877d50
                                                                                                • Instruction ID: c938bc79dae6d3baf006416a7562a1e2610761fca94207467e88f97749ed857f
                                                                                                • Opcode Fuzzy Hash: 80e00aac9ef1727003516d7c20b7c01282fa0a3255e32e4d8766d31eaa877d50
                                                                                                • Instruction Fuzzy Hash: 7111E132740305ABD7048A15EC42FAA33A45B94711F15493AFD45EB3C2E6B9ED10969D
                                                                                                APIs
                                                                                                • memcmp.MSVCRT(?,0042BB50,00000010), ref: 00401C55
                                                                                                • memcmp.MSVCRT(?,00429598,00000010), ref: 00401C70
                                                                                                • memcmp.MSVCRT(?,004295A8,00000010), ref: 00401C84
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcmp
                                                                                                • String ID:
                                                                                                • API String ID: 1475443563-0
                                                                                                • Opcode ID: 6d1a407f022db9f2e5c143e4d34420cd98d487bfa406f32ca3a087a793df4ed1
                                                                                                • Instruction ID: 1bb52f204ec3132851ce200ba376ef9f6e02923974aa5b90121e92a54bb61859
                                                                                                • Opcode Fuzzy Hash: 6d1a407f022db9f2e5c143e4d34420cd98d487bfa406f32ca3a087a793df4ed1
                                                                                                • Instruction Fuzzy Hash: 0C01E1327803156BE7104A15DC82FBA33A48B54761F54453EFE45FB392E2B8E840969D
                                                                                                APIs
                                                                                                • memcmp.MSVCRT(?,0042BB50,00000010), ref: 0040BDC7
                                                                                                • memcmp.MSVCRT(?,004291F8,00000010), ref: 0040BDE2
                                                                                                • memcmp.MSVCRT(?,004291D8,00000010), ref: 0040BDF6
                                                                                                • memcmp.MSVCRT(?,00429218,00000010), ref: 0040BE0A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000002.1363398767.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000004.00000002.1363381926.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363423692.0000000000429000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363443363.0000000000430000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                • Associated: 00000004.00000002.1363474002.0000000000437000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_2_400000_20decf5c428.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcmp
                                                                                                • String ID:
                                                                                                • API String ID: 1475443563-0
                                                                                                • Opcode ID: 2f98c186718bde587d544e52970a976abc0dd2256160a2195ffc1d90ca2aabb8
                                                                                                • Instruction ID: e040212cbf1a7ccb1c558fc37de72ae02c15694fc619d7ee7d70c4cf786e1ef4
                                                                                                • Opcode Fuzzy Hash: 2f98c186718bde587d544e52970a976abc0dd2256160a2195ffc1d90ca2aabb8
                                                                                                • Instruction Fuzzy Hash: 8F01D63274030666D7100A15EC43FBA73A48B54750F54443EFE84EB382E7B8D410469E

                                                                                                Execution Graph

                                                                                                Execution Coverage:1.4%
                                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                                Signature Coverage:10.5%
                                                                                                Total number of Nodes:191
                                                                                                Total number of Limit Nodes:1
                                                                                                execution_graph 3756 18002efe1 3757 18002f1dc 3756->3757 3758 18002f1fd GetLastError 3757->3758 3759 18002f207 SetLastError 3758->3759 3760 18002f20f 3758->3760 3759->3760 3761 1800620f0 3762 18006212f 3761->3762 3771 180062177 3762->3771 3772 180059040 3762->3772 3764 1800622d2 3765 1800622f7 CreateFileA 3764->3765 3764->3771 3766 180062354 GetLastError 3765->3766 3767 18006233e GetFileType 3765->3767 3766->3771 3768 18006234b CloseHandle 3767->3768 3769 18006236b 3767->3769 3768->3766 3770 18006238e CloseHandle 3769->3770 3769->3771 3770->3771 3776 18005907a 3772->3776 3773 180059131 EnterCriticalSection 3775 180059141 LeaveCriticalSection 3773->3775 3773->3776 3774 18005907e 3774->3764 3775->3776 3776->3773 3776->3774 3881 180035030 3884 180035089 3881->3884 3882 18003522c 3886 18003508e 3882->3886 3892 18003524d inet_addr 3882->3892 3883 180035329 htonl 3885 18003533d 3883->3885 3884->3886 3887 180035183 3884->3887 3888 18003514a htons 3884->3888 3898 180035165 3884->3898 3889 180056d00 HeapAlloc 3885->3889 3890 18003518c getservbyname 3887->3890 3893 1800351a1 3887->3893 3888->3898 3891 18003534a 3889->3891 3890->3893 3895 18003535f 3891->3895 3896 180056d00 HeapAlloc 3891->3896 3892->3885 3892->3886 3894 1800351b7 getservbyname 3893->3894 3893->3898 3894->3898 3895->3886 3897 1800353c0 inet_ntoa 3895->3897 3896->3895 3897->3886 3898->3882 3898->3883 3898->3886 3899 180015030 3900 180015059 3899->3900 3902 18001506a 3900->3902 3903 1800270e0 3900->3903 3904 18002711b 3903->3904 3914 18002716c 3903->3914 3905 180027139 getpeername 3904->3905 3904->3914 3906 180027186 3905->3906 3907 18002715a WSAGetLastError 3905->3907 3908 1800271a0 getsockname 3906->3908 3907->3914 3909 1800271e3 3908->3909 3910 1800271b7 WSAGetLastError 3908->3910 3915 180027040 3909->3915 3910->3914 3912 1800271fe 3913 180027040 htons 3912->3913 3912->3914 3913->3914 3914->3902 3917 180027064 3915->3917 3916 1800270b0 3916->3912 3917->3916 3918 180027080 htons 3917->3918 3918->3912 3929 180061140 3930 1800611cd GetCPInfo 3929->3930 3934 180061357 3929->3934 3931 1800611db 3930->3931 3933 1800611f1 3930->3933 3932 1800611e1 GetCPInfo 3931->3932 3931->3933 3932->3933 3935 18006124b MultiByteToWideChar 3933->3935 3936 180061272 3933->3936 3935->3934 3935->3936 3937 1800612f2 MultiByteToWideChar 3936->3937 3938 18005c520 2 API calls 3936->3938 3937->3934 3939 180061319 3937->3939 3940 1800612e2 3938->3940 3941 180061322 WideCharToMultiByte 3939->3941 3942 180061360 3939->3942 3940->3934 3940->3937 3941->3934 3943 180061396 3942->3943 3944 180061365 WideCharToMultiByte 3942->3944 3945 18005c520 2 API calls 3943->3945 3944->3934 3944->3943 3946 1800613aa 3945->3946 3946->3934 3947 1800613b2 WideCharToMultiByte 3946->3947 3947->3934 3721 1800581c0 3724 1800581df 3721->3724 3725 1800581fd 3721->3725 3722 1800581e7 3724->3722 3726 180057fb0 14 API calls 3724->3726 3725->3722 3725->3724 3727 180057fb0 3725->3727 3726->3722 3728 1800580f7 3727->3728 3729 180057fc2 GetProcessHeap HeapAlloc 3727->3729 3742 1800580a4 3728->3742 3746 18005c520 3728->3746 3730 180057fe5 GetVersionExA 3729->3730 3729->3742 3731 180057ff8 GetProcessHeap HeapFree 3730->3731 3732 180058014 GetProcessHeap HeapFree 3730->3732 3731->3724 3734 18005805a 3732->3734 3743 18005e2e0 HeapCreate 3734->3743 3737 18005815b FlsSetValue 3738 180058171 3737->3738 3737->3742 3740 180058176 GetCurrentThreadId 3738->3740 3739 180058081 3741 180058092 GetCommandLineA 3739->3741 3739->3742 3740->3724 3741->3742 3742->3724 3744 18005e304 3743->3744 3745 18005e309 HeapSetInformation 3743->3745 3744->3739 3745->3739 3747 18005c550 3746->3747 3749 180058153 3747->3749 3750 18005c563 Sleep 3747->3750 3752 180056d00 3747->3752 3749->3737 3749->3742 3750->3747 3751 18005c585 3750->3751 3751->3749 3754 180056d0e 3752->3754 3753 180056d65 3753->3747 3754->3753 3755 180056d38 HeapAlloc 3754->3755 3755->3753 3755->3754 3948 180056140 3949 18005617a 3948->3949 3951 180056181 3948->3951 3951->3949 3952 18005d090 3951->3952 3953 18005d0b5 3952->3953 3955 18005d124 3952->3955 3953->3955 3956 180062040 3953->3956 3955->3951 3957 18005c520 2 API calls 3956->3957 3958 18006205e 3957->3958 3958->3955 3959 180031040 3960 180031095 3959->3960 3961 180031079 3959->3961 3962 1800310b4 Sleep 3960->3962 3963 18003109d WSASetLastError 3960->3963 3970 1800310bc 3960->3970 3961->3960 3964 1800310c3 3961->3964 3962->3970 3963->3970 3965 180031256 3964->3965 3971 180031284 3964->3971 3967 180031275 Sleep 3965->3967 3968 18003125e WSASetLastError 3965->3968 3965->3970 3966 1800312f2 select 3969 180031333 WSAGetLastError 3966->3969 3974 1800313ae 3966->3974 3967->3970 3968->3970 3969->3971 3971->3966 3971->3970 3971->3974 3972 1800313df __WSAFDIsSet 3973 1800313f4 __WSAFDIsSet 3972->3973 3972->3974 3973->3974 3975 18003140a __WSAFDIsSet 3973->3975 3974->3970 3974->3972 3974->3973 3974->3975 3975->3974 3802 180020108 3803 180020139 3802->3803 3804 180020220 WSAStartup 3803->3804 3834 18002023e 3803->3834 3805 180020262 WSACleanup 3804->3805 3804->3834 3806 180020277 3805->3806 3805->3834 3807 1800202b8 GetLastError 3806->3807 3808 1800202d9 GetProcAddress 3806->3808 3806->3834 3807->3834 3809 180020324 GetProcAddress 3808->3809 3810 1800202f9 GetLastError 3808->3810 3812 180020350 GetProcAddress 3809->3812 3813 18002033e GetLastError 3809->3813 3811 180020309 3810->3811 3818 180020311 FreeLibrary 3811->3818 3814 180020368 GetLastError 3812->3814 3815 18002037a GetProcAddress 3812->3815 3813->3811 3814->3811 3816 180020394 GetLastError 3815->3816 3817 1800203a9 3815->3817 3816->3811 3819 1800203b8 WSAGetLastError 3817->3819 3820 1800203cd 3817->3820 3818->3834 3819->3811 3821 1800203e3 FreeLibrary 3820->3821 3822 1800203fa GetStdHandle GetFileType 3820->3822 3821->3834 3830 180020426 3822->3830 3823 180020450 WaitForMultipleObjects 3823->3830 3825 180020570 ReadFile 3825->3830 3826 1800204cf PeekNamedPipe 3826->3830 3827 1800205ea WSAGetLastError 3827->3830 3828 180020746 3831 180020768 WSAGetLastError 3828->3831 3832 180020780 FreeLibrary 3828->3832 3829 180020502 ReadFile 3829->3830 3830->3823 3830->3825 3830->3826 3830->3827 3830->3828 3830->3829 3833 18000bf00 3831->3833 3832->3834 3835 18002078f GetLastError 3832->3835 3833->3832 3835->3834 3841 180060110 3842 180060138 3841->3842 3843 180060146 GetOEMCP 3842->3843 3844 18006015a 3842->3844 3846 180060173 3843->3846 3845 18006015f GetACP 3844->3845 3844->3846 3845->3846 3847 180059010 LeaveCriticalSection 4022 180051090 RtlCaptureContext RtlLookupFunctionEntry 4023 180051111 4022->4023 4024 1800510d3 RtlVirtualUnwind 4022->4024 4025 18005112d SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 4023->4025 4024->4025 3848 180037010 3849 180037037 3848->3849 3850 180037020 FreeLibrary 3848->3850 3850->3849 3981 180036050 3983 1800360ce 3981->3983 3982 180036378 htons 3982->3983 3983->3982 3984 1800364c2 htons 3983->3984 3985 18003662e 3983->3985 3989 1800360e4 3983->3989 3984->3983 3986 180036726 htons 3985->3986 3985->3989 3990 18003674d 3985->3990 3987 180036a44 3986->3987 3988 180036bb0 htons 3987->3988 3987->3989 3988->3989 3990->3989 3991 180036a24 htons 3990->3991 3991->3987 4056 1800610e0 GetLocaleInfoA 4057 18006110f 4056->4057
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000003.1965554499.0000022F19840000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022F19840000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_3_22f19840000_soiucosxz.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocVirtual
                                                                                                • String ID: A$B$D$F$R$V$V$a$a$c$c$e$e$e$e$e$f$f$i$i$l$l$l$l$l$m$o$o$p$r$r$r$r$r$s$s$t$t$t$u$u$u
                                                                                                • API String ID: 4275171209-608630707
                                                                                                • Opcode ID: e8237e86a5c09fd62f0dd3827f542c9c996bfdfdbb6d0101729e4a5e36e03964
                                                                                                • Instruction ID: 4253c4939981f5df706487ca058429d9fa1f7b98d3fb64a05161715c64d413ca
                                                                                                • Opcode Fuzzy Hash: e8237e86a5c09fd62f0dd3827f542c9c996bfdfdbb6d0101729e4a5e36e03964
                                                                                                • Instruction Fuzzy Hash: 3382F730208648DBE7B9CE58C588BAA77E1FF65314F94417DD88EC7282DA78D816C7D2

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2871610527.0000000180001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                • Associated: 00000008.00000002.2871580196.0000000180000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871655677.0000000180065000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871683578.0000000180081000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871706526.0000000180085000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_180000000_soiucosxz.jbxd
                                                                                                Similarity
                                                                                                • API ID: Heap$Process$Free$AllocCommandLineVersion
                                                                                                • String ID:
                                                                                                • API String ID: 826746151-0
                                                                                                • Opcode ID: 4e03b135ddcad22f2d45e8378188483c4f77b1624eb5c0fda9e2a1423bfeb14a
                                                                                                • Instruction ID: d802286e8662a42d8734d0176b8b59c650c7c2305e87fbb92d2b1ebde5d2bc11
                                                                                                • Opcode Fuzzy Hash: 4e03b135ddcad22f2d45e8378188483c4f77b1624eb5c0fda9e2a1423bfeb14a
                                                                                                • Instruction Fuzzy Hash: E6518F3060160D87FBD7AB719C163D922D5AF4C7D1F04C424FE64A63D2EE2A878D9B11

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2871610527.0000000180001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                • Associated: 00000008.00000002.2871580196.0000000180000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871655677.0000000180065000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871683578.0000000180081000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871706526.0000000180085000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_180000000_soiucosxz.jbxd
                                                                                                Similarity
                                                                                                • API ID: Heap$CreateInformation
                                                                                                • String ID:
                                                                                                • API String ID: 1774340351-0
                                                                                                • Opcode ID: 96debf24c30b6f04ec0aab04364e1e7dae60e70022a02d2655cdb9e09c00a084
                                                                                                • Instruction ID: 2de8ec70877cf2086e32561d6bc0823e8b067ee0c89a19c7bca2c06bd93188cc
                                                                                                • Opcode Fuzzy Hash: 96debf24c30b6f04ec0aab04364e1e7dae60e70022a02d2655cdb9e09c00a084
                                                                                                • Instruction Fuzzy Hash: 35E048B5B1678082F7C95B11DC4A7956251F7DC781FE0D019F98D42754EE7CC24D4B00

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 65 180056d00-180056d0c 66 180056d0e-180056d1d 65->66 67 180056d1f-180056d2f 65->67 66->67 68 180056d65 66->68 69 180056d30-180056d36 67->69 72 180056d67-180056d6c 68->72 70 180056d38-180056d4e HeapAlloc 69->70 71 180056d50-180056d57 69->71 70->71 70->72 71->72 73 180056d59-180056d63 call 18005e2b0 71->73 73->68 73->69
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2871610527.0000000180001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                • Associated: 00000008.00000002.2871580196.0000000180000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871655677.0000000180065000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871683578.0000000180081000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871706526.0000000180085000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_180000000_soiucosxz.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocHeap
                                                                                                • String ID:
                                                                                                • API String ID: 4292702814-0
                                                                                                • Opcode ID: 01795867eeab3eeb9947b8598439885f631bb91788bf5aa2a3edc9d17944673d
                                                                                                • Instruction ID: b8c2db37283491bd31474cbfce8bde44389280bdc1a7e3c0611de882773a0657
                                                                                                • Opcode Fuzzy Hash: 01795867eeab3eeb9947b8598439885f631bb91788bf5aa2a3edc9d17944673d
                                                                                                • Instruction Fuzzy Hash: 57F09070B0124D41FEEA5621A9127D05294479DBF0F0CDF30B93A973F0EE69868C8304

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 76 18005c520-18005c54d 77 18005c550-18005c556 call 180056d00 76->77 79 18005c55b-18005c561 77->79 80 18005c588-18005c5a5 79->80 81 18005c563-18005c583 Sleep 79->81 81->77 82 18005c585 81->82 82->80
                                                                                                APIs
                                                                                                  • Part of subcall function 0000000180056D00: HeapAlloc.KERNEL32 ref: 0000000180056D45
                                                                                                • Sleep.KERNEL32(?,?,?,?,00000001800586C7,?,?,?,?,0000000180056EF9), ref: 000000018005C565
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2871610527.0000000180001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                • Associated: 00000008.00000002.2871580196.0000000180000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871655677.0000000180065000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871683578.0000000180081000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871706526.0000000180085000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_180000000_soiucosxz.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocHeapSleep
                                                                                                • String ID:
                                                                                                • API String ID: 2660413188-0
                                                                                                • Opcode ID: f3be130c106b9429d5cfe72c84b6622280f8b2e763eba91d7db92e7ae4daa92a
                                                                                                • Instruction ID: ccf6fc8f78cabf6904fba5d48cf50a51f4a33cc23826735ac756e7fd4fa1f2b9
                                                                                                • Opcode Fuzzy Hash: f3be130c106b9429d5cfe72c84b6622280f8b2e763eba91d7db92e7ae4daa92a
                                                                                                • Instruction Fuzzy Hash: 29F08132724A8486D6559F02A84034EA3A5F3CEBD0F584114FF9E17B98DF3DD9558B00

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 122 180020108-1800201ac 125 1800201b2-18002021a call 18001ecc0 122->125 126 180020258-18002025d 122->126 131 1800207e6 125->131 132 180020220-18002023c WSAStartup 125->132 128 1800207ee-180020822 call 180064dd0 126->128 131->128 134 180020262-180020275 WSACleanup 132->134 135 18002023e-180020253 call 18000c000 132->135 137 180020277-18002027c 134->137 138 18002027e-180020292 call 18000c000 134->138 144 1800207de 135->144 137->138 141 180020297-1800202b6 call 1800477f0 137->141 138->144 146 1800202b8-1800202d4 GetLastError call 18000c000 141->146 147 1800202d9-1800202f7 GetProcAddress 141->147 144->131 157 1800207d6 146->157 149 180020324-18002033c GetProcAddress 147->149 150 1800202f9-180020306 GetLastError 147->150 153 180020350-180020366 GetProcAddress 149->153 154 18002033e-18002034e GetLastError 149->154 152 180020309-18002031f call 18000c000 FreeLibrary 150->152 162 1800207ce 152->162 155 180020368-180020378 GetLastError 153->155 156 18002037a-180020392 GetProcAddress 153->156 154->152 155->152 159 180020394-1800203a4 GetLastError 156->159 160 1800203a9-1800203b6 156->160 157->144 159->152 164 1800203b8-1800203c8 WSAGetLastError 160->164 165 1800203cd-1800203e1 160->165 162->157 164->152 167 1800203e3-1800203f5 FreeLibrary 165->167 168 1800203fa-180020424 GetStdHandle GetFileType 165->168 167->162 169 180020426-18002042c 168->169 170 18002043e-18002044d 168->170 169->170 173 18002042e-18002043c 169->173 171 180020450-18002046e WaitForMultipleObjects 170->171 174 180020474-180020476 171->174 175 1800205c0-1800205e8 171->175 173->171 176 18002047c-180020481 174->176 177 180020570-18002058d ReadFile 174->177 187 18002061a-180020622 175->187 188 1800205ea-1800205f5 WSAGetLastError 175->188 178 1800206b4-1800206b6 176->178 179 180020487-18002048e 176->179 180 18002059c-1800205b0 call 18001f380 177->180 181 18002058f-180020597 177->181 185 1800206ce-1800206d5 178->185 183 1800204cf-1800204f5 PeekNamedPipe 179->183 184 180020490-1800204ae 179->184 203 1800205b6-1800205bb 180->203 204 1800206bc-1800206be 180->204 181->185 194 180020554-18002055c 183->194 195 1800204f7-1800204fc 183->195 210 1800204b4-1800204ba 184->210 211 180020547-18002054f 184->211 196 1800206d7-180020736 call 180001a30 call 180001a80 185->196 197 180020738-18002073b 185->197 191 180020624-180020648 call 18000bb90 187->191 192 1800206a1-1800206b2 187->192 189 1800206b8-1800206ba 188->189 190 1800205fb-180020615 call 18000bf00 188->190 189->185 190->185 216 1800206cc 191->216 217 18002064e-180020650 191->217 192->185 194->185 205 180020502-18002051f ReadFile 195->205 206 1800206c8-1800206ca 195->206 196->197 231 180020746-180020755 call 18000c000 196->231 199 18002075a-180020766 197->199 200 18002073d-180020741 197->200 226 180020768-18002077b WSAGetLastError call 18000bf00 199->226 227 180020780-18002078d FreeLibrary 199->227 200->171 203->185 204->185 212 180020561-18002056b 205->212 213 180020521 205->213 206->185 219 1800206c0-1800206c2 210->219 220 1800204c0-1800204c3 210->220 211->185 212->185 221 180020525-180020537 call 18001f380 213->221 216->185 224 180020652-180020657 217->224 225 180020659-180020661 217->225 219->185 228 1800206c4-1800206c6 220->228 229 1800204c9-1800204cd 220->229 221->179 238 18002053d-180020542 221->238 224->185 232 180020663-180020668 225->232 233 18002066a-180020679 call 18001fad0 225->233 226->227 235 1800207a7-1800207cc call 1800235d0 227->235 236 18002078f-1800207a2 GetLastError call 18000bf00 227->236 228->185 229->221 231->199 232->185 245 180020682-18002068a 233->245 246 18002067b-180020680 233->246 235->162 236->235 238->185 245->192 247 18002068c-180020690 245->247 246->185 247->192 248 180020692-18002069a call 18001f560 247->248 248->192
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2871610527.0000000180001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                • Associated: 00000008.00000002.2871580196.0000000180000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871655677.0000000180065000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871683578.0000000180081000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871706526.0000000180085000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_180000000_soiucosxz.jbxd
                                                                                                Similarity
                                                                                                • API ID: Startup
                                                                                                • String ID: $FreeLibrary(wsock2) failed (%u)$Time-out$WS2_32.DLL$WSACloseEvent$WSACloseEvent failed (%d)$WSACreateEvent$WSACreateEvent failed (%d)$WSAEnumNetworkEvents$WSAEnumNetworkEvents failed (%d)$WSAEventSelect$WSAStartup failed (%d)$failed to find WSACloseEvent function (%u)$failed to find WSACreateEvent function (%u)$failed to find WSAEnumNetworkEvents function (%u)$failed to find WSAEventSelect function (%u)$failed to load WS2_32.DLL (%u)$insufficient winsock version to support telnet
                                                                                                • API String ID: 724789610-777782649
                                                                                                • Opcode ID: 1832e236be077ceacf04411d3b7ffe83dd9163dc7a85c33f170655243162dd67
                                                                                                • Instruction ID: 05a520437d861714cd113e62e5c54cae7901c1481447a3f9ac10ec115e2df07a
                                                                                                • Opcode Fuzzy Hash: 1832e236be077ceacf04411d3b7ffe83dd9163dc7a85c33f170655243162dd67
                                                                                                • Instruction Fuzzy Hash: 0B128F3120578986EBA38B61E8483EA73A5F78DBC4F60C125EE9947795DF78C64CCB40

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2871610527.0000000180001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                • Associated: 00000008.00000002.2871580196.0000000180000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871655677.0000000180065000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871683578.0000000180081000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871706526.0000000180085000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_180000000_soiucosxz.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentEntryFunctionLookupTerminateUnwindVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 3266983031-0
                                                                                                • Opcode ID: 81aed5b2da386a6dc7a327670bb08556ac500237055a9ad39526474167d21d06
                                                                                                • Instruction ID: 08f2fca5be47106ad7e28b1154ec3b6156f23a3b7692be6a231e832f7a5f47a5
                                                                                                • Opcode Fuzzy Hash: 81aed5b2da386a6dc7a327670bb08556ac500237055a9ad39526474167d21d06
                                                                                                • Instruction Fuzzy Hash: E3312335205B4986EA828B15FC50389B3A4F78DBC6F54811AEADD43B24DF38C24ACB00
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2871610527.0000000180001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                • Associated: 00000008.00000002.2871580196.0000000180000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871655677.0000000180065000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871683578.0000000180081000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871706526.0000000180085000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_180000000_soiucosxz.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: invalid distance code$invalid distance too far back$invalid literal/length code
                                                                                                • API String ID: 0-3255898291
                                                                                                • Opcode ID: a45a2981fea6b77b4696a2932d8c20778568e79bafdc27a9d964857bd4652c7b
                                                                                                • Instruction ID: 27baad9ae40256ab115240ccaf3fb4237789e6485d2d0bb6e802b0d0fbeadb2c
                                                                                                • Opcode Fuzzy Hash: a45a2981fea6b77b4696a2932d8c20778568e79bafdc27a9d964857bd4652c7b
                                                                                                • Instruction Fuzzy Hash: FFE13532618AD887D35A8B2994453AD7BA1F3997C0F14811AFBDA537C5DA3ECB09C700
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2871610527.0000000180001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                • Associated: 00000008.00000002.2871580196.0000000180000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871655677.0000000180065000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871683578.0000000180081000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871706526.0000000180085000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_180000000_soiucosxz.jbxd
                                                                                                Similarity
                                                                                                • API ID: InfoLocale
                                                                                                • String ID:
                                                                                                • API String ID: 2299586839-0
                                                                                                • Opcode ID: 867e6be5c6a8042c45c51e9f9bfab6e38e38e9a3bd846e491e1d9b5997173a16
                                                                                                • Instruction ID: 7932e8d73d04c99ca53ad85b822b81eb765a91fb1f57253f5b906bfd6bc02398
                                                                                                • Opcode Fuzzy Hash: 867e6be5c6a8042c45c51e9f9bfab6e38e38e9a3bd846e491e1d9b5997173a16
                                                                                                • Instruction Fuzzy Hash: 24F0A032A08A8481FA72A710FC003CA2721BBDC7E9F944201FA9C477B5DE2CC3598B00

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 822 180035030-180035087 823 180035098-18003509b 822->823 824 180035089-18003508c 822->824 826 180035121-180035124 823->826 827 1800350a1-1800350a5 823->827 824->823 825 18003508e-180035093 824->825 828 1800352f0-180035328 825->828 829 180035223-180035226 826->829 830 18003512a-180035148 call 1800565e0 826->830 831 1800350ab-1800350af 827->831 832 180035179-18003517e 827->832 835 18003522c-180035236 829->835 836 180035329-18003533b htonl 829->836 846 180035183-180035185 830->846 847 18003514a-18003515f htons 830->847 831->832 834 1800350b5-1800350b9 831->834 832->828 834->832 838 1800350bf-1800350c3 834->838 840 180035261-180035265 835->840 841 180035238-18003523a 835->841 839 18003533d-180035350 call 180056d00 836->839 838->832 848 1800350c9-1800350d0 838->848 868 180035352-180035362 call 180056d00 839->868 869 18003539a-1800353a0 839->869 844 180035267-18003526c 840->844 845 18003526e-180035293 call 180034cc0 840->845 842 18003523c 841->842 843 18003523e-180035246 841->843 842->843 843->841 850 180035248-18003524b 843->850 851 1800352af-1800352b5 844->851 845->851 878 180035295-18003529a 845->878 857 180035187-18003518a 846->857 858 18003518c-18003519f getservbyname 846->858 853 180035165-180035174 847->853 854 18003521d-18003521f 847->854 855 1800350d2-1800350d5 848->855 856 1800350e1-1800350e7 848->856 850->840 860 18003524d-18003525b inet_addr 850->860 865 1800352e7 851->865 866 1800352b7-1800352be 851->866 853->829 854->829 855->856 862 1800350d7-1800350dc 855->862 863 1800350f8-1800350fe 856->863 864 1800350e9-1800350ec 856->864 857->858 867 1800351ae-1800351b0 857->867 858->867 870 1800351a1-1800351aa 858->870 860->839 860->840 862->828 871 180035119-18003511d 863->871 872 180035100-180035103 863->872 864->863 879 1800350ee-1800350f3 864->879 877 1800352ee 865->877 880 1800352c5-1800352cc 866->880 881 1800352c0 call 180056e20 866->881 873 1800351b2-1800351b5 867->873 874 1800351b7-1800351ca getservbyname 867->874 892 180035364-18003536e call 180056e20 868->892 893 180035370-180035396 868->893 875 1800353a2-1800353a5 869->875 876 1800353aa-1800353ad 869->876 870->867 871->826 872->871 885 180035105-180035108 872->885 873->874 886 1800351d4-1800351d8 873->886 874->886 889 1800351cc-1800351d0 874->889 875->851 876->878 890 1800353b3-1800353ba 876->890 877->828 878->877 891 18003529c-1800352ad call 180034f00 878->891 879->828 887 1800352d3-1800352e5 call 180056e20 880->887 888 1800352ce call 180056e20 880->888 881->880 885->871 894 18003510a-18003510d 885->894 896 1800351da-1800351e9 886->896 897 1800351ee-1800351f0 886->897 887->865 887->866 888->887 889->886 890->878 899 1800353c0-1800353de inet_ntoa call 180034ac0 890->899 891->851 891->877 892->869 893->869 894->871 902 18003510f-180035114 894->902 896->877 904 1800351f2-180035200 897->904 905 180035221 897->905 899->878 913 1800353e4-1800353e9 899->913 902->828 909 180035202-180035207 904->909 910 180035215-18003521b 904->910 905->829 909->910 912 180035209-180035213 909->912 910->829 912->829 913->851
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2871610527.0000000180001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                • Associated: 00000008.00000002.2871580196.0000000180000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871655677.0000000180065000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871683578.0000000180081000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871706526.0000000180085000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_180000000_soiucosxz.jbxd
                                                                                                Similarity
                                                                                                • API ID: htonlinet_ntoa
                                                                                                • String ID: tcp$udp
                                                                                                • API String ID: 298042256-3725065008
                                                                                                • Opcode ID: 8d2ac02b90edb6ae53f54b58ffcc698617e4a631833b0752589712ec26281b2c
                                                                                                • Instruction ID: 484b7560466ad5f9580f1d3508e78324675307007b70ccd28127cbc2517330d7
                                                                                                • Opcode Fuzzy Hash: 8d2ac02b90edb6ae53f54b58ffcc698617e4a631833b0752589712ec26281b2c
                                                                                                • Instruction Fuzzy Hash: F9B1933660574886EBE78B15D4403AB63E1FB9DBC5F16C525FE8A473A4EF38CA488700

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2871610527.0000000180001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                • Associated: 00000008.00000002.2871580196.0000000180000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871655677.0000000180065000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871683578.0000000180081000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871706526.0000000180085000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_180000000_soiucosxz.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$getpeernamegetsockname
                                                                                                • String ID: getpeername() failed with errno %d: %s$getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                                                                                                • API String ID: 1444953621-670633250
                                                                                                • Opcode ID: 0a90abb348d2a0b175106d9a59b8eb5dac0b431534eb7b54656c0c25b217c887
                                                                                                • Instruction ID: e59ed33437069a26528cffbb91b331c9884d4809dc5da79269675fb9123fdee1
                                                                                                • Opcode Fuzzy Hash: 0a90abb348d2a0b175106d9a59b8eb5dac0b431534eb7b54656c0c25b217c887
                                                                                                • Instruction Fuzzy Hash: 7F514931705B89C6EAA2DB62E4447DA73A2F78CBC4F548021FA9E47796DF38D249C701

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 961 180031040-180031077 962 180031095-180031097 961->962 963 180031079-18003107e 961->963 965 1800310bc-1800310be 962->965 966 180031099-18003109b 962->966 963->962 964 180031080 963->964 967 180031083-180031087 964->967 970 180031457-180031486 965->970 968 1800310b4-1800310b6 Sleep 966->968 969 18003109d-1800310af WSASetLastError 966->969 971 1800310c3-1800310c5 967->971 972 180031089-180031093 967->972 968->965 969->970 973 1800310c7-1800310e6 call 180001a30 971->973 974 1800310ea-18003112d 971->974 972->962 972->967 973->974 976 180031130-18003113c 974->976 978 180031142-18003114b 976->978 979 18003123a-180031241 976->979 978->979 980 180031151-18003115c 978->980 979->976 981 180031247-18003124a 979->981 984 1800311aa-1800311ae 980->984 985 18003115e-180031166 980->985 982 180031284-18003129d 981->982 983 18003124c-18003124f 981->983 987 1800312b5-1800312b7 982->987 983->982 986 180031251-180031254 983->986 990 1800311b0-1800311b8 984->990 991 1800311ee-1800311f2 984->991 988 180031184-180031187 985->988 989 180031168-18003116c 985->989 986->982 994 180031256-180031258 986->994 997 1800312e6-1800312e8 987->997 998 1800312b9-1800312e4 987->998 988->984 999 180031189-18003118d 988->999 996 180031170-180031178 989->996 992 1800311d1-1800311d4 990->992 993 1800311ba-1800311bd 990->993 991->979 995 1800311f4-1800311fc 991->995 992->991 1003 1800311d6-1800311da 992->1003 1000 1800311c0-1800311c5 993->1000 1001 18003125a-18003125c 994->1001 1002 18003127d-18003127f 994->1002 1004 180031214-180031217 995->1004 1005 1800311fe 995->1005 996->988 1006 18003117a-180031182 996->1006 1007 1800312f2-180031331 select 997->1007 1008 1800312ea-1800312ee 997->1008 998->1007 999->984 1009 18003118f-1800311a2 999->1009 1000->992 1010 1800311c7-1800311cf 1000->1010 1011 180031275-180031277 Sleep 1001->1011 1012 18003125e-180031270 WSASetLastError 1001->1012 1014 18003143f-18003144f 1002->1014 1003->991 1013 1800311dc-1800311e9 1003->1013 1004->979 1016 180031219-18003121d 1004->1016 1015 180031200-180031208 1005->1015 1006->988 1006->996 1017 180031333-18003133b WSAGetLastError 1007->1017 1018 1800313ae-1800313b0 1007->1018 1008->1007 1009->984 1010->992 1010->1000 1011->1002 1012->1014 1013->991 1014->970 1015->1004 1021 18003120a-180031212 1015->1021 1016->979 1022 18003121f-180031232 1016->1022 1023 18003134c-18003134e 1017->1023 1024 18003133d-180031343 1017->1024 1019 1800313b2-1800313b7 1018->1019 1020 1800313b9-1800313bb 1018->1020 1028 180031436 1019->1028 1029 1800313c1-1800313cc 1020->1029 1030 1800313bd-1800313bf 1020->1030 1021->1004 1021->1015 1022->979 1026 180031354-180031392 call 180001a30 call 180001a80 1023->1026 1027 1800312a0-1800312ad 1023->1027 1024->1018 1025 180031345-18003134a 1024->1025 1025->1018 1025->1023 1026->1030 1045 180031394-1800313a9 1026->1045 1027->987 1028->1014 1032 1800313d0-1800313dd 1029->1032 1030->1028 1034 18003142b-180031432 1032->1034 1035 1800313df-1800313ee __WSAFDIsSet 1032->1035 1034->1032 1037 180031434 1034->1037 1038 1800313f4-180031404 __WSAFDIsSet 1035->1038 1039 1800313f0 1035->1039 1037->1028 1040 180031406 1038->1040 1041 18003140a-18003141d __WSAFDIsSet 1038->1041 1039->1038 1040->1041 1043 180031423-180031427 1041->1043 1044 18003141f 1041->1044 1043->1034 1046 180031429 1043->1046 1044->1043 1045->987 1046->1034
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2871610527.0000000180001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                • Associated: 00000008.00000002.2871580196.0000000180000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871655677.0000000180065000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871683578.0000000180081000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871706526.0000000180085000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_180000000_soiucosxz.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLastSleep
                                                                                                • String ID:
                                                                                                • API String ID: 1458359878-0
                                                                                                • Opcode ID: 9b48d7b2766f17df1711f821851146cb759b7e1acc745c42c072a0270a065e71
                                                                                                • Instruction ID: e4ddd5fdb3ba8b962d13f28a7f4a8bc4a6c33de8df1811023a19f36311382cdd
                                                                                                • Opcode Fuzzy Hash: 9b48d7b2766f17df1711f821851146cb759b7e1acc745c42c072a0270a065e71
                                                                                                • Instruction Fuzzy Hash: 4EC115312157888AE7E78F19D4403EBA3A1FB9C7D5F519225FA9983BD4CF38CA598700

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1090 180061140-1800611c7 1091 1800613f5 1090->1091 1092 1800611cd-1800611d9 GetCPInfo 1090->1092 1095 1800613f9-1800613fd 1091->1095 1093 180061205 1092->1093 1094 1800611db-1800611df 1092->1094 1097 18006120b-18006120e 1093->1097 1094->1093 1096 1800611e1-1800611ef GetCPInfo 1094->1096 1098 180061407 1095->1098 1099 1800613ff-180061402 call 180056e20 1095->1099 1096->1093 1100 1800611f1-180061203 1096->1100 1101 18006123f-180061242 1097->1101 1102 180061210-180061214 1097->1102 1104 18006140a-180061449 call 180064dd0 1098->1104 1099->1098 1100->1097 1107 180061246-180061249 1101->1107 1105 180061216-180061221 1102->1105 1106 180061223-18006123d 1102->1106 1105->1107 1106->1107 1109 180061272-1800612d5 call 180064e00 call 180056780 1107->1109 1110 18006124b-18006126c MultiByteToWideChar 1107->1110 1117 1800612d7-1800612e8 call 18005c520 1109->1117 1118 1800612f2-180061313 MultiByteToWideChar 1109->1118 1110->1104 1110->1109 1117->1104 1124 1800612ee 1117->1124 1118->1095 1120 180061319-180061320 1118->1120 1122 180061322-180061351 WideCharToMultiByte 1120->1122 1123 180061360-180061363 1120->1123 1122->1095 1125 180061357-18006135b 1122->1125 1126 180061398 1123->1126 1127 180061365-180061394 WideCharToMultiByte 1123->1127 1124->1118 1125->1095 1129 18006139f-1800613b0 call 18005c520 1126->1129 1127->1095 1128 180061396 1127->1128 1128->1129 1129->1095 1132 1800613b2-1800613d8 WideCharToMultiByte 1129->1132 1133 1800613e7-1800613eb 1132->1133 1134 1800613da-1800613e5 call 180056e20 1132->1134 1133->1095 1136 1800613ed-1800613f3 1133->1136 1134->1095 1136->1095
                                                                                                APIs
                                                                                                • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000001C,000000018005F69D), ref: 00000001800611D1
                                                                                                • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000001C,000000018005F69D), ref: 00000001800611E7
                                                                                                • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000001C,000000018005F69D), ref: 000000018006125F
                                                                                                • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000001C,000000018005F69D), ref: 000000018006130B
                                                                                                • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000001C,000000018005F69D), ref: 0000000180061349
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2871610527.0000000180001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                • Associated: 00000008.00000002.2871580196.0000000180000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871655677.0000000180065000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871683578.0000000180081000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871706526.0000000180085000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_180000000_soiucosxz.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide$Info
                                                                                                • String ID:
                                                                                                • API String ID: 1775632426-0
                                                                                                • Opcode ID: bb995149a76c1fa20285a2ef19394d513b3263ca551483d224fe19ea30f94fde
                                                                                                • Instruction ID: 360856c1555d4b0f807924cc8dfb22b96868353677ffcde1210555d0e1666be0
                                                                                                • Opcode Fuzzy Hash: bb995149a76c1fa20285a2ef19394d513b3263ca551483d224fe19ea30f94fde
                                                                                                • Instruction Fuzzy Hash: 41814272200B848EE7A18F65EC403D977A6F748BD9F288115FA6A87B98DF34C655C740
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000008.00000002.2871610527.0000000180001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                • Associated: 00000008.00000002.2871580196.0000000180000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871655677.0000000180065000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871683578.0000000180081000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                • Associated: 00000008.00000002.2871706526.0000000180085000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_8_2_180000000_soiucosxz.jbxd
                                                                                                Similarity
                                                                                                • API ID: CloseHandle$ErrorFileLast$CreateType
                                                                                                • String ID:
                                                                                                • API String ID: 3635033729-0
                                                                                                • Opcode ID: 897d9297995a4e50a4cece719d2f4fef7ea19b8ee9116e3872b3d261e85a767b
                                                                                                • Instruction ID: 760fff09c57d5129644c7317d0ebca99859d1fea18722904d2fc0697a6919545
                                                                                                • Opcode Fuzzy Hash: 897d9297995a4e50a4cece719d2f4fef7ea19b8ee9116e3872b3d261e85a767b
                                                                                                • Instruction Fuzzy Hash: 41A1D032604B4942FBF64B29AC503ED2692B35A7E4F70C215FAB54B7E1CF388B498701

                                                                                                Execution Graph

                                                                                                Execution Coverage:1.9%
                                                                                                Dynamic/Decrypted Code Coverage:100%
                                                                                                Signature Coverage:16.4%
                                                                                                Total number of Nodes:61
                                                                                                Total number of Limit Nodes:7
                                                                                                execution_graph 5954 26878e91f30 5957 26878e91f50 5954->5957 5958 26878e91f6a 5957->5958 5959 26878e91f4b 5958->5959 5961 26878e91d78 5958->5961 5962 26878e91db8 _log10_special 5961->5962 5963 26878e91dfb _raise_exc 5962->5963 5964 26878e91e24 _log10_special swprintf 5962->5964 5963->5964 5964->5959 5918 26878e98e14 5919 26878e98e26 5918->5919 5921 26878e98e2a 5919->5921 5922 26878e98904 5919->5922 5927 26878e9e51c 5922->5927 5925 26878e98936 5925->5921 5926 26878e98926 SetFileAttributesW 5926->5925 5928 26878e9e543 5927->5928 5929 26878e98922 5927->5929 5928->5929 5930 26878e9e548 CreateFileW 5928->5930 5929->5925 5929->5926 5930->5929 5941 26878e98948 5942 26878e98990 5941->5942 5943 26878e989cf SetFileAttributesW 5942->5943 5944 26878e989e1 5942->5944 5943->5942 5943->5944 5952 26878e96dac __vcrt_uninitialize_ptd 5906 26878e9ae20 5907 26878e9ae55 5906->5907 5908 26878e9ae98 5907->5908 5909 26878e9ae71 NtDelayExecution 5907->5909 5909->5907 5910 26878e98700 5911 26878e9873f 5910->5911 5916 26878e9e5bc NtCreateFile 5911->5916 5914 26878e987a9 5915 26878e9879c CloseHandle 5915->5914 5917 26878e98796 5916->5917 5917->5914 5917->5915 5949 26878e94820 __std_exception_destroy 5950 26878e94847 5949->5950 5973 26878e99083 5974 26878e99088 5973->5974 5975 26878e9ae20 NtDelayExecution 5974->5975 5976 26878e990fe 5974->5976 5975->5976 5931 26878e987c4 5932 26878e95810 5931->5932 5933 26878e987db CreateFileW 5932->5933 5934 26878e9881f CreateFileW 5933->5934 5936 26878e98814 5933->5936 5935 26878e98897 ReadFile 5934->5935 5937 26878e98850 5934->5937 5935->5937 5938 26878e988b9 5935->5938 5936->5934 5937->5935 5937->5938 5939 26878e988d7 5938->5939 5940 26878e988db SetFileAttributesW 5938->5940 5940->5939 5945 26878e94864 5946 26878e94899 __except_validate_context_record _CallSETranslator 5945->5946 5947 26878e948fd _CreateFrameInfo 5946->5947 5948 26878e9491d __CxxCallCatchBlock _CallSETranslator 5947->5948 5965 26878e990e7 5966 26878e990ed 5965->5966 5969 26878e9ae20 5966->5969 5968 26878e990fe 5970 26878e9ae55 5969->5970 5971 26878e9ae98 5970->5971 5972 26878e9ae71 NtDelayExecution 5970->5972 5971->5968 5972->5970 5953 26878e9477c __std_exception_copy

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.2721640024.0000026878E81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026878E81000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_26878e81000_soiucosxz.jbxd
                                                                                                Similarity
                                                                                                • API ID: DelayExecution
                                                                                                • String ID:
                                                                                                • API String ID: 1249177460-0
                                                                                                • Opcode ID: f00705b9ae837ec2345864758a29e39967a219465f4efa5b6de3cb3e60cb6094
                                                                                                • Instruction ID: ada88d511deb9f30efb3d059b2416be7608b5e68850746b3572133f811958f86
                                                                                                • Opcode Fuzzy Hash: f00705b9ae837ec2345864758a29e39967a219465f4efa5b6de3cb3e60cb6094
                                                                                                • Instruction Fuzzy Hash: A6110135124A8D0EEB49BB78849D6BAB6C4FF5C318F64077EF08BCB0E2DE1984804302

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 62 26878e9e5bc-26878e9e613 NtCreateFile 63 26878e9e622-26878e9e62a 62->63 64 26878e9e615-26878e9e618 62->64 64->63 65 26878e9e61a-26878e9e620 64->65 65->63
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.2721640024.0000026878E81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026878E81000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_26878e81000_soiucosxz.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateFile
                                                                                                • String ID:
                                                                                                • API String ID: 823142352-0
                                                                                                • Opcode ID: 58e43e44b54812268928e5122ffec1c26c35a1137341fc786275a977db449c32
                                                                                                • Instruction ID: 3b5adbf2a07a3324c620b633303ea65afbd1f5790e754b06cf5f90eace068694
                                                                                                • Opcode Fuzzy Hash: 58e43e44b54812268928e5122ffec1c26c35a1137341fc786275a977db449c32
                                                                                                • Instruction Fuzzy Hash: 1801AF71524B088BEB54CB58C4DE7A6B6E0FB5C326F60066CE405C62C2EBB99848CB02

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.2721640024.0000026878E81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026878E81000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_26878e81000_soiucosxz.jbxd
                                                                                                Similarity
                                                                                                • API ID: File$Create$AttributesRead
                                                                                                • String ID:
                                                                                                • API String ID: 122080180-0
                                                                                                • Opcode ID: 1a3538701edab37c293b752dd8d047efedda403f2c91c2e287a1414391de9447
                                                                                                • Instruction ID: 289c0d54ce0d2fa490a66bc63ed9ed614556097b3a14c52f750d031beb0121c0
                                                                                                • Opcode Fuzzy Hash: 1a3538701edab37c293b752dd8d047efedda403f2c91c2e287a1414391de9447
                                                                                                • Instruction Fuzzy Hash: 634116B55187484FEB61AB74948DBBAF6D5EB98314F20473EE44AC21D2DF35C4058352

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.2721640024.0000026878E81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026878E81000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_26878e81000_soiucosxz.jbxd
                                                                                                Similarity
                                                                                                • API ID: CloseCreateFileHandle
                                                                                                • String ID: 0
                                                                                                • API String ID: 3498533004-4108050209
                                                                                                • Opcode ID: f1a001039e29aba7cab1b6b51817c4333627fd70a1d51c0598e22ca8be95841b
                                                                                                • Instruction ID: 0d35a70deb99ede35b4052fd71af4974c2fe5c4978364b60da206e8711d413b9
                                                                                                • Opcode Fuzzy Hash: f1a001039e29aba7cab1b6b51817c4333627fd70a1d51c0598e22ca8be95841b
                                                                                                • Instruction Fuzzy Hash: E6119076418B8C4BE712EB14C4547EBB7E1FBD8304F504B2EA489C6281DF75E6448BC2

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.2721640024.0000026878E81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026878E81000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_26878e81000_soiucosxz.jbxd
                                                                                                Similarity
                                                                                                • API ID: AttributesFile
                                                                                                • String ID:
                                                                                                • API String ID: 3188754299-0
                                                                                                • Opcode ID: 04ab83f7e0e80a6461120924300d0aa122f92ba49c64c0b2d7f71018cc2f6762
                                                                                                • Instruction ID: f1b8cda4e9fc7b4fd811355e731ea80041401475bd7002ea0f96d0318ad4899f
                                                                                                • Opcode Fuzzy Hash: 04ab83f7e0e80a6461120924300d0aa122f92ba49c64c0b2d7f71018cc2f6762
                                                                                                • Instruction Fuzzy Hash: 4E21F6B5214A184FEB55DBA8944A7BAF6D0EB9C314F20476DE00DC72A2DF75CC418342

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 55 26878e9e51c-26878e9e541 56 26878e9e543-26878e9e546 55->56 57 26878e9e59d-26878e9e5b3 55->57 56->57 58 26878e9e548-26878e9e56e CreateFileW 56->58 58->57 59 26878e9e570-26878e9e591 58->59 59->57
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.2721640024.0000026878E81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026878E81000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_26878e81000_soiucosxz.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateFile
                                                                                                • String ID:
                                                                                                • API String ID: 823142352-0
                                                                                                • Opcode ID: c4c36f6c1de176a9173a566a82801515613e72a7e9da56a31f1e52ced4f5237b
                                                                                                • Instruction ID: 0fa3958a5a084920d93f2d038b319d20f005f47a18a0ac07789af63f01f5cc24
                                                                                                • Opcode Fuzzy Hash: c4c36f6c1de176a9173a566a82801515613e72a7e9da56a31f1e52ced4f5237b
                                                                                                • Instruction Fuzzy Hash: 5E11A3B0608B0C4FDB84EF6CA448725BAD4FB5C300F51476EA41DC73A1DB70C8418782

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                  • Part of subcall function 0000026878E9E51C: CreateFileW.KERNELBASE(00000000), ref: 0000026878E9E562
                                                                                                • SetFileAttributesW.KERNELBASE(-00000001), ref: 0000026878E9892C
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.2721640024.0000026878E81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026878E81000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_26878e81000_soiucosxz.jbxd
                                                                                                Similarity
                                                                                                • API ID: File$AttributesCreate
                                                                                                • String ID:
                                                                                                • API String ID: 415043291-0
                                                                                                • Opcode ID: 618aca3401d4b7fe124b8c2541c3c837fb01dd0d1f8018090a6ddb5f7563badd
                                                                                                • Instruction ID: c288fcce32ff97e191bd4fca40cdd0be90a0a256f682b568b6c6c1c25b99d522
                                                                                                • Opcode Fuzzy Hash: 618aca3401d4b7fe124b8c2541c3c837fb01dd0d1f8018090a6ddb5f7563badd
                                                                                                • Instruction Fuzzy Hash: 8AE08671728A080BEB5CA66CA49573971C6D7DC254F54163EB44DC33CADDA5CC454342

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.2723050548.00007FFB0C151000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFB0C150000, based on PE: true
                                                                                                • Associated: 0000000D.00000002.2723017654.00007FFB0C150000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                                • Associated: 0000000D.00000002.2723119730.00007FFB0C192000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                                • Associated: 0000000D.00000002.2723172858.00007FFB0C19E000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                                                • Associated: 0000000D.00000002.2723225317.00007FFB0C1A1000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                                • Associated: 0000000D.00000002.2723225317.00007FFB0C1A4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                                • Associated: 0000000D.00000002.2723316925.00007FFB0C1A7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                                • Associated: 0000000D.00000002.2723342344.00007FFB0C1A8000.00000020.00000001.01000000.0000000D.sdmpDownload File
                                                                                                • Associated: 0000000D.00000002.2723495178.00007FFB0C3ED000.00000020.00000001.01000000.0000000D.sdmpDownload File
                                                                                                • Associated: 0000000D.00000002.2723589846.00007FFB0C475000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_7ffb0c150000_soiucosxz.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressFreeLibraryProc
                                                                                                • String ID: MZx$api-ms-$ext-ms-
                                                                                                • API String ID: 3013587201-2431898299
                                                                                                • Opcode ID: 388816bb59639d6ac3d3d34693a8a2e7a154d375a429ca9c30c6a4978183dee0
                                                                                                • Instruction ID: ba4be7aa599e28529e7339bbb197bb25f7a7d84b645a6bb7e9231f35d630abd0
                                                                                                • Opcode Fuzzy Hash: 388816bb59639d6ac3d3d34693a8a2e7a154d375a429ca9c30c6a4978183dee0
                                                                                                • Instruction Fuzzy Hash: 3841D6E2B1D60291EB16DB36E808EB92390BF45BA0F594235DD1D57785EF3CE44A8318

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.2723050548.00007FFB0C151000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFB0C150000, based on PE: true
                                                                                                • Associated: 0000000D.00000002.2723017654.00007FFB0C150000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                                • Associated: 0000000D.00000002.2723119730.00007FFB0C192000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                                • Associated: 0000000D.00000002.2723172858.00007FFB0C19E000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                                                • Associated: 0000000D.00000002.2723225317.00007FFB0C1A1000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                                • Associated: 0000000D.00000002.2723225317.00007FFB0C1A4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                                • Associated: 0000000D.00000002.2723316925.00007FFB0C1A7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                                • Associated: 0000000D.00000002.2723342344.00007FFB0C1A8000.00000020.00000001.01000000.0000000D.sdmpDownload File
                                                                                                • Associated: 0000000D.00000002.2723495178.00007FFB0C3ED000.00000020.00000001.01000000.0000000D.sdmpDownload File
                                                                                                • Associated: 0000000D.00000002.2723589846.00007FFB0C475000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_7ffb0c150000_soiucosxz.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressFreeLibraryProc
                                                                                                • String ID: CorExitProcess$mscoree.dll
                                                                                                • API String ID: 3013587201-1276376045
                                                                                                • Opcode ID: b4d4cddbb90d4ecaa7d1da2b12f7ab42b453d945075ba40629666b735ed15792
                                                                                                • Instruction ID: a967c66ac795caf38b7ac019f2a71e527c3ac848dc6a1616e3d942d592b28658
                                                                                                • Opcode Fuzzy Hash: b4d4cddbb90d4ecaa7d1da2b12f7ab42b453d945075ba40629666b735ed15792
                                                                                                • Instruction Fuzzy Hash: 04F062E1B1DA0682FB208B34E458B7A6360EF897A4F940239C66D861E4DF3CD54CD300